Exploiting Tabu Search Memory in Constrained Problems
This paper puts forth a general method to optimize constrained problems effectively when using tabu search. An adaptive penalty approach is used that exploits the short-term memory structure of the tabu list along with the long-term memory of the search results. It is shown to be effective on a vari...
Saved in:
Published in | INFORMS journal on computing Vol. 16; no. 3; pp. 241 - 254 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Linthicum
INFORMS
01.08.2004
Institute for Operations Research and the Management Sciences |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper puts forth a general method to optimize constrained problems effectively when using tabu search. An adaptive penalty approach is used that exploits the short-term memory structure of the tabu list along with the long-term memory of the search results. It is shown to be effective on a variety of combinatorial problems with different degrees and numbers of constraints. The approach requires few parameters, is robust to their setting, and encourages search in promising regions of the feasible and infeasible regions before converging to a final feasible solution. The method is tested on three diverse NP-hard problems, facility layout, system reliability optimization, and orienteering, and is compared with two other penalty approaches developed explicitly for tabu search. The proposed memory-based approach shows consistent strong performance. |
---|---|
AbstractList | This paper puts forth a general method to optimize constrained problems effectively when using tabu search. An adaptive penalty approach is used that exploits the short-term memory structure of the tabu list along with the long-term memory of the search results. It is shown to be effective on a variety of combinatorial problems with different degrees and numbers of constraints. The approach requires few parameters, is robust to their setting, and encourages search in promising regions of the feasible and infeasible regions before converging to a final feasible solution. The method is tested on three diverse NP-hard problems, facility layout, system reliability optimization, and orienteering, and is compared with two other penalty approaches developed explicitly for tabu search. The proposed memory-based approach shows consistent strong performance. This paper puts forth a general method to optimize constrained problems effectively when using tabu search. An adaptive penalty approach is used that exploits the short-term memory structure of the tabu list along with the long-term memory of the search results. It is shown to be effective on a variety of combinatorial problems with different degrees and numbers of constraints. The approach requires few parameters, is robust to their setting, and encourages search in promising regions of the feasible and infeasible regions before converging to a final feasible solution. The method is tested on three diverse NP-hard problems, facility layout, system reliability optimization, and orienteering, and is compared with two other penalty approaches developed explicitly for tabu search. The proposed memory-based approach shows consistent strong performance. [PUBLICATION ABSTRACT] |
