{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T21:22:41Z","timestamp":1711660961060},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T00:00:00Z","timestamp":1650240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T00:00:00Z","timestamp":1650240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Math. Prog. Comp."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s12532-022-00220-6","type":"journal-article","created":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T15:37:55Z","timestamp":1650296275000},"page":"593-622","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Allocation of fungible resources via a fast, scalable price discovery method"],"prefix":"10.1007","volume":"14","author":[{"given":"Akshay","family":"Agrawal","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Deepak","family":"Narayanan","sequence":"additional","affiliation":[]},{"given":"Fiodar","family":"Kazhamiaka","sequence":"additional","affiliation":[]},{"given":"Matei","family":"Zaharia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,18]]},"reference":[{"key":"220_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, A., Ali, A., Boyd, S.: Minimum-distortion embedding. arXiv (2021)","DOI":"10.1561\/9781680838893"},{"key":"220_CR2","unstructured":"Agrawal, A., Amos, B., Barratt, S., Boyd, S., Diamond, S., Kolter, J.Z.: Differentiable convex optimization layers. In: Advances in Neural Information Processing Systems, pp. 9558\u20139570 (2019)"},{"issue":"1","key":"220_CR3","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1080\/23307706.2017.1397554","volume":"5","author":"A Agrawal","year":"2018","unstructured":"Agrawal, A., Verschueren, R., Diamond, S., Boyd, S.: A rewriting system for convex optimization problems. J. Control Decis. 5(1), 42\u201360 (2018)","journal-title":"J. Control Decis."},{"key":"220_CR4","unstructured":"ApS, M.: MOSEK optimization suite. http:\/\/docs.mosek.com\/9.2\/intro.pdf (2021)"},{"key":"220_CR5","volume-title":"Essays in the Theory of Risk-Bearing","author":"K Arrow","year":"1971","unstructured":"Arrow, K.: Essays in the Theory of Risk-Bearing. Markham Publishing Company, Markham (1971)"},{"key":"220_CR6","doi-asserted-by":"crossref","unstructured":"Banjac, G., Stellato, B., Moehle, N., Goulart, P., Bemporad, A., Boyd, S.: Embedded code generation using the OSQP solver. In: IEEE Conference on Decision and Control (2017)","DOI":"10.1109\/CDC.2017.8263928"},{"key":"220_CR7","volume-title":"Nonlinear Programming","author":"D Bertsekas","year":"1999","unstructured":"Bertsekas, D.: Nonlinear Programming. Athena Scientific, Belmont (1999)"},{"key":"220_CR8","volume-title":"Data Networks","author":"D Bertsekas","year":"1992","unstructured":"Bertsekas, D., Gallager, R., Humblet, P.: Data Networks, vol. 2. Prentice-Hall, Hoboken (1992)"},{"key":"220_CR9","volume-title":"Introduction to Linear Optimization","author":"D Bertsimas","year":"1997","unstructured":"Bertsimas, D., Tsitsiklis, J.: Introduction to Linear Optimization. Athena Scientific, Belmont (1997)"},{"key":"220_CR10","unstructured":"Bird, S., Smith, B.: PACORA: Performance aware convex optimization for resource allocation. In: Proceedings of the 3rd USENIX Workshop on Hot Topics in Parallelism (2011)"},{"key":"220_CR11","unstructured":"Blackmore, L.: Autonomous precision landing of space rockets. The BRIDGE 26(4) (2016)"},{"key":"220_CR12","doi-asserted-by":"crossref","unstructured":"Bohn, R., Caramanis, M., Schweppe, F.: Optimal pricing in electrical networks over space and time. RAND J. Econ. pp. 360\u2013376 (1984)","DOI":"10.2307\/2555444"},{"key":"220_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optimization","author":"S Boyd","year":"2004","unstructured":"Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, New York (2004)"},{"key":"220_CR14","unstructured":"Boyd, S., Xiao, L., Mutapcic, A.: Subgradient methods (2003). Lecture notes for the course Convex Optimization II"},{"key":"220_CR15","unstructured":"Boyd, S., Xiao, L., Mutapcic, A., Mattingley, J.: Notes on decomposition methods (2007). Lecture notes for the course Convex Optimization II"},{"issue":"1","key":"220_CR16","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1093\/imamat\/6.1.76","volume":"6","author":"CG Broyden","year":"1970","unstructured":"Broyden, C.G.: The convergence of a class of double-rank minimization algorithms, general considerations. IMA J. Appl. Math. 6(1), 76\u201390 (1970)","journal-title":"IMA J. Appl. Math."},{"issue":"3","key":"220_CR17","doi-asserted-by":"publisher","first-page":"118","DOI":"10.3905\/joi.2016.25.3.118","volume":"25","author":"E Busseti","year":"2016","unstructured":"Busseti, E., Ryu, E., Boyd, S.: Risk-constrained kelly gambling. J. Invest. 25(3), 118\u2013134 (2016)","journal-title":"J. Invest."},{"issue":"1","key":"220_CR18","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/JPROC.2006.887322","volume":"95","author":"M Chiang","year":"2007","unstructured":"Chiang, M., Low, S., Calderbank, A.R., Doyle, J.: Layering as optimization decomposition: a mathematical theory of network architectures. Proc. IEEE 95(1), 255\u2013312 (2007)","journal-title":"Proc. IEEE"},{"key":"220_CR19","doi-asserted-by":"crossref","unstructured":"Chu, E., Parikh, N., Domahidi, A., Boyd, S.: Code generation for embedded second-order cone programming. In: European Control Conference, pp. 1547\u20131552. IEEE (2013)","DOI":"10.23919\/ECC.2013.6669712"},{"issue":"1","key":"220_CR20","first-page":"2909","volume":"17","author":"S Diamond","year":"2016","unstructured":"Diamond, S., Boyd, S.: CVXPY: a python-embedded modeling language for convex optimization. J. Mach. Learn. Res. 17(1), 2909\u20132913 (2016)","journal-title":"J. Mach. Learn. Res."},{"key":"220_CR21","doi-asserted-by":"crossref","unstructured":"Domahidi, A., Chu, E., Boyd, S.: ECOS: An SOCP solver for embedded systems. In: European Control Conference, pp. 3071\u20133076. IEEE (2013)","DOI":"10.23919\/ECC.2013.6669541"},{"key":"220_CR22","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvcm4j15","volume-title":"Economic and Financial Decisions under Risk","author":"L Eeckhoudt","year":"2011","unstructured":"Eeckhoudt, L., Gollier, C., Schlesinger, H.: Economic and Financial Decisions under Risk. Princeton University Press, Princeton (2011)"},{"issue":"2","key":"220_CR23","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/TPWRS.2006.873121","volume":"21","author":"EC Finardi","year":"2006","unstructured":"Finardi, E.C., da Silva, E.L.: Solving the hydro unit commitment problem via dual decomposition and sequential quadratic programming. IEEE Trans. Power Syst. 21(2), 835\u2013844 (2006)","journal-title":"IEEE Trans. Power Syst."},{"issue":"3","key":"220_CR24","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1093\/comjnl\/13.3.317","volume":"13","author":"R Fletcher","year":"1970","unstructured":"Fletcher, R.: A new approach to variable metric algorithms. Comput. J. 13(3), 317\u2013322 (1970)","journal-title":"Comput. J."},{"issue":"4","key":"220_CR25","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1086\/256692","volume":"56","author":"M Friedman","year":"1948","unstructured":"Friedman, M., Savage, L.: The utility analysis of choices involving risk. J. Political Econ. 56(4), 279\u2013304 (1948)","journal-title":"J. Political Econ."},{"key":"220_CR26","unstructured":"Ghodsi, A., Zaharia, M., Hindman, B., Konwinski, A., Shenker, S., Stoica, I.: Dominant resource fairness: Fair allocation of multiple resource types. In: 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20), vol.