Abstract
In this paper, a new full Nesterov–Todd step infeasible interior-point method for Cartesian \(P_*(\kappa )\) linear complementarity problem over symmetric cone is considered. Our algorithm starts from a strictly feasible point of a perturbed problem, after a full Nesterov–Todd step for the new perturbed problem the obtained strictly feasible iterate is close to the central path of it, where closeness is measured by some merit function. Furthermore, the complexity bound of the algorithm is the best available for infeasible interior-point methods.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
The Cartesian \(P_*(\kappa )\) linear complementarity problem over symmetric cone (Cartesian \(P_*(\kappa )\)-SCLCP), seeks vectors \(x, s\in {\mathcal {J}}\) such that
where \(\langle x, s \rangle =\mathrm{tr}(x\circ s)\) denotes the Euclidean inner product, \(\mathcal {J}=\mathcal {J}_1\times \cdots \times \mathcal {J}_N\) is the Cartesian product space with the corresponding cone of squares \(\mathcal {K}=\mathcal {K}_1\times \cdots \times \mathcal {K}_N\) where each \(\mathcal {J}_j\) is a Euclidean Jordan algebra with dimension \(n_j\) and rank \(r_j\) and each \(\mathcal {K}_j\) is the corresponding cone of squares \(\mathcal {J}_j\), \(q\in \mathcal {J}\), and the linear transformation \(\mathcal {A}: \mathcal {J} \rightarrow \mathcal {J}\) has the Cartesian \(P_*(\kappa )\) property for some nonnegative constant \(\kappa \), i.e.,
where \(I_+=\big \{j: \big \langle x^{(j)}, [\mathcal {A}(x)]^{(j)}\big \rangle \ge 0\big \}\) and \(I_-=\big \{j: \big \langle x^{(j)}, [\mathcal {A}(x)]^{(j)}\big \rangle <0\big \}.\) Note that the dimension of \(\mathcal {J}\) is \(n=\sum _{j=1}^Nn_j\) and the rank is \(r=\sum _{j=1}^Nr_j\).
The concept of the Cartesian \(P_*(\kappa )\)-property was first introduced by Luo and Xiu [11] in the general Euclidean Jordan algebra. Factually, it is a straightforward extension of the \(P_*(\kappa )\)-matrix introduced by Kojima et al. [9], where they first proved the existence and uniqueness of the central path for the \(P_{*}(\kappa )\)-LCP and generalized the primal-dual interior-point algorithm for linear optimization (LO) to the \(P_{*}(\kappa )\)-LCP. The Cartesian \(P_*(\kappa )\)-SCLCP includes a wide class of problems, namely, \(P_*(\kappa )\)-LCP, Cartesian \(P_*(\kappa )\) second-order cone linear complementarity problem (SOCLCP) and Cartesian \(P_*(\kappa )\) semidefinite linear complementarity problem (SDLCP) as special cases. Luo and Xiu [11] extended the path-following interior-point algorithms for symmetric cone optimization (SCO) introduced by Schmieta and Alizadeh [16] to the Cartesian \(P_*(\kappa )\)-SCLCP. Wang and Bai [18] presented a class of polynomial interior-point algorithms for the Cartesian \(P_*(\kappa )\)-SCLCP based on a kernel function and obtained the currently best known iteration bounds with the addition of a factor \((1+2\kappa )\) for feasible IPMs.
The primal-dual full-Newton step feasible interior-point method (IPM) for LO was first introduced by Roos et al. [15], and the authors obtained the currently best known iteration bound for small-update methods, namely, \(O(\sqrt{n}\log \frac{n}{\epsilon })\). Wang et al. [19, 21] and Wang and Lesaja [20] generalized the results for LO obtained by Roos et al. in [15] to SCO, convex quadratic symmetric cone optimization (CQSCO) and the Cartesian \(P_*(\kappa )\)-SCLCP, respectively. Based on a modified Nesterov–Todd (NT)-direction, Kheirfam and Mahdavi-Amiri [8] and Kheirfam [5] presented a feasible IPM for SCLCP and the Cartesian \(P_*(\kappa )\)-SCLCP. All methods mentioned so far are feasible IPM that can be started only if a strictly feasible point is known. Usually such a starting point is not at hand. In this case a so-called infeasible IPM (IIPM) should be used.