Audience | Academic |
Author | Norman, Bryan A Smith, Alice E Coit, David W Kulturel-Konak, Sadan |
Author_xml | – sequence: 1 fullname: Kulturel-Konak, Sadan – sequence: 2 fullname: Norman, Bryan A – sequence: 3 fullname: Coit, David W – sequence: 4 fullname: Smith, Alice E |
BookMark | eNqFkM1PwyAchonRxG169dwYr618FEqPyzI_khlN3J1QChtLCxO26P57qTXxaDhAyPP-eHmm4Nx5pwG4QbBAmFf3dudVgSCBBYQlPAMTRDHLKcX8PJ1hjfKaU3YJpjHuYEJIWU8AXX7tO28P1m2ytWyO2buWQW2zF937cMqsyxbexUOQ1uk2ewu-6XQfr8CFkV3U17_7DKwfluvFU756fXxezFe5IhU85Lqqec2UxsTwWrVIId5ijYwpOa1ozRCriIYMQ05T7QY1BnNspKkIZlKVZAZux7H74D-OOh7Ezh-DSy8KnD7AOC1xgooR2shOC-uMT21VWq3urUqKjE33c4QRSqWq-i-ggo8xaCP2wfYynASCYjApBpNiMCkGkymQj4FheOjj__zdyG_tZvtpw9hqCP5wTBCBS0S-AWl9gcY |
CitedBy_id | crossref_primary_10_1287_ijoc_2019_0895 crossref_primary_10_1016_j_compchemeng_2011_04_015 crossref_primary_10_1080_0305215X_2011_647812 crossref_primary_10_1007_s00170_014_5830_7 crossref_primary_10_1016_j_ijpe_2017_08_004 crossref_primary_10_1016_j_eswa_2011_11_046 crossref_primary_10_1016_j_procs_2017_05_234 crossref_primary_10_1007_s00500_021_06031_6 crossref_primary_10_1016_j_ejor_2016_04_059 crossref_primary_10_1080_00207543_2020_1733124 crossref_primary_10_1016_j_ijpe_2010_11_018 crossref_primary_10_1080_07408170600805943 crossref_primary_10_1016_j_commatsci_2008_04_033 crossref_primary_10_1080_0740817X_2011_635177 crossref_primary_10_5916_jkosme_2014_38_2_225 crossref_primary_10_1016_j_ijpe_2008_09_001 crossref_primary_10_1016_j_ejor_2012_07_019 crossref_primary_10_1080_0305215X_2010_548864 crossref_primary_10_1080_00207540412331325567 crossref_primary_10_1016_j_cie_2023_109038 crossref_primary_10_1007_s10732_007_9041_3 crossref_primary_10_1016_j_cor_2013_12_004 crossref_primary_10_46632_eae_1_1_3 crossref_primary_10_1007_s10696_012_9138_3 crossref_primary_10_1016_j_tre_2015_01_003 crossref_primary_10_1080_21681015_2013_818069 crossref_primary_10_5916_jkosme_2014_38_8_1004 crossref_primary_10_1007_s00170_012_4229_6 crossref_primary_10_5916_jkosme_2011_35_3_341 crossref_primary_10_1016_j_orl_2005_09_009 crossref_primary_10_1016_j_ejor_2004_08_026 crossref_primary_10_1109_TR_2004_833310 crossref_primary_10_1007_s00170_012_4160_x crossref_primary_10_1080_0305215X_2012_678492 crossref_primary_10_1080_0305215X_2014_933825 crossref_primary_10_1080_00207541003614371 crossref_primary_10_1016_j_ress_2005_12_011 |