\u00a011, pp. 24\u201324 (2011)"},{"issue":"109","key":"220_CR27","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1090\/S0025-5718-1970-0258249-6","volume":"24","author":"D Goldfarb","year":"1970","unstructured":"Goldfarb, D.: A family of variable-metric methods derived by variational means. Math. Comput. 24(109), 23\u201326 (1970)","journal-title":"Math. Comput."},{"key":"220_CR28","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2622.001.0001","volume-title":"The Economics of Risk and Time","author":"C Gollier","year":"2001","unstructured":"Gollier, C.: The Economics of Risk and Time. MIT Press, Cambridge (2001)"},{"key":"220_CR29","volume-title":"Computer Architecture: A Quantitative Approach","author":"J Hennessy","year":"2011","unstructured":"Hennessy, J., Patterson, D.: Computer Architecture: A Quantitative Approach, 5th edn. Morgan Kaufmann Publishers Inc, Burlington (2011)","edition":"5"},{"key":"220_CR30","doi-asserted-by":"crossref","unstructured":"Hiriart-Urruty, J.B., Lemar\u00e9chal, C.: Convex Analysis and Minimization Algorithms. II, Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], vol. 306. Springer-Verlag, Berlin (1993). Advanced theory and bundle methods","DOI":"10.1007\/978-3-662-06409-2"},{"key":"220_CR31","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.ijepes.2018.01.016","volume":"99","author":"M Hu","year":"2018","unstructured":"Hu, M., Xiao, J.W., Cui, S.C., Wang, Y.W.: Distributed real-time demand response for energy management scheduling in smart grid. Int. J. Electr. Power Energy Syst. 99, 233\u2013245 (2018)","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"220_CR32","doi-asserted-by":"crossref","unstructured":"Kambadur, M., Moseley, T., Hank, R., Kim, M.: Measuring interference between live datacenter applications. In: Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis (SC\u201912), pp. 1\u201312. IEEE (2012)","DOI":"10.1109\/SC.2012.78"},{"issue":"3","key":"220_CR33","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1057\/palgrave.jors.2600523","volume":"49","author":"F Kelly","year":"1998","unstructured":"Kelly, F., Maulloo, A., Tan, D.: Rate control for communication networks: shadow prices, proportional fairness and stability. J. Oper. Res. Soc. 49(3), 237\u2013252 (1998)","journal-title":"J. Oper. Res. Soc."},{"issue":"3","key":"220_CR34","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TIT.1956.1056803","volume":"2","author":"J Kelly Jr","year":"1956","unstructured":"Kelly, J., Jr.: A new interpretation of information rate. IRE Trans. Inf. Theory 2(3), 185\u2013189 (1956)","journal-title":"IRE Trans. Inf. Theory"},{"key":"220_CR35","doi-asserted-by":"crossref","unstructured":"Komodakis, N., Paragios, N., Tziritas, G.: Mrf optimization via dual decomposition: Message-passing revisited. In: 2007 IEEE 11th International Conference on Computer Vision, pp. 1\u20138. IEEE (2007)","DOI":"10.1109\/ICCV.2007.4408890"},{"issue":"1\u20133","key":"220_CR36","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/BF01589116","volume":"45","author":"D Liu","year":"1989","unstructured":"Liu, D., Nocedal, J.: On the limited memory BFGs method for large scale optimization. Math. Programm. 45(1\u20133), 503\u2013528 (1989)","journal-title":"Math. Programm."},{"key":"220_CR37","doi-asserted-by":"publisher","DOI":"10.1142\/7598","volume-title":"The Kelly Capital Growth Investment Criterion: Theory and Practice","author":"L MacLean","year":"2011","unstructured":"MacLean, L., Thorp, E., Ziemba, W.: The Kelly Capital Growth Investment Criterion: Theory and Practice, vol. 3. World Scientific, Singapore (2011)"},{"issue":"1","key":"220_CR38","first-page":"77","volume":"7","author":"H Markowitz","year":"1952","unstructured":"Markowitz, H.: Portfolio selection. J. Finance 7(1), 77\u201391 (1952)","journal-title":"J. Finance"},{"issue":"1","key":"220_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11081-011-9176-9","volume":"13","author":"J Mattingley","year":"2012","unstructured":"Mattingley, J., Boyd, S.: CVXGEN: a code generator for embedded convex optimization. Optim. Eng. 13(1), 1\u201327 (2012)","journal-title":"Optim. Eng."