<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Primal-Dual Method for Searching Equilibrium in Hierarchical Congestion Population Games</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Pavel Dvurechensky</string-name>
          <email>pavel.dvurechensky@wias-berlin.de</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexander Gasnikov</string-name>
          <email>gasnikov@yandex.ru</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Evgenia Gasnikova</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergey Matsievsky</string-name>
          <email>matsievsky@newmail.ru</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anton Rodomanov</string-name>
          <email>anton.rodomanov@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Inna Usik</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Higher School of Economics National Research University</institution>
          ,
          <addr-line>Moscow 125319</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Immanuel Kant Baltic Federal University</institution>
          ,
          <addr-line>Kaliningrad 236041</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Institute for Information Transmission Problems</institution>
          ,
          <addr-line>Moscow 127051</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Moscow Institute of Physics and Technology</institution>
          ,
          <addr-line>Dolgoprudnyi 141700, Moscow Oblast</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Weierstrass Institute for Applied Analysis and Stochastics</institution>
          ,
          <addr-line>Berlin 10117</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>584</fpage>
      <lpage>595</lpage>
      <abstract>
        <p>In this paper, we consider a large class of hierarchical congestion population games. One can show that the equilibrium in a game of such type can be described as a minimum point in a properly constructed multi-level convex optimization problem. We propose a fast primal-dual composite gradient method and apply it to the problem, which is dual to the problem describing the equilibrium in the considered class of games. We prove that this method allows to nd an approximate solution of the initial problem without increasing the complexity.</p>
      </abstract>
      <kwd-group>
        <kwd>convex optimization</kwd>
        <kwd>algorithm complexity</kwd>
        <kwd>dual problem</kwd>
        <kwd>primal-dual method</kwd>
        <kwd>logit dynamics</kwd>
        <kwd>multistage model of traffic ows</kwd>
        <kwd>entropy</kwd>
        <kwd>equilibrium</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>In this subsection, we brie y describe a variational principle for equilibrium
description in hierarchical congestion population games. In particular, we consider
a multistage model of traffic ows. Further details can be found in [1].</p>
      <p>We consider the traffic network described by the directed graph 1 = ⟨V 1; E1⟩.
Some of its vertices O1 V 1 are sources (origins), and some are sinks
(destinations) D1 V 1. We denote a set of source-sink pairs by OD1 O1 D1. Let
us assume that for each pair w1 2 OD1 there is a ow of network users of the
amount of d1w1 := d1w1 M , where M ≫ 1, per unit time who moves from the
origin of w1 to its destination. We call the pair w1; d1w1 as correspondence.</p>
      <p>Let edges 1 be partitioned into two types E1 = E~1 ⨿E1. The edges of
type E~1 are characterized by non-decreasing functions of expenses e11 (fe11 ) :=
e11 (fe11 =M ). Expenses e11 (fe11 ) are incurred by those users who use in their path
an edge e1 2 E~1, the ow of users on this edge being equal to fe11 . The pairs
of vertices setting the edges of type E1 are in turn a source-sink pairs OD2
(with correspondences d2w2 = fe11 , w2 = e1 2 E1) in a traffic network of the
second level 2 = ⟨V 2; E2⟩whose edges are partitioned in turn into two types
E2 = E~2 ⨿E2. The edges having type E~2 are characterized by non-decreasing
functions of expenses e22 (fe22 ) := e22 (fe22 =M ). Expenses e22 (fe22 ) are incurred by
those users who use in their path an edge e2 2 E~2, the ow of users on this edge
being equal to fe22 .</p>
      <p>The pairs of vertices setting the edges having type E2 are in turn source-sink
pairs OD3 (with correspondences d3w3 = fe22 , w3 = e2 2 E2) in a traffic network
of a higher level 3 = ⟨V 3; E3⟩, etc. We assume that in total there are m levels:
E~m = Em. Usually, in applications, the number m is small and varies from 2 to
10.</p>
      <p>Let Pw11 be the set of all paths in 1 which correspond to a correspondence
w1. Each user in the graph 1 chooses a path p1w1 2 Pw11 (a consecutive set of
the edges passed by the user) corresponding to his correspondence w1 2 OD1.