Cites_doi | 10.1007/BF00127358 10.1109/24.387368 10.1057/jors.1992.88 10.1016/S0377-2217(97)00294-4 10.1002/1520-6750(198806)35:3<359::AID-NAV3220350305>3.0.CO;2-H 10.1080/07408179508936763 10.1287/opre.17.5.838 10.1109/TR.1981.5221024 10.1016/0360-8352(96)00040-X 10.1287/ijoc.2.1.4 10.1007/978-1-4615-6089-0 10.1007/BF02078647 10.1016/0305-0548(91)90086-7 10.1287/trsc.31.2.170 10.1109/TR.1968.5217517 10.1016/0377-2217(89)90388-3 10.1287/mnsc.40.10.1276 10.1057/jors.1984.162 10.1287/mnsc.27.1.1 10.1287/ijoc.1.3.190 10.1002/1520-6750(198706)34:3<307::AID-NAV3220340302>3.0.CO;2-D 10.1515/9781400874651 10.1080/05695557508975028 10.1016/0166-218X(92)90248-9 10.1007/BF02098284 10.1109/24.510811 10.1057/jors.1992.37 10.1109/ICEC.1994.349995 10.1016/0969-6016(94)90032-9 10.1287/mnsc.9.2.294 10.1109/TR.1985.5222133 10.1007/BF02022561 10.1287/opre.36.4.619 10.1287/ijoc.8.2.173 10.1287/ijoc.3.3.262 10.1016/0305-0548(86)90048-1 10.1287/opre.6.2.200 10.1023/A:1009673512884 10.1109/24.75341 10.1016/0167-6377(92)90008-Q 10.1016/0377-2217(95)00035-6 10.1016/0377-2217(94)00289-4 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2004 Institute for Operations Research and the Management Sciences Copyright Institute for Operations Research and the Management Sciences Summer 2004 |
Copyright_xml | – notice: COPYRIGHT 2004 Institute for Operations Research and the Management Sciences – notice: Copyright Institute for Operations Research and the Management Sciences Summer 2004 |
DBID | AAYXX CITATION 3V. 7WY 7WZ 7XB 87Z 8AL 8AO 8FE 8FG 8FK 8FL ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- L.- M0C M0N P5Z P62 PQBIZ PQBZA PQEST PQQKQ PQUKI PRINS PYYUZ Q9U |
DOI | 10.1287/ijoc.1030.0040 |
DatabaseName | CrossRef ProQuest Central (Corporate) ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) ProQuest Central (Alumni) ProQuest Central Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection (Proquest) (PQ_SDU_P3) ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ABI/INFORM Global Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection One Business (ProQuest) ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ABI/INFORM Collection China ProQuest Central Basic |
DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Computer Science Database ProQuest Central Student Technology Collection ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Pharma Collection ProQuest Central China ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest Central Korea ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ABI/INFORM China ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) Business Premium Collection (Alumni) |
DatabaseTitleList | CrossRef ABI/INFORM Global (Corporate) |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1526-5528 1091-9856 |
EndPage | 254 |
ExternalDocumentID | 679183661 A121137079 10_1287_ijoc_1030_0040 ijoc.1030.0040 joc_16_3_241 |
Genre | Research Article Feature |