IIPMs start with an arbitrary positive point and feasibility is reached as optimality is approached. In 2006, Roos [13] proposed a full-Newton step IIPM for LO, which starts with a strictly feasible solution of a perturbed problem and generates iterates each of which is strictly feasible for a new perturbed problem. The author proved that the complexity of the algorithm coincides with the best-known iteration bound for IIPMs. Some variants of the method extended by Kheirfam and Mahdavi-Amiri [7] to SCLCP, Kheirfam [6] to horizontal LCP (HLCP), Gu et al. [4] to SCO and Liu and Sun [10] to LO. Recently, Roos [14] proposed a new method for LO by improving the full-Newton step IIPMs so that the centering steps not be needed, whereas the above-mentioned IIPMs require a few (at most three) centering steps in each main iteration. Motivated by Roos’ recent work, we present a new full-NT step IIPM for the Cartesian \(P_*(\kappa )\)-SCLCP which uses only one feasibility step in each iteration and the centering steps not to be required in this paper. In our algorithm, closeness to the central path is measured by a merit function introduced in [22] which makes a simple and interesting analysis. We derive the worst case iteration complexity, as is usual for theoretical iteration bounds for IIPMs.
The remainder of our work is organized as follows. In Sect. 2, we briefly recall some results from Euclidean Jordan algebra that we need in this paper. In Sect. 3, we introduce the perturbed problem and describe an iteration of our algorithm. We then present the algorithm. Section 4 contains the analysis of the algorithm. In Sect. 4.1, we derive an upper bound for the proximity measure after a full-NT step. Section 4.2 serves to derive an upper bound for \(\omega (v)\). In Sect. 4.3, we fix values of the parameters \(\theta \) and \(\tau \) in the algorithm. As a result, we realize the algorithm to be well-defined for the chosen values of \(\theta \) and \(\tau \). We derive the iteration complexity of the algorithm in Sect. 4.4. Finally, Sect. 5 contains some concluding remarks.
2 Euclidean Jordan algebra
Here, we briefly outline some concepts, properties, and results from Euclidean Jordan algebras as needed. A comprehensive treatment of Euclidean Jordan algebra can be found in [1, 3, 17].
A Euclidean Jordan algebra is a triple \((\mathcal {J}, \circ , \langle \cdot , \cdot \rangle )\), where \((\mathcal {J}, \langle \cdot , \cdot \rangle )\) is an \(n\)-dimensional inner product space over \(R\) and \(\circ : (x, y)\rightarrow x\circ y\) is a bilinear mapping satisfying the following conditions for all \(x, y, s\in \mathcal {J}\):
-
(a)
\({x}\circ {y}={y}\circ {x}\),
-
(b)
\({x}\circ ({x}^2\circ {y})={x}^2\circ ({ x}\circ {y})\), where \({x}^2={x}\circ {x},\)
-
(c)
\(\langle {x}\circ {y}, {s}\rangle =\langle {x}, {y}\circ {s}\rangle ,\) where the inner product \(\langle \cdot , \cdot \rangle \) is defined by \(\langle x, y\rangle =\mathrm{tr}(x\circ y)\) for any \(x, y\in \mathcal {J}\).
