<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Routing Problems in VLSI Design: New Mathematical Models with Practical and Software Implementation</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Oksana</forename><surname>Pichugina</surname></persName>
							<email>oksanapichugina1@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">National Aerospace University &quot;Kharkiv Aviation Institute&quot;</orgName>
								<address>
									<addrLine>17 Chkalova Street</addrLine>
									<postCode>61070</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Olha</forename><surname>Matsyi</surname></persName>
							<email>olga.matsiy@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="department">V. N</orgName>
								<orgName type="institution">Karazin Kharkiv National University</orgName>
								<address>
									<addrLine>4 Svobody Sq</addrLine>
									<postCode>61022</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">International Conference on Computational Linguistics and Intelligent Systems</orgName>
								<address>
									<addrLine>May 12-13</addrLine>
									<postCode>2022</postCode>
									<settlement>Gliwice</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Routing Problems in VLSI Design: New Mathematical Models with Practical and Software Implementation</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">2BCB7086E1D321FADD662070EF687142</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T12:56+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>VLSI design</term>
					<term>routing</term>
					<term>computer chip</term>
					<term>module</term>
					<term>Euclidean combinatorial optimization</term>
					<term>continuous polynomial optimization</term>
					<term>ternary set Olha Matsiy) ORCID: 0000-0002-7099-8967 (Oksana Pichugina); 0000-0002-1350-9418 (Olha Matsiy)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This work is dedicated to the mathematical modelling of routing problems in VLSI design in the form of combinatorial, Euclidean combinatorial and nonlinear continuous optimization problems. The offered Euclidean models are tested on randomly generated samples by nonlinear IPOPT and APOPT optimization solvers implemented in Python.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The process of manufacturing a computer chip includes several stages, each of which is associated with some constraints such as economic, realizability, performance, power, signal integrity, reliability, and yield ones <ref type="bibr" target="#b0">[1]</ref>, <ref type="bibr" target="#b1">[2]</ref>, <ref type="bibr" target="#b2">[3]</ref>, <ref type="bibr" target="#b3">[4]</ref>- <ref type="bibr" target="#b5">[6]</ref>, <ref type="bibr" target="#b6">[7]</ref>. Solving placement, routing, timing, and many other problems are associated with the stages <ref type="bibr" target="#b5">[6]</ref>. For instance, placement and routing problems, where placing modules on a chip is implemented, and a task of routing by connecting these modules into certain networks are considered, arise in economic, realizability, performance, reliability, and yield steps of VLSI design <ref type="bibr" target="#b5">[6]</ref>, <ref type="bibr" target="#b7">[8]</ref>, <ref type="bibr" target="#b8">[9]</ref>, <ref type="bibr" target="#b9">[10]</ref>.</p><p>This paper attacks the actual problem of routing in chip design. Normally, problems of this class are formulated as combinatorial optimization ones aiming to minimize the total length of routes between connected modules. In this case, combinatoriality arises from the natural constraints that the route cannot be arbitrarily laid on the chip, passing along some discrete grid plotted on it <ref type="bibr" target="#b1">[2]</ref>, <ref type="bibr" target="#b2">[3]</ref>, <ref type="bibr" target="#b5">[6]</ref>, <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref>.</p><p>In turn, combinatorial optimization problems exist in two fundamentally different formulationscombinatorial and Euclidean combinatorial <ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref>. In the first case (further combinatorial statements), the problem is formulated as an optimization problem over a combinatorial set, such as a set of permutations, partial permutations, or combinations <ref type="bibr" target="#b13">[14]</ref>, <ref type="bibr" target="#b16">[17]</ref>, <ref type="bibr" target="#b17">[18]</ref>. In the late case (further Euclidean combinatorial statements), the problem is formulated as a discrete optimization problem, that is, an optimization program over a set of vectors in Euclidean space <ref type="bibr" target="#b14">[15]</ref>, <ref type="bibr" target="#b15">[16]</ref>.