GroupedDBID | 1AW 29I 3V. 4.4 4S 5GY 7WY 8AL 8AO 8FE 8FG 8FL 8VB AAPBV ABDBF ABFLS ABPTK ABUWG ACNCT ADCOW AEILP AENEX AFKRA AKVCP ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AZQEC BENPR BEZIV BGLVJ BPHCQ CS3 DU5 DWQXO EAD EAP EBA EBE EBR EBS EBU ECS EDO EHE EJD EMI EMK EPL EST ESX F5P FRNLG GNUQQ GROUPED_ABI_INFORM_COMPLETE GROUPED_ABI_INFORM_RESEARCH HCIFZ I-F IAO ICD IEA IGS IL9 IOF ITC K6 K60 K6V K7- M0C M0N MV1 N95 NIEAY P2P P62 PQEST PQQKQ PQUKI PRINS PROAC QWB RPU TH9 TN5 TUS XI7 Y99 ZL0 ZY4 ACYGS XFK .4S .DC 18M AAYXX ABDNZ ABTAH ACGFO AEGXH AEMOZ AIAGR BAAKF CCPQU CITATION K1G K6~ MK~ ML~ PQBIZ PQBZA XOL 7XB 8FK JQ2 L.- Q9U |
ID | FETCH-LOGICAL-c370t-e79896ce23f89cd1c18d2e1ff48575961673e062085030b1bf282faf7326ac43 |
IEDL.DBID | 8FG |
ISSN | 1091-9856 |
IngestDate | Thu Oct 10 20:41:29 EDT 2024 Wed Nov 13 00:09:40 EST 2024 Thu Sep 12 17:57:07 EDT 2024 Wed Jan 06 02:47:42 EST 2021 Fri Jan 15 03:35:36 EST 2021 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c370t-e79896ce23f89cd1c18d2e1ff48575961673e062085030b1bf282faf7326ac43 |
PQID | 200468542 |
PQPubID | 46392 |
PageCount | 14 |
ParticipantIDs | proquest_journals_200468542 highwire_informs_joc_16_3_241 crossref_primary_10_1287_ijoc_1030_0040 informs_primary_10_1287_ijoc_1030_0040 gale_infotracacademiconefile_A121137079 |
ProviderPackageCode | Y99 RPU NIEAY |
PublicationCentury | 2000 |
PublicationDate | 20040800 |
PublicationDateYYYYMMDD | 2004-08-01 |
PublicationDate_xml | – month: 8 year: 2004 text: 20040800 |
PublicationDecade | 2000 |
PublicationPlace | Linthicum |
PublicationPlace_xml | – name: Linthicum |
PublicationTitle | INFORMS journal on computing |
PublicationYear | 2004 |
Publisher | INFORMS Institute for Operations Research and the Management Sciences |
Publisher_xml | – name: INFORMS – name: Institute for Operations Research and the Management Sciences |
References | B20 B21 B22 B23 B24 B25 B26 B27 B28 B29 B30 B31 B32 B33 B34 B35 B36 B37 B38 B39 B1 B2 B3 B4 B5 B6 B7 B8 B9 B40 B41 B42 B43 B44 B45 B46 B47 B48 B49 B50 B51 B10 B11 B12 B13 B14 B15 B16 B17 B18 B19 Avriel M. (B2) 1976 Smith A. E. (B45) 1995 Liang Y-C. (B34) 1999 Reeves C. R. (B42) 1993 Hertz A. (B30) 1989; 12 Smith A. E. (B46) 1993 Bellman R. E. (B4) 1957 Schwefel H-P. (B44) 1995 |
References_xml | – ident: B12 – ident: B35 – ident: B3 – ident: B41 – ident: B45 – ident: B7 – ident: B29 – ident: B25 – ident: B50 – ident: B21 – ident: B16 – ident: B31 – ident: B39 – ident: B13 – ident: B2 – ident: B40 – ident: B28 – ident: B44 – ident: B49 – ident: B6 – ident: B24 – ident: B48 – ident: B17 – ident: B30 – ident: B34 – ident: B51 – ident: B38 – ident: B9 – ident: B14 – ident: B10 – ident: B43 – ident: B20 – ident: B1 – ident: B27 – ident: B5 – ident: B47 – ident: B23 – ident: B18 – ident: B33 – ident: B37 – ident: B8 – ident: B36 – ident: B11 – ident: B42 – ident: B26 – ident: B4 – ident: B46 – ident: B22 – ident: B32 – ident: B15 – ident: B19 – start-page: 499 volume-title: Proc. Fifth Internat Conf. Genetic Algorithms year: 1993 ident: B46 contributor: fullname: Smith A. E. – ident: B43 doi: 10.1007/BF00127358 – ident: B40 doi: 10.1109/24.387368 – volume-title: Dynamic Programming