},{"issue":"5","key":"220_CR40","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/90.879343","volume":"8","author":"J Mo","year":"2000","unstructured":"Mo, J., Walrand, J.: Fair end-to-end window-based congestion control. IEEE\/ACM Trans. Netw. 8(5), 556\u2013567 (2000)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"220_CR41","unstructured":"Narayanan, D., Santhanam, K., Kazhamiaka, F., Phanishayee, A., Zaharia, M.: Heterogeneity-aware cluster scheduling policies for deep learning workloads. In: 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20), pp. 481\u2013498 (2020)"},{"issue":"151","key":"220_CR42","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1090\/S0025-5718-1980-0572855-7","volume":"35","author":"J Nocedal","year":"1980","unstructured":"Nocedal, J.: Updating quasi-newton matrices with limited storage. Math Comput. 35(151), 773\u2013782 (1980)","journal-title":"Math Comput."},{"issue":"8","key":"220_CR43","doi-asserted-by":"publisher","first-page":"1439","DOI":"10.1109\/JSAC.2006.879350","volume":"24","author":"DP Palomar","year":"2006","unstructured":"Palomar, D.P., Chiang, M.: A tutorial on decomposition methods for network utility maximization. IEEE J. Select. Areas Commun. 24(8), 1439\u20131451 (2006)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"220_CR44","unstructured":"Paszke, A., Gross, S., Massa, F., Lerer, A., Bradbury, J., Chanan, G., Killeen, T., Lin, Z., Gimelshein, N., Antiga, L., et\u00a0al.: PyTorch: An imperative style, high-performance deep learning library. In: Advances in Neural Information Processing Systems, pp. 8024\u20138035 (2019)"},{"issue":"1\/2","key":"220_CR45","doi-asserted-by":"publisher","first-page":"122","DOI":"10.2307\/1913738","volume":"32","author":"J Pratt","year":"1964","unstructured":"Pratt, J.: Risk aversion in the small and in the large. Econometrica 32(1\/2), 122\u2013136 (1964)","journal-title":"Econometrica"},{"key":"220_CR46","doi-asserted-by":"crossref","unstructured":"Rantzer, A.: Dynamic dual decomposition for distributed control. In: 2009 American Control Conference, pp. 884\u2013888. IEEE (2009)","DOI":"10.1109\/ACC.2009.5160224"},{"key":"220_CR47","doi-asserted-by":"publisher","DOI":"10.1515\/9781400873173","volume-title":"Convex Analysis","author":"R Rockafellar","year":"1970","unstructured":"Rockafellar, R.: Convex Analysis. Princeton University Press, Princeton (1970)"},{"key":"220_CR48","unstructured":"Rostykus, B., Hartman, G.: Predictive cpu isolation of containers at netflix (2019). https:\/\/medium.com\/netflix-techblog\/predictive-cpu-isolation-of-containers-at-netflix-91f014d856c7"},{"issue":"2","key":"220_CR49","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ejor.2008.11.040","volume":"199","author":"P Sch\u00fctz","year":"2009","unstructured":"Sch\u00fctz, P., Tomasgard, A., Ahmed, S.: Supply chain design under uncertainty using sample average approximation and dual decomposition. Eur. J. Oper. Res. 199(2), 409\u2013419 (2009)","journal-title":"Eur. J. Oper. Res."},{"issue":"111","key":"220_CR50","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1090\/S0025-5718-1970-0274029-X","volume":"24","author":"D Shanno","year":"1970","unstructured":"Shanno, D.: Conditioning of quasi-newton methods for function minimization. Math. Comput. 24(111), 647\u2013656 (1970)","journal-title":"Math. Comput."