We assume that there exists an element \(e\in \mathcal {J}\), which called the identify element, such that \(x\circ e=e\circ x=x\) for all \(x\in \mathcal {J}\). Denote the corresponding cone of squares by \(\mathcal {K}:=\{x^2: x\in \mathcal {J}\}\). Note that, by Theorem III.2.1 in [1], \(\mathcal {K}\) is indeed a symmetric cone. Since \(\mathcal {J}\) is finite-dimensional, given \(x\in \mathcal {J}\), there exists a minimal positive integer \(k\), which called the degree of \(x\), such that the set \(\{e, x, \ldots , x^k\}\) is linearly dependent. The rank of \(\mathcal {J}\), denoted by \(r\), is defined to be
where \(\mathrm{deg}(x)\) is the degree of \(x\). An element \(c\in {\mathcal {J}}\) is idempotent if \(c\circ c=c\ne 0\), which is also primitive if it cannot be expressed as a sum of two idempotents. A set of primitive idempotents \(\{{ c}_1, { c}_2, \ldots , { c}_k\}\) is called a Jordan frame if \({ c}_i\circ { c}_j=0\), for any \(i\ne j\in \{1, 2, \ldots , k\}\), and \(\sum _{i=1}^k{ c}_i={ e}.\) Let \(({\mathcal {J}}, \circ , \langle \cdot ,\cdot \rangle )\) be a Euclidean Jordan algebra with \(\mathrm{rank}({\mathcal {J}})=r\). Then, for any \({x}\in {\mathcal {J}}\), there exists a Jordan frame \(\{{c}_1, {c}_2, \ldots , {c}_r\}\) and real numbers \(\lambda _1({x}), \lambda _2({x}), \ldots , \lambda _r({x})\) such that \({x}=\sum _{i=1}^r\lambda _i({x}){ c}_i\) (spectral decomposition, Theorem III.1.2 in [1]). Every \(\lambda _i({x})\) is called an eigenvalue of \({x}\). Since “\(\circ \)” is bilinear for every \({x}\in {\mathcal {J}}\), the Lyapunov transformation \(L(x): \mathcal {J}\rightarrow \mathcal {J}\) is defined as \(L(x)y=x\circ y\). For each \({x}\in {\mathcal {J}},\) define
where, \(L({x})^2=L({x})L({x})\). The map \(P({x})\) is called the quadratic representation of \(x\) in \({\mathcal {J}}\), which is an essential concept in the theory of Jordan algebra and plays an important role in the analysis of interior-point algorithms. We say two elements \(x, y\) of a Jordan algebra \(\mathcal {J}\) operator commute if \(L(x)L(y)=L(y)L(x)\). Two elements \(x, y\) of a Jordan algebra \(\mathcal {J}\) are called similar, denoted as \(x\sim y\), if \(x\) and \(y\) share the same set of eigenvalues. In what follows, we generalize the definitions and properties stated so far in this section to the general case, when the cone underlying the given \(P_{*}(\kappa )\)-SCLCP is the Cartesian product of \(N\) symmetric cones \({\mathcal {K}}_j,\) where \(N>1\). For any \(x=(x^{(1)}, x^{(2)}, \ldots , x^{(N)})\in {\mathcal {J}}\), where \(x^{(j)}\in \mathcal {J}_j\), we have
For any \(x, s\in \mathcal {J}\), we have
Obviously, if \(e^{(j)}\in {\mathcal {J}}_j\) is the identity element in the Jordan algebra for the \(j\)th cone, then the vector \(e=(e^{(1)}, e^{(2)}, \ldots , e^{(N)})\) is the identify element in \(({\mathcal {J}}, \circ )\). One can easily verify that \(\mathrm{tr}(e)=r\). The Lyapunov transformation and the quadratic representation of \({\mathcal {J}}\) can be adjusted to
3 Infeasible full-NT step IPM
In the case of an infeasible method, we call the pair \((x, s)\) an \(\epsilon \)-solution of (1) if the Frobenius norm of the residual vector \(s-\mathcal {A}(x)-q\) does not exceed \(\epsilon \), and also \(\mathrm{tr}(x\circ s)\le \epsilon \).
3.1 The perturbed problem
We start with choosing arbitrarily \((x^0, s^0)\in \mathrm{int}\mathcal {K}\times \mathrm{int}\mathcal {K}\) such that \(x^0\circ s^0=\mu ^0e\) for some positive number \(\mu ^0\). For any \(\nu \), with \(0<\nu \le 1\), we consider the perturbed problem
where \(r_q^0=s^0-\mathcal {A}(x^0)-q\). It is obvious that \((x, s)=(x^0, s^0)\) is a strictly feasible solution of \((SCLCP_{\nu })\), when \(\nu =1\). We conclude that if \(\nu =1\), then \((SCLCP_{\nu })\) satisfies the IPC, i.e., there exists \((x^0, s^0)\in \mathrm{int}\mathcal {K}\times \mathrm{int}\mathcal {K}\) such that \(s^0-\mathcal {A}(x^0)-q=\nu r_q^0\), which then straightforwardly leads to the following result.
Lemma 1
Let (1) be feasible and \(0<\nu \le 1\). Then, the perturbed problem \((SCLCP_{\nu })\) satisfies the IPC.
