You are on page 1of 8

Cutting-planes for weakly-coupled

0/1 second order cone programs


— extended abstract —

Sarah Drewes 1
Fachbereich Mathematik
Technische Universität Darmstadt
Germany

2,3
Sebastian Pokutta
Fachbereich Mathematik
Technische Universität Darmstadt
Germany

February 5, 2010

Abstract
We analyze mixed 0/1 second order cone programs where the fractional and binary
variables are solely coupled via the conic constraints. For this special type of mixed-
integer second order cone programs we devise a cutting-plane framework based on
the generalized Benders cut. We show that the resulting cuts are very effective as
symmetric solutions are automatically cut off as well and each equivalence class of
0/1 solutions is visited at most once. We also present computational results showing
the effectiveness of our method and sketch an application in optimal pooling of
securities.

1
Email: drewes@mathematik.tu-darmstadt.de
2
Email: pokutta@mathematik.tu-darmstadt.de
3
Research partially supported by German Research Foundation (DFG) funded SFB 805.
1 Introduction
Mixed integer second order cone programming as one of the rather tractable
problem classes of mixed-integer nonlinear programming gained strong inter-
est in the recent years. Due to their structure and convexity, the underlying
relaxations can be solved in polynomial time to -optimality. Mixed integer
second order cone programs are usually solved via outer approximation algo-
rithms or within a branch-and-cut framework (see e.g., [5] for an overview).
Here we consider a restricted class of mixed integer second order cone pro-
grams where the integral variables are binary and the only coupling of binary
and fractional variables occurs in the conic constraints. For this problem class,
we derive cutting-planes based on the generalized Benders cuts (see e.g., [5]).
Applying an implicit Sherali-Adams step, we disentangle the binary variables
from the fractional variables in the conic constraints. As a result we obtain
a reformulation where the binary variables are aggregated in the linear parts
of the conic conditions. The resulting problem decomposes naturally and the
derived cuts account for symmetries arising from the weak coupling. We apply
these cuts and the resulting decomposition to solve a pooling problem arising
in portfolio optimization in finance.
Related work
Cutting-planes for mixed integer second order cone programs have been exten-
sively investigated. For example in [2], Gomory mixed-integer cuts for certain
classes of second order cone programs have been devised. A branch-and-cut
based method was outlined in [11] and in [8] lift-and-project based cutting-
planes have been used to solve mixed-integer second order cone programs.

Outline
In Section 2 we briefly recall the necessary notation, followed by the reformu-
lation of the considered problem class in Section 3. We then introduce the
cutting-plane framework based on the reformulation and the derived cutting-
planes in Section 4. The abstract concludes with briefly mentioning the pool-
ing problem in Section 5 and computational results in Section 6.

2 Preliminaries
We put [n] := {1, . . . , n} and for a set J ⊆ [n], we define J¯ := [n] \ J to be
the complement of J in [n]. All other notation is standard as to be found in
[1,8]. We will consider the following class of second order cone programs:
Definition 2.1 Let n ∈ N and J ⊆ [n]. Then a weakly-coupled 0/1 second
order cone program (wSOC) has the form:
min cJ xJ + cJ¯xJ¯
s.t. AJ xJ ≤ bJ
AJ¯xJ¯ ≤ bJ¯

(1) (T` xJ , xJ¯ )
` ` 2
≤ κ` ∀ ` ∈ [k]
¯
xJ¯ ∈ RJ+
xJ ∈ {0, 1}|J| ,
with AJ ∈ RmJ ×|J| , AJ¯ ∈ RmJ¯×|J | , bJ ∈ RmJ , bJ¯ ∈ RmJ¯, c = (cJ , cJ¯) ∈ Rn ,
¯

and κ` ∈ Z+ , T` = diag(ρ1 , . . . , ρ|J` | ) with ρj ≥ 0 for all j ∈ J` and ` ∈ [k]. We


slightly abuse notation by using J¯` to refer to the index subset of fractional
variables contained in the `-th second order cone constraint, i.e., we have
·
¯ and J` ∪ J¯` ⊆ [n] but equality does not necessarily have to
J` ⊆ J, J¯` ⊆ J,
hold.