},{"key":"220_CR51","doi-asserted-by":"crossref","unstructured":"Shor, N.: Minimization Methods for Non-Differentiable Functions, Springer Series in Computational Mathematics, vol. 3. Springer-Verlag. Translated from Russian by K. Kiwiel and A, Ruszczy\u0144ski (1985)","DOI":"10.1007\/978-3-642-82118-9"},{"key":"220_CR52","doi-asserted-by":"crossref","unstructured":"Stellato, B., Banjac, G., Goulart, P., Bemporad, A., Boyd, S.: OSQP: An operator splitting solver for quadratic programs. Math. Program. Comput. (2020)","DOI":"10.1007\/s12532-020-00179-2"},{"issue":"2","key":"220_CR53","doi-asserted-by":"publisher","first-page":"65","DOI":"10.2307\/2296205","volume":"25","author":"J Tobin","year":"1958","unstructured":"Tobin, J.: Liquidity preference as behavior towards risk. Rev. Econom. Stud. 25(2), 65\u201386 (1958)","journal-title":"Rev. Econom. Stud."},{"key":"220_CR54","first-page":"364","volume":"364","author":"J Tobin","year":"1965","unstructured":"Tobin, J., et al.: The theory of portfolio selection. Theory Interest Rates 364, 364 (1965)","journal-title":"Theory Interest Rates"},{"key":"220_CR55","doi-asserted-by":"crossref","unstructured":"Verma, A., Pedrosa, L., Korupolu, M., Oppenheimer, D., Tune, E., Wilkes, J.: Large-scale cluster management at google with borg. In: Proceedings of the Tenth European Conference on Computer Systems, pp. 1\u201317 (2015)","DOI":"10.1145\/2741948.2741964"},{"issue":"4","key":"220_CR56","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1109\/TCST.2010.2056371","volume":"19","author":"Y Wang","year":"2010","unstructured":"Wang, Y., Boyd, S.: Fast evaluation of quadratic control-Lyapunov policy. IEEE Trans. Control Syst. Technol. 19(4), 939\u2013946 (2010)","journal-title":"IEEE Trans. Control Syst. Technol."},{"issue":"7","key":"220_CR57","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1109\/TCOMM.2004.831346","volume":"52","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Johansson, M., Boyd, S.P.: Simultaneous routing and resource allocation via dual decomposition. IEEE Trans. Commun. 52(7), 1136\u20131144 (2004)","journal-title":"IEEE Trans. Commun."},{"issue":"7","key":"220_CR58","doi-asserted-by":"publisher","first-page":"1310","DOI":"10.1109\/TCOMM.2006.877962","volume":"54","author":"W Yu","year":"2006","unstructured":"Yu, W., Lui, R.: Dual methods for nonconvex spectrum optimization of multicarrier systems. IEEE Trans. Commun. 54(7), 1310\u20131322 (2006)","journal-title":"IEEE Trans. Commun."},{"key":"220_CR59","unstructured":"Zhang, X., Tune, E., Hagmann, R., Jnagal, R., Gokhale, V., Wilkes, J.: $$CPI^2$$: CPU performance isolation for shared compute clusters. In: Proceedings of the 8th ACM European Conference on Computer Systems, pp. 379\u2013391 (2013)"},{"issue":"4","key":"220_CR60","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/TSTE.2013.2255135","volume":"4","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., Gatsis, N., Giannakis, G.B.: Robust energy management for microgrids with high-penetration renewables. IEEE Trans. Sustain. Energy 4(4), 944\u2013953 (2013)","journal-title":"IEEE Trans. Sustain. Energy"}],"container-title":["Mathematical Programming Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12532-022-00220-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12532-022-00220-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12532-022-00220-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T17:50:03Z","timestamp":1660672203000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12532-022-00220-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,18]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["220"],"URL":"https:\/\/doi.org\/10.1007\/s12532-022-00220-6","relation":{},"ISSN":["1867-2949","1867-2957"],"issn-type":[{"value":"1867-2949","type":"print"},{"value":"1867-2957","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,18]]},"assertion":[{"value":"6 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}