Proof
The proof is similar to the proof of the Theorem 3.1 in [7], and is therefore omitted.\(\square \)
3.2 The central path of the perturbed problem
Let (1) be feasible and \(0<\nu \le 1\). Then, Lemma 1 implies that the problem \((\mathrm{SCLCP_{\nu }})\) satisfies the IPC, for \(0<\nu \le 1\), and therefore its central path exists. This means that the system
has a unique solution for any \(\mu >0\), as the \(\mu \)-center of the perturbed problem \((\mathrm{SCLCP_{\nu }})\). The set of \(\mu \)-centers is called the central path. In the sequel, the parameters \(\mu \) and \(\nu \) will always be in a one-to-one correspondence, according to \(\mu =\nu \mu ^0\).
3.3 An iteration of our algorithm
We just established that if \(\nu =1\) and \(\mu ={\mu }^{0}\), then \((x^{0}, s^{0})\) is the \(\mu \)-center of the perturbed problem \((SCLCP_{\nu })\). In accordance with the available results on IIPMs (e.g., see [7]), the initial iterates are given by
where \(\rho _p>0\) and \(\rho _d>0\) such that \(\Vert x^*\Vert _{\infty }\le \rho _p\) and \(\max \{\Vert s^*\Vert _{\infty }, \Vert \overline{\mathcal {A}}\Vert _F\rho _p\}\le \rho _d\) for some solution \((x^*, s^*)\) of (1). If the pair \((x, s)\) is feasible for the perturbed problem \((SCLCP_{\nu })\), and \(\mu =\rho _p\rho _d\nu \), then we measure proximity to the \(\mu \)-center of this perturbed problem by the quantity
and \(w=P({x}^{\frac{1}{2}})\big (P({x}^{\frac{1}{2}}){ s}\big )^{-\frac{1}{2}} \big [= P({s}^{-\frac{1}{2}})\big (P({ s}^{\frac{1}{2}}){x}\big )^{\frac{1}{2}}\big ]\) is called the scaling point of \(x\) and \(s\) (Lemma 3.2 in [2]). This scaling point was first introduced by Nesterov and Todd [12] for self-scaled cones and then adapted by Faybusovich [3] for symmetric cones. As a consequence, we have the following lemma.
Lemma 2
(cf. Lemma 2.1 in [6]) If \(\delta :=\delta (v)\), then
Suppose that for some \(\mu \in (0, \mu ^0]\) we have \(x\in \mathcal {K}\) and \(s\in \mathcal {K}\) satisfying the first equation in (2) for \(\nu =\frac{\mu }{\mu ^0}\) and such that \(\delta (x, s; \mu )\le \tau \). This certainly holds at the start of the first iteration, since \(\delta (x^0, s^0; \mu ^0)=0<\tau \) and \(s^0-\mathcal {A}(x^0)-q=\nu r_q^0\), when \(\nu =1\). We reduce \(\nu \) to \(\nu ^+=(1-\theta )\nu \) and \(\mu \) to \(\mu ^+=(1-\theta )\mu \) with \(\theta \in (0, 1)\), and find new iterate \((x^+, s^+)\) that is feasible for the perturbed problem \((SCLCP_{\nu ^+})\), and such that \(\delta (x^+, s^+; \mu ^+)\le \tau .\)
We proceed by deriving the search directions in the algorithm. For this purpose, we find displacements \(\varDelta x\) and \(\varDelta s\) such that
Due to the fact that \(L(x)L(s)\ne L(s)L(x)\), in general, the above system does not always have a unique solution. This problem can be solved by replacing the second equation of the system (2) by \(P(w^{-\frac{1}{2}})x\circ P(w^{\frac{1}{2}})s=\mu e\) (cf. Lemma 28 in [16]). Then the Newton system becomes
It is easily seen that \(x^+:=x+\varDelta x\) and \(s^+:=s+\varDelta s\) satisfy \(s-\mathcal {A}(x)-q=\nu ^+ r_q^0\). The main part of the analysis is to guarantee that \(x^+\in \mathrm{int}\mathcal {K}\) and \(s^+\in \mathrm{int}\mathcal {K}\) and satisfy \(\delta (x^+, s^+; \mu ^+)\le \tau .\)
3.4 The algorithm
A formal description of the algorithm is given in Fig. 1.
4 Analysis of the algorithm
Let \((x, s)\) denote the iterate at the start of an iteration, and \(\delta (x, s; \mu )\le \tau \).