3 Disentangling integral and fractional variables


In (wSOC) the fractional and integral variables are only coupled within the
conic constraints (1). We will now establish a reformulation of (wSOC) ex-
ploiting the fact that x2j − xj = 0 with j ∈ J holds for all feasible solutions
to (wSOC). Based on this substitution we will disentangle the fractional and
integral variables in (1). The resulting second order cone program contains
fractional variables in the norm only and the integral variables are contained
in the leading cone variable, i.e. in the linear part of the conic condition. This
substitution can be considered as an implicit Sherali-Adams step. Consider a
single conic constraint

(2) κ` ≥ (T` xJ` , xJ¯` ) 2 ,
with ` ∈ [k] and T` = diag(ρ1 , . . . , ρ|J| ) with ρj ≥ 0 for all j ∈ [|J|]. Clearly,
(2) is equivalent to the quadratic constraint
2
κ2` ≥ (T` xJ , xJ¯ ) ,
` ` 2
as κ` ≥ 0. Writing out the definition of the 2-norm and subtracting the
quadratic terms belonging
2
P 2
P set2 J` associated to the binary vari-
to the index
ables yields κ` − j∈J` (ρj xj ) ≥ j∈J¯ xj . Applying the above mentioned
2
substitution x̃j − x̃j = 0 for all j ∈ J, we obtain
X X
(3) κ2` − ρ2j xj ≥ x2j .
j∈J` i∈J¯`
Since xj ≥ x2j holds for xj ∈ [0, 1], inequality (3) is stronger than κ2` −
2 2
P P
j∈J` (ρj xj ) ≥ j∈J¯ xj . Note that (3) is a convex constraint since the left
hand side κ` of the conic condition (2) is constant. Furthermore, (3)P can be ex-
pressed as a second order cone constraint. Indeed, with h` := κ2` − j∈J` ρ2j xj
we obtain the constraint h` ≥ i∈J¯` x2j . Applying a standard transformation
P
(see e.g., [1,10]) this constraint together with h` ≥ 0 is second order cone
expressible by introducing auxiliary variables. We can thus reformulate the
mixed 0/1 second order cone conditions (1) in a way such that no binary vari-
able is contained in the norm, i.e., the binary variables are aggregated in the
leading cone variables h` . Moreover, note that constraint (3) dominates the
original constraint (2) and thus this reformulation is stronger than the original
program.

4 A cutting-plane framework for (wSOC)


We will now use the fact that after applying the transformation from above
the only coupling of integral and fractional variables in (wSOC) is via the
leading cone variables h` with ` ∈ [k]. The family of cuts that we derive are
based on the generalized Benders cut (see e.g., [5]).
Let
min cT x
s.t. AJ xJ ≤ bJ , AJ¯xJ¯ ≤ bJ¯
h` = κ2` − j∈J` ρ2j xj ≥ kxJ¯` k22 , ∀ ` ∈ [k]
P
(MISOC)
xj ∈ {0, 1}, ∀ j ∈ J, x ∈ Rn+ ,
be a mixed 0/1 second order cone program with the specially structured SOC
constraints considered above. And let
min cT x
s.t. AJ xJ ≤ bJ , AJ¯xJ¯ ≤ bJ¯
h` = κ2` − j∈J` ρ2j xj ≥ 0, ∀ ` ∈ [k]
P
(MIP-OA)
xj ∈ {0, 1}, ∀ j ∈ J, x ∈ Rn+ ,
be the relaxation of (MISOC) that results from omitting the conic constraints,
i.e., the feasible region of (MISOC) is contained in the one of (MIP-OA). This
outer approximation implies that for every optimal solution xM of (MIP-OA)
and every feasible solution xSOC of (MISOC) it holds
cT xM ≤ cT xSOC .
Thus, if there exists a feasible x̃SOC of (MISOC) and an optimal solution x̃M of
(MIP-OA) such that equality holds, then x̃SOC is optimal for (MISOC). This
fact will be used as a stopping criterion in our outer approximation algorithm.