Having de ned a path p1w1 , it is possible to restore unambiguously the edges
having type E1 which belong to this path. On each of these edges w2 2 E1,
user can choose a path pw2 2 Pw22 (Pw22 is a set of all paths corresponding in
2
the graph 2 to the correspondence w2), etc. Let us assume that each user have
made the choice.</p>
      <p>We denote by x1p1 the size of the ow of users on a path p1 2 P 1 =
w12⨿OD1 Pw11 , x2p2 the size of the ow of users on a path p2 2 P 2 = w22⨿OD2 Pw22 ,
etc. Let us notice that</p>
      <p>k
xpkwk
and that
0; pwk 2 Pwkk ;
k</p>
      <p>∑
pkwk 2Pwkk
xpkwk = dkwk ; wk 2 ODk; k = 1; :::; m</p>
      <p>k
wk+1 (= ek)2 ODk+1 (= Ek); dkw+k+11 = fekk ; k = 1; :::; m
1:</p>
      <p>For all k = 1; :::; m, we introduce for the graph
a matrix
k =
ekpk ek2Ek;pk2P k ;
ekpk =</p>
      <p>k and the set of paths P k
{ 1; ek 2 pk
0; ek 2= pk :
Then, for all k = 1; :::; m, the vector f k of ows on the edges of thegraph
de ned in a unique way by the vector of ows on the paths xk = {xpkk }pk2P k :
k is
f k =
kxk:
We introduce the following notation
x = {xk}m k=1 ;
k=1 ; f = {f k}m
= diag { k}m
k=1 :</p>
      <p>Let us now describe the probabilistic model for the choice of the path by
a network user. We assume that each user l of a traffic network who uses a
correspondence wk 2 ODk at a level k (and simultaniously the edge ek 1(=
wk) 2 Ek 1 at the level k 1) chooses to use a path pk 2 Pwkk if
pk = arg qkm2aPxwkk f gqkk (t) + qkk;lg;
where qkk;l are iid random variables with double exponential distribution (also
known as Gumbel's distribution) with cumulative distribution function
where E
0:5772 is Euler{Mascheroni constant. In this case</p>
      <p>P ( qkk;l &lt; ) = expf e
= k E ;</p>
      <p>g
M [ qkk;l] = 0;</p>
      <p>D[ qkk;l] = ( k)2 2=6:
Also, it turns out that, when the number of agents on each correspondence
wk 2 ODk, k = 1; :::; m tends to in nity, i. e. M ! 1, the limiting distribution
of users among paths is the Gibbs's distribution (also known as logit distribution)
xpkk = dwk
k</p>
      <p>
        ∑
exp( gpk~k (t)= k) ; pk 2 Pwkk ; wk 2 ODk; k = 1; :::; m:
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
It is worth noting here that (see Theorem 1 below)
k wkk (t= k) = Mf pkk gpk2Pwkk pkm2aPxwkk f gpkk (t) + pkk g]:
      </p>
      <p>[
For the sake of convenience we introduce the graph</p>
      <p>m
= ⨿
k=1</p>
      <p>⟨
k =</p>
      <p>V; E =
m
⨿ E~k
k=1
⟩
and denote te = e(fe), e 2 E.</p>
      <p>
        Assume that, for a given vector of expenses t on edges E, which is identical
to all users, each user chooses the shortest path at each level based on noisy
information and averaging of the information from the higher levels. Then, in
the limit number of users tending to in nity, such behavior of users leads to
the description of distribution of users on paths/edges given in (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) and the
equilibrium con guration in the system is characterized by the vector t for which
the vector x, obtained from (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), leads to the vector f = x satisfying t =
f e(fe)ge2E .