</p><p>Depending on the formulation chosen, the methods for solving routing problems differ significantly <ref type="bibr" target="#b3">[4]</ref>. These are various approximate and heuristic methods utilizing combinatorial statements, including evolutionary and genetic algorithms <ref type="bibr" target="#b16">[17]</ref>, <ref type="bibr" target="#b19">[20]</ref>, <ref type="bibr" target="#b20">[21]</ref>, which provide a good solution in a reasonable time but does not guarantee its optimality <ref type="bibr" target="#b19">[20]</ref>.</p><p>When a Euclidean combinatorial statement is utilized, it becomes possible to accurately solve routing problems by discrete optimization methods, such as branch-and-bound and the cutting plane techniques <ref type="bibr" target="#b14">[15]</ref>, <ref type="bibr" target="#b17">[18]</ref>. VLSI design is an expensive process that deserves appending time and other machine resources to obtain an accurate solution. That is why the second group of methods is gaining more and more attention <ref type="bibr" target="#b17">[18]</ref>. In this regard, there is also a need in developing new approaches to expanding the class of real-world problems for which Euclidean combinatorial statements are known. Among them is the theory of Euclidean combinatorial configurations <ref type="bibr" target="#b5">[6]</ref>, <ref type="bibr" target="#b14">[15]</ref>, <ref type="bibr" target="#b21">[22]</ref><ref type="bibr" target="#b22">[23]</ref><ref type="bibr" target="#b23">[24]</ref>. There exist combinatorial and continuous Euclidean formulations of real problems. The latter formulate the optimization problem as a classical optimization problem with an objective function and analytic constraints. In this statement, methods of continuous nonlinear, sometimes even convex, programming can be applied to solve the problems under consideration <ref type="bibr" target="#b13">[14]</ref>, <ref type="bibr" target="#b24">[25]</ref>.</p><p>The theory of continuous functional representations (f-representations) of combinatorial sets is a new direction in Euclidean combinatorial optimization intended to construct analytic representations of combinatorial sets embedded in Euclidean space <ref type="bibr" target="#b15">[16]</ref>, <ref type="bibr" target="#b23">[24]</ref>. This research area makes it possible to formulate combinatorial optimization problems, i.e., routing ones, as continuous programs, thus opening a possibility to solve them using previously inaccessible tools on nonlinear continuous optimization <ref type="bibr" target="#b13">[14]</ref>, <ref type="bibr" target="#b24">[25]</ref>. This work is dedicated to the mathematical modelling of routing problems in the three indicated formulationscombinatorial, Euclidean combinatorial and Euclidean continuous, and verifying their validity and comparative analysis of the last two by nonlinear optimization tools implemented in Python.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Problem statement</head><p>We solve the following routing problem arising in chip design <ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref>, <ref type="bibr" target="#b21">[22]</ref>. There is a chip of length n and width m , where n , m are natural numbers. The chip contains modules forming a set of M including modules A and B . It is required to construct the shortest path between A and B , satisfying the following constraints:</p><p>• the path begins and ends at the metal wires' connection points of the modules A and B , while the metal wires' connection points of all the modules are placed at the nodes of the integer lattice:</p><formula xml:id="formula_0">    00 mn 0 m m m P = J J where J = 1,...,m ,J = 0 J ;  </formula><p>• the path can pass only through nodes of the integer lattice;</p><p>• the path is formed from vertical and horizontal segments;</p><p>• the path does not cross the modules</p><formula xml:id="formula_1">  AB M \ A,B = M  .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Mathematical modelling: combinatorial and Euclidean combinatorial formulations</head><p>Let us construct a mathematical model of the problem (further referred to as Model 1).