The core of the classical outer approximation algorithm (see e.g., [5])
is to subsequently add linear approximations of the conic constraints. Let
(MIP-OA(ξ) ) denote the outer approximation problem (MIP-OA) after hav-
(ξ)
ing added ξ rounds of linearization cuts. Let xM denote its optimal solution
(ξ)
and let h` with ` ∈ [k] denote the associated h variables. Note that the latter
(ξ)
are indeed completely determined by (xM )J . In the following we will specify
the linearization cuts that we add in each round. Let
min cT x
s.t. AJ xJ ≤ bJ , AJ¯xJ¯ ≤ bJ¯,
(SOC(ξ) ) h` = κ2` − j∈J` ρ2j xj ≥ kxJ¯` k22 , ` ∈ [k],
P

(ξ)
xJ = (xM )J ,
be the second order cone program derived from (MISOC) by fixing the binary
(ξ) (ξ)
variables xJ to (xM )J . Let xSOC denote an optimal solution to (SOC(ξ) ) with
(ξ)
associated Lagrange multipliers µ̄` for ` ∈ [k]. Then, in round ξ of the
linearization phase, we add the following binary symmetric cut (BSC):
X (ξ)  (ξ)

(ξ)
(BSC(ξ) ) µ̄` h` − h` ≥ cTJ¯ (xSOC )J¯ − cTJ¯ xJ¯
`∈[k]

to the outer approximation, such that


MIP-OA(ξ) = MIP-OA ∩ {BSC(τ ) , τ ∈ [ξ]}
is the resulting program obtained when adding the binary symmetric cuts
of rounds τ with τ ∈ [ξ]. This cut arises as a strengthened version of the
generalized Benders cut. (Similarly, one can obtain the feasibility version of
(BSC(ξ) ) in the variables h.) Note that the value of the h vector determines the
feasible region of the fractional variables in (SOC(ξ) ). Thus, different feasible
solutions to (MIP-OA) whose integral parts induce the same h values lead to
the same nonlinear subproblem (SOC(ξ) ). The binary symmetric cut (BSC(ξ) )
accounts for this symmetry so that in each coset only one representative will
be examined as shown in the following proposition:
(ξ) (ξ+m)
Proposition 4.1 Let xM and xM denote the optimal solution of two outer
approximation problems (MIP-OA ) and (MIP-OA(ξ+m) ) with associated
(ξ)

values h(ξ) and h(ξ+m) satisfying h(ξ) = h(ξ+m) with ξ, m ∈ N. Then

(ξ+m) (ξ) (ξ) (ξ+m)


((xM )J , (xSOC )J¯) and ((xM )J , (xSOC )J¯)

(ξ+m) (ξ+m) (ξ)


are feasible for (MISOC). Furthermore, cT xM = cT ((xM )J , (xSOC )J¯)
(ξ+m) (ξ)
and thus ((xM )J , (xSOC )J¯) is an optimal solution to (MISOC).

The proposition above states that each coset is examined at most once;
a revisit allows for the construction of an optimal solution. As indicated
above, the (BSC) cuts can be integrated into e.g., an outer approximation or
branch-and-cut framework. While a detailed explanation will be contained in
the full-length paper, here we refer to e.g., [5].