      </p>
      <p>Theorem 1 (Variational principle). The described above xed point
equilibrium t can be found as a solution of the following problem (here and below we
denote by dom the effective domain of the function conjugated to a function
)
mf;ixnf (x; f ) : f =
x; x 2 Xg =</p>
      <p>
        min
t2dom
{ 1 1(t= 1) + ∑ e (te)}; (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
1(x) = ∑
dwmm = fwmm 1;
}
fe
∫
0
{
e (te) = max fete
fe
      </p>
      <p>}
e(z)dz ;
e(z)dz</p>
      <p>= fe : te = e(fe); e 2 E;
empm tem =</p>
      <p>empm tem ;
∑
em2Em
d e (te) = d
dte</p>
      <p>{
max fete
dte fe
∑
ek2E~k
gpmm (t) =
ekpk tek
fe
∫
0
∑
em2E~m
∑
ek2Ek
pk2Pwkk
1(t) =
gpkk (t) =
ekpk k+1 ekk+1(t= k+1); k = 1; :::; m
1;
wkk (t) = ln
( ∑ exp( gpkk (t))); k = 1; :::; m;</p>
      <p>∑
In this subsection, we describe one of our contributions made by this paper,
namely a general accelerated primal-dual gradient method for composite
minimization problems.</p>
      <p>
        We consider the following convex composite optimization problem [3]:
min [ϕ(x) := f (x) + (x)]:
x2Q
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
      </p>
      <p>Here Q E is a closed convex set, the function f is differentiable and convex
on Q, and function is closed and convex on Q (not necessarily differentiable).</p>
      <p>In what follows we assume that f is Lf -smooth on Q:
∥∇f (x)
∇f (y)∥</p>
      <p>Lf ∥x
y∥ ;
8x; y 2 Q:
We stress that the constant Lf &gt; 0 arises only in theoretical analysis and not in
the actual implementation of the proposed method. Moreover, we assume that
the set Q is unbounded and that Lf can be unbounded on the set Q.</p>
      <p>The space E is endowed with a norm ∥ ∥ (which can be arbitrary). The
corresponding dual norm is ∥g∥ := maxx2Ef⟨g; x⟩ : ∥x∥ 1g; g 2 E . For
mirror descent, we need to introduce the Bregman divergence. Let ! : Q ! R
be a distance generating function, i.e. a 1-strongly convex function on Q in the
∥ ∥-norm:
!(y)
!(x) + ⟨!′(w); y</p>
      <p>1
x⟩ + 2 ∥y
x∥2 ;
8x; y 2 Q:
Then, the corresponding Bregman divergence is de ned as</p>
      <p>Vx(y) := !(y)
!(x)
⟨!′(x); y
x⟩;
x; y 2 Q:</p>
      <p>Finally, we generalize the Grad and Mirr operators from [2] to composite
functions:</p>
      <p>{
GradL(x) := argmin ⟨∇f (x); y
y2Q</p>
      <p>{
Mirrz (g) := argmin ⟨g; y
y2Q
z⟩ +</p>
      <p>L
x⟩ + 2 ∥y
1</p>
      <p>}
Vz(y) + (y) ;</p>
      <p>
        }
x∥2 + (y) ; x 2 Q;
g 2 E ; z 2 Q:
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
2.1
      </p>
      <p>Algorithm description
Below is the proposed scheme of the new method. The main differences between
this algorithm and the algorithm of [2] are as follows: 1) now the Grad and Mirr
operators contain the (y) term inside; 2) now the algorithm does not require
the actual Lipschitz constant Lf , instead it requires an arbitrary number L01
and automatically adapts the Lipschitz constant in iterations; 3) now we need
to use a different formula for k+1 to guarantee convergence (see next section).</p>
      <p>Note that Algorihtm 1 if well-de ned in the sense that it is always guaranteed
that k 2 [0; 1] and, hence, xk+1 2 Q as a convex combination of points from Q.