4.1 Upper bound for \(\delta (v^+)\)
As established in Sect. 3.3, the full-NT step generates new iterates \((x^+, s^+)\) that satisfy the feasibility condition for \((SCLCP_{\nu ^+})\), except for possibly the constraints on the cone \(\mathcal {K}\). A crucial element in the analysis is to show that, after the full-NT step, \(\delta (x^+, s^+; \mu ^+)\le \tau \).
Defining
where \(w\) is the NT-scaling point of \(x\) and \(s\), we may easily check that the system (5), which defines the search directions \(\varDelta x\) and \(\varDelta s\), can be written in terms of the scaled directions \(d_x\) and \(d_s\) as follows:
where \(\overline{\mathcal {A}}:=P(w^{\frac{1}{2}})\mathcal {A}P(w^{\frac{1}{2}}).\) Furthermore, using (3) and (6) we get
Since \(P(w^{\frac{1}{2}})\) and \(P(w^{-\frac{1}{2}})\) are automorphisms of \(\mathrm{int}\mathcal {K}\) (Theorem III.2.1 in [1]), \(x^+\) and \(s^+\) belong to \(\mathrm{int}\mathcal {K}\) if and only if \(v+d_x\) and \(v+d_s\) belong to \(\mathrm{int}\mathcal {K}\). In this case, using the second equation of (7), we obtain
Lemma 3
The iterate \((x^+, s^+)\) is strictly feasible if \((1-\theta )e+d_x\circ d_s\in \mathrm{int}\mathcal {K}\).
Proof
The proof is similar to the proof of Lemma 4.2 in [4], and is therefore omitted.\(\square \)
Corollary 1
The iterate \((x^+, s^+)\) is strictly feasible if \(\Vert \lambda (d_x\circ d_s)\Vert _{\infty }<1-\theta .\)
Proof
By Lemma 3, the iterate \((x^+, s^+)\) is strictly feasible if \((1-\theta )e+d_x\circ d_s\in \mathrm{int}\mathcal {K}\). If \(\Vert \lambda (d_x\circ d_s)\Vert _{\infty }<1-\theta ,\) then we have \(\theta -1<\lambda _i(d_x\circ d_s)<1-\theta \) for all \(i=1, \ldots , r.\) Therefore,
The last inequalities mean that \((1-\theta )e+d_x\circ d_s\in \mathrm{int}\mathcal {K}\), and the corollary follows. \(\square \)
In the sequel, we denote
It follows that
Corollary 2
If \(\omega (v)<1-\theta \), then the iterate \((x^+, s^+)\) is strictly feasible.
Proof
Due to (10), \(\omega (v)<1-\theta \) implies \(\Vert \lambda (d_x\circ d_s)\Vert _{\infty }<1-\theta \). By Corollary 1, the proof is complete.\(\square \)
Assuming \(\omega (v)<1-\theta \), which guarantees strict feasibility of the iterates \((x^+, s^+)\), we proceed by deriving an upper bound for \(\delta (x^+, s^+; \mu ^+)\). By definition, we have
In what follows, we denote \(\delta (x^+, s^+; \mu ^+)\) shortly by \(\delta (v^+).\)
Lemma 4
If \(\omega (v)<1-\theta \), then
Proof
Since \(\omega (v)<1-\theta \), using Corollary 2, it follows that \(x^+\) and \(s^+\) are strictly feasible, hence \(v+d_x, v+d_s\) and \((v+d_x)\circ (v+d_s)\) belong to \(\mathrm{int}\mathcal {K}\). Similar to the proof of Lemma 3.3 in [7], we have
Now, by using \(\Vert P(x^{\frac{1}{2}})s-e\Vert _F\le \Vert x\circ s-e\Vert _F\) for any \(x, s\in \mathrm{int}\mathcal {K}\) (cf. Lemma 30 in [16]), (11), (8) and (10), we may write
This completes the proof.\(\square \)
4.2 Upper bound for \(\omega (v)\)
In this section, we obtain an upper bound for \(\omega (v)\) which enable us to find a default value for \(\theta \). For this purpose, the following two lemmas play an important role.