5 An application: Optimal pooling of mixed securities

Second order cone constraints naturally appear in the context of portfolio opti-
mization problems in finance: Limiting the risk of a portfolio can be expressed
as
kQxk2 ≤ σ
where σ limits the risk of the portfolio, x ∈ [0, 1]n with i∈[n] xi = 1 is the dis-
P
tribution of securities, and Q is the positive semidefinite square root (Cholesky
decomposition) of the covariance matrix of the securities’ returns. Portfolio
optimization problems using risk constraints have been studied extensively
(see e.g., [12,4,9,3,6] and the references contained therein). We study a slightly
different problem of optimal pooling: Consider a set of securities where some
of those can be split (almost) arbitrarily into parts and others cannot. The
latter are assumed to be uncorrelated and therefore possess only idiosyncratic
risks, e.g., cat-linked securities (see e.g., [7]). We search for a pooling of these
securities maximizing the return of each pool such that a predefined risk level
for each pool is not exceeded. We further allow enforcing combinatorial con-
straints on integral securities; it could be sensible to prevent two cat securities
with identical trigger from being in the same pool. The resulting optimization
problem constitutes a (wSOC). A detailed investigation will be included in
the full-length paper.
OA (BSC) only (BSC)+OA integer fractional rows obj.
# iterations # iterations # iterations # vars # vars val.

1 63 5 4 210 1121 841 88.9071


2 25 2 2 210 1121 841 90.5359
3 2 4 2 210 761 971 65.4505
4 159 159∗ 157 210 761 971 58.5419
5 4 3 3 150 653 533 54.2551
6 2 2 2 150 653 533 47.6469
7 37 28 25 175 936 726 79.5996
8 19 4 3 175 936 726 77.2786
Table 1
computational results

6 Computational results
In this section we present computational results for solving instances of the
problem described in Section 5 of various sizes; for each size we generated two
instances that are already reformulated as described above. We compare the
classical outer approximation algorithm to our algorithm in two variants; one
that solely uses (BSC) cuts and one that also includes outer approximation
cuts. Whereas for smaller instances the difference is negligible, for larger
instances the advantage of adding (BSC) cuts becomes apparent. The results
are summarized in Table 1. Instances marked with ∗ resulted in infeasible
sub-NLPs. In this case the algorithms use the same cuts.
References

[1] F. Alizadeh and D. Goldfarb. Second-order cone programming. Mathematical


Programming, 95(1):3–51, 2003.

[2] A. Atamtürk and V. Narayanan. Cuts for Conic Mixed-Integer Programming.


In Integer programming and combinatorial optimization: 12th International
IPCO Conference, Ithaca, NY, USA, June 25-27, 2007: proceedings, page 16.
Springer-Verlag New York Inc, 2007.

[3] A. Ben-Tal and A. Nemirovski. Robust solutions of uncertain linear programs.


Operations Research Letters, 25(1):1–14, 1999.

[4] D. Bertsimas and R. Shioda. An algorithm for cardinality constrained


quadratic optimization problems. Technical report, Working Paper,
http://web.mit.edu/dbertsim/www/papers.html, 2004.

[5] P. Bonami, M. Kilinc, and J. Linderoth. Algorithms and Software for Convex
Mixed Integer Nonlinear Programs. 2009.

[6] S. Ceria and R.A. Stubbs. Incorporating estimation errors into portfolio
selection: Robust portfolio construction. Journal of Asset Management,
7(2):109–127, 2006.

[7] J.D. Cummins. CAT Bonds and Other Risk-Linked Securities: State of the
Market and Recent Developments. Risk Management & Insurance Review,
11(1):23–47, 2008.

[8] S. Drewes. Mixed Integer Second Order Cone Programming. PhD thesis,
Technische Universität Darmstadt, 2009.

[9] M.S. Lobo, M. Fazel, and S. Boyd. Portfolio optimization with linear and fixed
transaction costs. Annals of Operations Research, 152(1):341–365, 2007.

[10] M.S. Lobo, L. Vandenberghe, S. Boyd, and H. Lebret. Applications of second-


order cone programming. Linear Algebra and its Applications, 284(1-3):193–228,
1998.

[11] R.A. Stubbs and S. Mehrotra. A branch-and-cut method for 0-1 mixed convex
programming. Mathematical Programming, 86(3):515–532, 1999.

[12] J.P. Vielma, S. Ahmed, and G.L. Nemhauser. A Lifted Linear Programming
Branch-and-Bound Algorithm for Mixed-Integer Conic Quadratic Programs.
INFORMS Journal on Computing, 20(3):438–450, 2008.

You might also like