Indeed, from the formula for k+1 we have
therefore k =
k+1Lk+1
1
k+1Lk+1
1.</p>
      <p>(√</p>
      <p>1
4L2k+1
+</p>
      <p>1 )
2Lk+1</p>
      <p>
        Lk+1 = 1;
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
1 The number L0 can be always set to 1 with virtually no harm to the convergence
rate of the method.
break
      </p>
      <p>Lk+1 2Lk+1
end while
zk+1 Mirrzkk+1 (∇f (xk+1))
end for</p>
      <p>return yT
Therefore
k+1⟨∇f (xk+1); zk</p>
      <p>u⟩
= k+1⟨∇f (xk+1); zk</p>
      <p>k+1⟨∇f (xk+1); zk
+ k+1⟨ ′(zk+1); u</p>
      <p>zk+1⟩
( k+1⟨∇f (xk+1); zk
zk+1⟩</p>
      <p>
        k+1 (zk+1))
+ ⟨Vz′k (zk+1); u
zk+1⟩ + k+1 (u);
zk+1⟩ + k+1⟨∇f (xk+1); zk+1
zk+1⟩ + ⟨Vz′k (zk+1); u
zk+1⟩
u⟩
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
where the second inequality follows from the convexity of .
      </p>
      <p>Using the triangle equality of the Bregman divergence,
⟨Vx′(y); u
y⟩ = Vx(u)</p>
      <p>
        Vy(u)
we get
⟨Vz′k (zk+1); u zk+1⟩ = Vzk (u) Vzk+1(u) Vzk (zk+1)
1
Vzk (u) Vzk+1(u) 2 ∥zk+1 zk∥2 ;
(
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
where we have used Vzk (zk+1)
      </p>
      <p>So we have</p>
      <p>12 ∥zk+1 zk∥2 in the last inequality.
k+1⟨∇f (xk+1); zk
(</p>
      <p>
        u⟩
+ ( k2+1Lk+1
ϕ(xk+1) ϕ(yk+1)
(xk+1):
(
        <xref ref-type="bibr" rid="ref14">14</xref>
        )
(15)
(16)
(17)
      </p>
      <p>⊔⊓
(19)
(20)
(21)
⊔⊓
Lemma 2. For any u 2 Q and k =
Now we apply Lemma 1 to bound the last term, group the terms and get
k+1( (xk+1)
(u)) + k+1⟨∇f (xk+1); xk+1 u
⟩
k+1ϕ(xk+1) ( k2+1Lk+1)ϕ(yk+1)</p>
      <p>Now we are ready to prove the convergence theorem for Algorithm 1.</p>
      <p>Theorem 2. For the sequence fykgk 0 in Algorithm 1 we have
( T2 LT )ϕ(yT )</p>
      <p>k=1
{ T
min ∑ k (f (xk) + ⟨∇f (xk); u
x2Q
and, hence, the following rate of convergence:
xk⟩ + (u)) + Vz0 (u)
Proof. Note that the special choice of f kgk 0 in Algorithm 1 gives us
ϕ(yT )
ϕ(x )
4Lf R2</p>
      <p>T 2</p>
      <p>:
2
k+1Lk+1
k+1 = k2Lk;
k
0:
}
(22)
(23)
(24)
}
(26)
(27)
(28)
Therefore, taking the sum over k = 0; : : : ; T
VzT (u) 0 we get, for any u 2 Q,
( T2 LT )ϕ(yT )</p>
      <p>T
∑ k (f (xk) + ⟨∇f (xk); u
k=1
1 in (19) and using that 0 = 0,
xk⟩ + (u)) + Vz0 (u)
(25)
and (22) is straightforward. At the same time, using the convexity of f (x), the
de nition of ϕ(x), and u = x = argminx2Q ϕ(x), we obtain
( T2 LT )ϕ(yT )</p>
      <p>k=1
{ T
min ∑ k (f (xk) + ⟨∇f (xk); u
x2Q
( T )
∑ k ϕ(x ) + Vz0 (x ):
k=1
From (24) it follows that ∑kT=1 k = T2 LT , so
xk⟩ + (u)) + Vz0 (u)
ϕ(yT )
ϕ(x ) +</p>
      <p>Vz0 (x ):
Now it remains to estimate the rate of growth of coefficients Ak :=
this we use the technique from [3]. Note that from (24) we have
k2Lk. For
Ak+1</p>
      <p>Ak =
1
T2 LT
√ Ak+1</p>
      <p>Lk+1
Rearranging and using (a + b)2
2a2 + 2b2 and Ak</p>
      <p>Ak+1, we get
Ak+1 = Lk+1(Ak+1</p>
      <p>Ak)2 = Lk+1 (√Ak+1 +
p</p>
      <p>Ak)2 (√Ak+1
p</p>
      <p>Ak
)2
4Lk+1Ak+1 (√Ak+1
p</p>
      <p>Ak</p>
      <p>)2
From this it follows that</p>
      <p>
        k