Lemma 5
If the linear transformation \({\overline{\mathcal {A}}}\) has the Cartesian \(P_*(\kappa )\)-property, then the solution \((d_x, d_s)\) of the linear system
satisfies
Proof
Since \({\overline{\mathcal {A}}}\) has the Cartesian \(P_*(\kappa )\)-property, we obtain
Therefore, using the above inequality, we get
This completes the proof.\(\square \)
Lemma 6
If the linear transformation \({\overline{\mathcal {A}}}\) has the Cartesian \(P_*(\kappa )\)-property, then the solution \((d_x, d_s)\) of the linear system
satisfies
Proof
It is easily seen that the system (14) can be written as
where \(\tilde{v}=d_s+a\). Applying Lemma 5 to (15), it follows that
Therefore, using the above inequality, we get
This completes the proof.\(\square \)
Comparing system (14) with the system (7) and considering \(a=\frac{P(w^{\frac{1}{2}})}{\sqrt{\mu }}\theta \nu r^0_q\) and \(b=(1-\theta )v^{-1}-v\), we get
On the other hand, we have
where the third inequality follows by Lemma 4.5 in [4] and the last inequality by \(tr(x^2)\le tr(x)^2\).
Lemma 7
Let \((x, s)\) be feasible for the perturbed problem \((SCLCP_{\nu })\) and let \((x^0, s^0)=(\rho _p e, \rho _d e)\), \(\langle x^*, s^*\rangle =0, \Vert s^*\Vert _{\infty }\le \rho _d\) and \(\Vert x^*\Vert _{\infty }\le \rho _p\). Then, we have
Proof
It is easily seen that
Since the linear transformation \(\mathcal {A}\) has the Cartesian \(P_*(\kappa )\)-property, it follows that
The above inequality, due to \(\langle x^*, s\rangle +\langle x, s^*\rangle \ge 0\) and Lemma 2, implies that
Therefore, \(\langle x, s^0\rangle \le (1+4\kappa )r\rho _p\rho _d\big (3+\delta \big )\) which implies the result.\(\square \)
By substituting (18) and (17) into (16) and using (9) and the fact that \(\mu =\nu \mu ^0=\nu \rho _p\rho _d\), we obtain
4.3 Values for \(\theta \) and \(\tau \)
Our aim is to find a positive number \(\tau \) such that if \(\delta \le \tau \), then \(\delta (v^+)\le \tau \). By Lemma 4, this will hold if \(\omega (v)<1-\theta \) and
In this stage, we choose
Using \(\delta \le \tau \), it follows from (19), with the right-hand side of (19) being monotonically increasing with respect to \(\delta \), that
This implies that \(\omega (v)<1-\theta \) with \(\theta \) defined as in (21), and (20) holds. Therefore, the iterates generated by the algorithm are strictly feasible, and the algorithm is well-defined in the sense that the property \(\delta (x, s; \mu )\le \tau \), with \(\tau \) defined as in (21), is maintained in all iterations.
4.4 Complexity
We have found that if at the start of an iteration the iterates satisfy \(\delta (x, s; \mu )\le \tau \), and \(\tau \) and \(\theta \) are defined as in (21), then after the full-NT step, the iterate is strictly feasible and satisfies \(\delta (x^+, s^+; \mu ^+)\le \tau \). This establishes the algorithm to be well-defined.
In each main iteration, both the barrier parameter \(\mu \) and the norm of the residual vector are reduced by the factor \(1-\theta \). Hence, the total number of main iterations is bounded above by
Thus, we may state the main result of our work.
Theorem 1
If (1) has a solution \((x^*, s^*)\) such that \(\Vert x^*\Vert _{\infty }\le \rho _p\) and \(\Vert s^*\Vert _{\infty }\le \rho _d\), then after at most
iterations the algorithm finds an \(\epsilon \)-solution of (1).
5 Conclusions
In this paper, we have presented a full-NT step IIPM for the Cartesian \(P_*(\kappa )\)-SCLCP. The method used in each iteration only a full step. The analysis is simpler and the closeness to central path is measured by some merit function. Finally, the iteration bound in this paper is a worst-case bound, as is usual for theoretical iteration bounds for IIPMs.