year: 1957 ident: B4 contributor: fullname: Bellman R. E. – ident: B32 doi: 10.1057/jors.1992.88 – start-page: 1478 volume-title: Proc. 1999 Congress Evolutionary Comput. year: 1999 ident: B34 contributor: fullname: Liang Y-C. – ident: B38 doi: 10.1016/S0377-2217(97)00294-4 – ident: B28 doi: 10.1002/1520-6750(198806)35:3<359::AID-NAV3220350305>3.0.CO;2-H – ident: B48 doi: 10.1080/07408179508936763 – ident: B21 doi: 10.1287/opre.17.5.838 – ident: B37 doi: 10.1109/TR.1981.5221024 – volume-title: Modern Heuristic Techniques for Combinatorial Problems year: 1993 ident: B42 contributor: fullname: Reeves C. R. – ident: B11 doi: 10.1016/0360-8352(96)00040-X – ident: B24 doi: 10.1287/ijoc.2.1.4 – ident: B25 doi: 10.1007/978-1-4615-6089-0 – ident: B26 doi: 10.1007/BF02078647 – ident: B41 doi: 10.1016/0305-0548(91)90086-7 – ident: B47 doi: 10.1287/trsc.31.2.170 – ident: B19 doi: 10.1109/TR.1968.5217517 – volume: 12 start-page: 53 year: 1989 ident: B30 publication-title: Output contributor: fullname: Hertz A. – ident: B33 doi: 10.1016/0377-2217(89)90388-3 – ident: B20 doi: 10.1287/mnsc.40.10.1276 – ident: B50 doi: 10.1057/jors.1984.162 – ident: B18 doi: 10.1287/mnsc.27.1.1 – ident: B23 doi: 10.1287/ijoc.1.3.190 – ident: B27 doi: 10.1002/1520-6750(198706)34:3<307::AID-NAV3220340302>3.0.CO;2-D – volume-title: Nonlinear Programming: Analysis and Methods year: 1976 ident: B2 contributor: fullname: Avriel M. – ident: B6 doi: 10.1515/9781400874651 – ident: B3 doi: 10.1080/05695557508975028 – ident: B29 doi: 10.1016/0166-218X(92)90248-9 – ident: B51 doi: 10.1007/BF02098284 – ident: B12 doi: 10.1109/24.510811 – ident: B36 doi: 10.1057/jors.1992.37 – ident: B31 doi: 10.1109/ICEC.1994.349995 – ident: B39 doi: 10.1016/0969-6016(94)90032-9 – ident: B1 doi: 10.1287/mnsc.9.2.294 – ident: B7 doi: 10.1109/TR.1985.5222133 – ident: B17 doi: 10.1007/BF02022561 – volume-title: Handbook of Evolutionary Computation year: 1995 ident: B45 contributor: fullname: Smith A. E. – ident: B14 doi: 10.1287/opre.36.4.619 – ident: B13 doi: 10.1287/ijoc.8.2.173 – ident: B16 doi: 10.1287/ijoc.3.3.262 – ident: B22 doi: 10.1016/0305-0548(86)90048-1 – ident: B5 doi: 10.1287/opre.6.2.200 – ident: B49 doi: 10.1023/A:1009673512884 – ident: B35 doi: 10.1109/24.75341 – ident: B10 doi: 10.1016/0167-6377(92)90008-Q – volume-title: Evolution and Optimum Seeking year: 1995 ident: B44 contributor: fullname: Schwefel H-P. – ident: B8 doi: 10.1016/0377-2217(95)00035-6 – ident: B9 doi: 10.1016/0377-2217(94)00289-4 |
SSID | ssj0004349 |
Score | 1.9425038 |
Snippet | This paper puts forth a general method to optimize constrained problems effectively when using tabu search. An adaptive penalty approach is used that exploits... |
SourceID | proquest gale crossref informs highwire |
SourceType | Aggregation Database Publisher |
StartPage | 241 |
SubjectTerms | Computer memory constraint optimization facility layout Job shops Optimization orienteering reliability optimization Studies tabu search |