1 ∑
2
i=0
p
1
Li
:
Note that according to (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) and the stopping criterion for choosing Lk+1 in
Algorithm (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), we always have Li
      </p>
      <p>2Lf . Hence,
√Ak+1
k + 1
2√2Lf
()</p>
      <p>Ak+1
(k + 1)2
8Lf
:
Thus, combining (31) and (27) with Vz0 (x ) =: R22 , we have proved (23).</p>
      <p>Using the same arguments to [3], it is also possible to prove that the average
number of evaluations of the function f per iteration in Algorithm 1 equals 4.
Theorem 3. Let Nk be the total number of evaluations of the function f in
Algorithm 1 after the rst k iterations. Then for any k
0 we have
Nk
4(k + 1) + 2 log2 L0</p>
      <p>:
Lf
3</p>
      <p>
        Application to the Equilibrium Problem
In this section, we apply Algorithm 1 to solve the dual problem in (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
min
t2dom
{ 1 1(t= 1) +
∑
e2E
e (te) :
}
with t in the role of x, 1 1(t= 1) in the role of f (x), and
of (x).
∑
e2E
e (te) in the role
      </p>
      <p>The inequality (22) leads to the fact that Algorithm 1 is primal-dual [6{9],
which means that the sequences ftig (which is in the role of fxkg) and ft~ig (which
is in the role of fykg) generated by this method have the following property:
(30)
(31)</p>
      <p>⊔⊓
(32)
min
t2dom
{
1</p>
      <p>T
1 1(t~T = 1) +
∑
e2E</p>
      <p>e (t~eT )
∑ [ i( 1 1(ti= 1) + ⟨∇
1(ti= 1); t
ti⟩)] +
∑
e2E
e (te)
}
(33)
where
4L2R22</p>
      <p>T 2</p>
      <p>;
k
)</p>
      <p>∑
with lw1 being the total number of edges (among all of the levels) in the longest
path for correspondence w1,
R22 = maxfR~22; R^22g;</p>
      <p>R~22 = (1=2) ∥t
4L2R22</p>
      <p>T 2</p>
      <p>;
where
xpkk;i = dwk
k
∑ exp( gpk~k (ti)= k) ;
xi = {xpkk;i}k=1;:::;m</p>
      <p>pk2Pwkk ;wk2ODk ;
pk 2 Pwkk ;
wk 2 ODk;
k = 1; :::; m;
f T =</p>
      <p>
        Theorem 2 provides the bound for the number of iterations in order to solve
the problem (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) with given accuracy. Nevertheless, on each iteration it is
necessary to calculate ∇ 1(t= 1) and also 1(t= 1). Similarly to [9{11] it is possible to
show, using the smoothed version of Bellman{Ford method, that for this purpose
it is enough to perform O(jO1jjEj w1m2aOxD1 lw1 ) arithmetic operations.
      </p>
      <p>In general, it is worth noting that the approach of adding some arti cial
vertices, edges, sources, sinks is very useful in different applications [12{14].</p>
      <p>Acknowledgements. The research was supported by RFBR, research project
No. 15-31-70001 mol a mos and No. 15-31-20571 mol a ved.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Gasnikov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gasnikova</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matsievsky</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Usik</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Searching of equilibriums in hierarchical congestion population games</article-title>
          .