References
Faraut, J., Korányi, A.: Analysis on Symmetric Cones. Oxford Mathematical Monographs, The Clarendon Press, Oxford University Press, Oxford Science Publications, New York (1994)
Faybusovich, L.: A Jordan-algebraic approach to potential-reduction algorithms. Math. Z. 239(1), 117–129 (2002)
Faybusovich, L.: Euclidean Jordan algebras and interior-point algorithms. Positivity 1(4), 331–357 (1997)
Gu, G., Zangiabadi, M., Roos, C.: Full Nesterov–Todd step infeasible interior-point method for symmetric optimization. Eur. J. Oper. Res. 214(3), 473–484 (2011)
Kheirfam, B.: An interior-point method for Cartesian \(P_*(\kappa )\)-linear complementarity problem over symmetric cones. ORiON 30(1), 41–58 (2014)
Kheirfam, B.: A new complexity analysis for full-Newton step infeasible interior-point algorithm for horizontal linear complementarity problems. J. Optim. Theory Appl. 161(3), 853–869 (2014)
Kheirfam, B., Mahdavi-Amiri, N.: A full Nesterov–Todd step infeasible interior-point algorithm for symmetric cone linear complementarity problem. Bull. Iran. Math. Soc. 40(3), 541–564 (2014)
Kheirfam, B., Mahdavi-Amiri, N.: A new interior-point algorithm based on modified Nesterov–Todd direction for symmetric cone linear complementarity problem. Optim. Lett. 8(3), 1017–1029 (2014)
Kojima, M., Megiddo, N., Noma, T., Yoshise, A.: A Unified Approach to Interior Point Algorithms for Linear Complementarity Problems, Lecture Notes in Computer Science 538. Springer, Berlin (1991)
Liu, Z., Sun, W.: An infeasible interior-point algorithm with full-Newton step for linear optimization. Numer. Algorithms 46, 173–188 (2007)
Luo, Z.Y., Xiu, N.H.: Path-following interior point algorithms for the Cartesian \(P_*(\kappa )\)-LCP over symmetric cones. Sci. China Ser. A: Math. 52(8), 1769–1784 (2009)
Nesterov, Y.E., Todd, M.J.: Self-scaled barriers and interior-point methods for convex programming. Math. Oper. Res. 22(1), 1–42 (1997)
Roos, C.: A full-Newton step \(O(n)\) infeasible interior-point algorithm for linear optimization. SIAM J. Optim. 16(4), 1110–1136 (2006)
Roos, C.: An improved and simplified full-Newton step \(O(n)\) infeasible interior-point method for linear optimization. SIAM J. Optim. 25(1), 102–114 (2015)
Roos, C., Terlaky, T., Vial, J.-P.H.: Theory and Algorithms for Linear Optimization. An Interior-Point Approach. Wiley, Chichester (1997)
Schmieta, S.H., Alizadeh, F.: Extension of primal-dual interior-point algorithm to symmetric cones. Math. Program. 96(3), 409–438 (2003)
Vieira, M.V.C.: Jordan algebraic approach to symmetric optimization. Ph.D. thesis, Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, The Netherlands (2007)
Wang, G.Q., Bai, Y.Q.: A class of polynomial interior-point algorithms for the Cartesian \(P\)-Matrix linear complementarity problem over symmetric cones. J. Optim. Theory Appl. 152(3), 739–772 (2012)
Wang, G.Q., Kong, L.C., Tao, J.Y., Lesaja, G.: Improved complexity analysis of full Nesterov–Todd step feasible interior-point method for symmetric optimization. J. Optim. Theory Appl. doi:10.1007/s10957-014-0696-2
Wang, G.Q., Lesaja, G.: Full Nesterov–Todd step feasible interior-point method for the Cartesian \(P_*(\kappa )\)-SCLCP. Optim. Methods Softw. 28(3), 600–618 (2013)
Wang, G.Q., Yu, C.J., Teo, K.L.: A new full Nesterov–Todd step feasible interior-point method for convex quadratic symmetric cone optimization. Appl. Math. Comput. 221, 329–343 (2013)
Zhang, L., Sun, L., Xu, Y.: Simplified analysis for full-Newton step infeasible interior-point algorithm for semidefinite programming. Optimization 62(2), 169–191 (2013)
Acknowledgments
The author would like to thank the anonymous referees and editors for their useful comments, which helped to improve the presentation of this paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kheirfam, B. A full step infeasible interior-point method for Cartesian \(P_{*}(\kappa )\)-SCLCP. Optim Lett 10, 591–603 (2016). https://doi.org/10.1007/s11590-015-0884-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11590-015-0884-5
Keywords
- Cartesian \(P_*(\kappa )\) linear complementarity problem
- Infeasible interior-point method
- Polynomial complexity