Title | Exploiting Tabu Search Memory in Constrained Problems |
URI | http://joc.journal.informs.org/cgi/content/abstract/16/3/241 https://www.proquest.com/docview/200468542 |
Volume | 16 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3LTgIxFL1R2OjCB2pEhHRhdDWBzrOzMmBAYgIhBhJ2TafTJrgAFFj49_Z2Okpiost5ZJqevu7tnJ4DcJfoVJqVIfe08jMv1JEZc1JEHvVzmicyUx0ruzgax8NZ-DKP5o6bs3G0ynJOtBN1vpK4R962mRyLQv9x_e6haRT-XHUOGodQpX6SYO7FBs8_xyIDG_2i9KWXsih2mo0mR2gv3lYSz5sjrwv3PfbWpHJmLuWC7TEnDCA3v6ZruwYNzuDEBY-kW7T2ORyoZQ1OS2MG4sZpDY73VAYvILI8uwXym8lUZDtSUIzJCEm2n2SxJOjaab0iVE4mhcPM5hKmg_70aeg5twRPBkln66kkZSn6ewWapTKnkrLcV1Tr0JpwxjROAtWJ0ZPT1DujmTbZlhY6MQGckGFwBZXlaqmugYSR8JkwcZOJ7kKRCsYCkYYyltLkNlTFdXgo4eLrQhODYy5hgOUILEdgOQJr3kQ0OQJoqiGF4_ybclB2indRYC5Akb46NEvAuYOb20_FPOAmyqjDfXn7vyIbZSNxNxw3_Lvz3Pz5tAFHBTEH-X23UNl-7FTTxBzbrGV7Vguqvf548mqu-r3ZF-Sa1JY |
link.rule.ids | 315,783,787,12777,21400,27936,27937,33385,33756,43612,43817,74363,74630 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV09T8MwED1BGYCBjwKilIIHBFPUJna-JlQhSoG2YihSN8txbKkMaaHtwL_H5zhQCQnWJIrl56-75N17AFexTqU5GXJPqyDzmA7NmpMi9Pwg9_NYZqpjZReHo6j_yp4m4cRxcxaOVlntiXajzmcSv5G3bSaXhCy4nb97aBqFP1edg8YmbDFqjmosFO89_JRFUhv9ovSllyZh5DQbTY7Qnr7NJNabI68Lv3usnUnVzlzJBdsyJwwgF7-2a3sG9Q5gzwWPpFuO9iFsqKIO-5UxA3HrtA67ayqDRxBant0U-c1kLLIVKSnGZIgk208yLQi6dlqvCJWTl9JhZnEM4979-K7vObcET9K4s_RUnCYp-ntRnaQy96Wf5IHytWbWhDPyo5iqToSenKbfmZ9pk21poWMTwAnJ6AnUilmhToGwUASJMHGTie6YSEWSUJEyGUlpchtfRQ24qeDi81ITg2MuYYDlCCxHYDkCa55ENDkCaLohheP8m3ZQdop3UWCOokhfA1oV4NzBze2rIk65iTIacF1d_q_JZjVI3C3HBf-ePGd_3r2E7f54OOCDx9FzE3ZKkg5y_c6htvxYqZaJP5bZhZ1lXz3S1OE |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3JTsMwEB1BkRAcWAqIUhYfEJyiNpvjnBACyl71UKTeLMexpXJogZYDf8-M4wASElyTKJaf7fFM8vwewHFmc407QxlYExVBYlNcc1qlQRiVYZnpwnSd7OJjn988JXejdOQlhWaeVlnHRBeoy6mmb-QdV8mJNIk61rMiBpe9s5fXgAyk6Eerd9NYhCXcFDlNedG7_j4iGbtMmGQwg1yk3Os3Yr3QGT9PNZ09J44XfQP5sT_VUbqWDnZHniiZnP0K3W4_6m3Amk8k2Xk18puwYCZNWK9NGphfs01Y_aE4uAWp49yNievMhqp4ZxXdmD0S4faDjSeMHDydb4Qp2aBym5ltw7B3Nby4CbxzQqDjrDsPTJaLnLy-YityXYY6FGVkQmsTZ8jJQ57FpsvJnxP7XYSFxcrLKpthMqd0Eu9AYzKdmF1gSaoioTCHwkwvUbkSIlZ5ornWWOeEhrfgtIZLvlT6GJLqCgRWErCSgJUELD5JaEoCELuhlef_YzskQSXPSWwuJsG-FhzUgEsPt3Sv4jKWmHG04KS-_F-T7XqQpF-aM_k1kfb-vHsEyzjB5MNt_74NKxVfh2h_-9CYv72bA0xF5sWhm2SfWxbZGQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Exploiting+Tabu+Search+Memory+in+Constrained+Problems&rft.jtitle=INFORMS+journal+on+computing&rft.au=Kulturel-Konak%2C+Sadan&rft.au=Norman%2C+Bryan+A&rft.au=Coit%2C+David+W&rft.au=Smith%2C+Alice+E&rft.date=2004-08-01&rft.eissn=1526-5528&rft.volume=16&rft.issue=3&rft.spage=241&rft_id=info:doi/10.1287%2Fijoc.1030.0040&rft.externalDBID=n%2Fa&rft.externalDocID=joc_16_3_241 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1091-9856&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1091-9856&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1091-9856&client=summon |