          <source>Trudy MIPT</source>
          .
          <volume>28</volume>
          ,
          <issue>129</issue>
          {
          <fpage>142</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Allen-Zhu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Orecchia</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <article-title>Linear coupling: An ultimate uni cation of gradient and mirror descent</article-title>
          .
          <source>ArXiV preprint:1407.1537v4</source>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Nesterov</surname>
          </string-name>
          , Yu.:
          <article-title>Gradient methods for minimizing composite functions</article-title>
          .
          <source>Math. Prog</source>
          .
          <volume>140</volume>
          ,
          <issue>125</issue>
          {
          <fpage>161</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Nesterov</surname>
          </string-name>
          , Yu.,
          <string-name>
            <surname>Nemirovski</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>On rst order algorithms for l1/nuclear norm minimization</article-title>
          .
          <source>Acta Numerica</source>
          .
          <volume>22</volume>
          ,
          <issue>509</issue>
          {
          <fpage>575</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Nesterov</surname>
          </string-name>
          , Yu.:
          <article-title>Universal gradient methods for convex optimization problems</article-title>
          .
          <source>CORE Discussion Paper</source>
          <year>2013</year>
          /63 (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Nesterov</surname>
          </string-name>
          , Yu.:
          <article-title>Primal-dual subgradient methods for convex problems</article-title>
          .
          <source>Math. Program. Ser. B</source>
          .
          <volume>120</volume>
          ,
          <issue>261</issue>
          {
          <fpage>283</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Nemirovski</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Onn</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rothblum</surname>
          </string-name>
          , U. G.:
          <article-title>Accuracy certi cates for computational problems with convex structure</article-title>
          .
          <source>Mathematics of Operation Research</source>
          .
          <volume>35</volume>
          ,
          <issue>52</issue>
          {
          <fpage>78</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Gasnikov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dvurechensky</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kamzolov</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nesterov</surname>
            ,
            <given-names>Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Spokoiny</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stetsyuk</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Suvorikova</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chernov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Searching for equilibriums in multistage transport models</article-title>
          .
          <source>Trudy MIPT</source>
          .
          <volume>28</volume>
          ,
          <issue>143</issue>
          {
          <fpage>155</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Gasnikov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gasnikova</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dvurechensky</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ershov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lagunovskaya</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Search for the stochastic equilibria in the transport models of equilibrium ow distribution</article-title>
          .
          <source>Trudy MIPT</source>
          .
          <volume>28</volume>
          ,
          <issue>114</issue>
          {
          <fpage>128</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. Ed. Gasnikov,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>Introduction to mathematical modelling of traffic ows</article-title>
          .
          <source>MCCME</source>
          ,
          <string-name>
            <surname>Moscow</surname>
          </string-name>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Nesterov</surname>
          </string-name>
          , Yu.:
          <article-title>Characteristic functions of directed graphs and applications to stochastic equilibrium problems</article-title>
          . Optim. Engineering.
          <volume>8</volume>
          ,
          <issue>193</issue>
          {
          <fpage>214</fpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Gasnikov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>About reduction of searching competetive equillibrium to the minimax problem in application to different network problems</article-title>
          . Math. Mod.
          <volume>27</volume>
          ,
          <issue>121</issue>
          {
          <fpage>136</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Babicheva</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gasnikov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lagunovskaya</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mendel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Two-stage model of equilibrium distributions of traffic ows</article-title>
          .
          <source>Trudy MIPT</source>
          .
          <volume>27</volume>
          ,
          <issue>31</issue>
          {
          <fpage>41</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Vaschenko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gasnikov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Molchanov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pospelova</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shananin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Analysis of tariff policy of a railway cargo transportation</article-title>
          .
          <source>Preprint of CCAS RAS</source>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>