</p><p>In order to define the path, it is sufficient to set its beginning ( )</p><formula xml:id="formula_2">ss A x , y P P, <label>(1)</label></formula><p>where A P is a set of coordinates of the metal wires' connection points of A , as well as ternary vectors:</p><formula xml:id="formula_3">( ) ( )   ii i J i J kk i i k</formula><p>x, y : x = x ; y = y ;</p><p>x , y B = 0, 1,1 ,i J ;</p><formula xml:id="formula_4">   −  (2)</formula><p>k is the maximum route length between A and B .</p><p>In addition, for the route end, it should be:</p><formula xml:id="formula_5">( ) ff B</formula><p>x , y P P, </p><p>where B P is a set of the metal wires' connection points of B Points that form the path AB on the plane are</p><formula xml:id="formula_7">( ) ( ) ( ) ( ) ( ) s s f f 0 0 1 1 k k x , y = x , y , x , y ,..., x , y = x , y ,       where ( ) ( ) ( ) ( ) ( ) ( ) ( ) ss 1 1 0 1 0 1 1 1 ss 2 2 1 2 1 2 f f s s 1 k 1 k</formula><p>x , y = x x , y y = x x , y y ;</p><p>x , y = x x x , y y y ;</p><p>x , y = x x ... x , y y ... y .</p><formula xml:id="formula_8">    + + + +  + + + + + + + + + +</formula><p>On the whole, ( )</p><formula xml:id="formula_9">ii s s 0 i i j j k j=1 j=1 x , y = x x , y y , , i J .   + +     (4)</formula><p>Condition 3) is represented as follows:</p><formula xml:id="formula_10">i i k x y = 0, i J , <label>(5)</label></formula><p>which in conjunction with (2) will guarantee movement toward B only in the vertical and horizontal directions.</p><p>Condition 4) now can be represented as ( )</p><formula xml:id="formula_11">0 i i M k AB x , y P , i J ,   <label>(6)</label></formula><p>where ( ) ii x , y  satisfy the condition (4), where M AB P  is the set of coordinates of points through which the path can be constructed. As a result, we obtain a combinatorial formulation of the problem in the form: find a set of points ( ) ( )</p><formula xml:id="formula_12">ss i i k x , y , x , y ,i J , <label>(7)</label></formula><p>such that ( )</p><formula xml:id="formula_13">k 22 ii i=1 z =</formula><p>x y min +→  <ref type="bibr" target="#b7">(8)</ref> subject to constraints (1)-( <ref type="formula" target="#formula_6">3</ref>), ( <ref type="formula" target="#formula_10">5</ref>), ( <ref type="formula" target="#formula_11">6</ref>), <ref type="bibr" target="#b7">(8)</ref>,</p><formula xml:id="formula_14">( ) ( ) ff kk x , y = x , y , <label>(9)</label></formula><p>where ( )</p><formula xml:id="formula_15">kk</formula><p>x , y  is determined by the formula <ref type="bibr" target="#b5">(6)</ref>.</p><p>The objective function <ref type="bibr" target="#b7">(8)</ref> expresses the route length, and our goal is to minimize it.</p><p>Note that taking into account (2), the condition (5) can be replaced by linear inequality:</p><formula xml:id="formula_16">i i k x y 1, i J . +  <label>(10)</label></formula><p>As a result, a new mathematical model (further referred to as Model 1') of the following form is formed: find the set <ref type="bibr" target="#b6">(7)</ref> that is a solution to the optimization problem (8) under the constraints (1)-( <ref type="formula" target="#formula_6">3</ref>), ( <ref type="formula" target="#formula_11">6</ref>)- <ref type="bibr" target="#b8">(9)</ref>.</p><p>From this combinatorial formulation, let us move to the construction of its Euclidean combinatorial formulation allowing its solution by means of partial integer nonlinear programming <ref type="bibr" target="#b24">[25]</ref>, <ref type="bibr" target="#b25">[26]</ref><ref type="bibr" target="#b26">[27]</ref><ref type="bibr" target="#b27">[28]</ref>.</p><p>We start with an analytic formalization of the condition (1) and represent it as follows:</p><formula xml:id="formula_17">( ) ( ) ( ) ( ) 22 ss x ,y A x x y y = 0.  − + − <label>(11)</label></formula><p>The expression in parentheses is (11) is satisfied, then (1) holds and vice versa. Condition (3) can be represented analytically in a similar way:</p><formula xml:id="formula_18">0 if and only if ( ) ( ) ss x , y = x, y A  . Respectively, if</formula><formula xml:id="formula_19">( ) ( ) ( ) ( ) 22 ff x ,y B x x y y = 0.  − + − <label>(12)</label></formula><p>Finally, the expression ( <ref type="formula" target="#formula_11">6</ref>) is rewritten as follows:</p><formula xml:id="formula_20">( ) ( ) ( ) ( ) 22 ii x ,y M AB '0 i i k x x y y = 0, 0 x n,0 y n,i J .    − + −       <label>(13)</label></formula><p>As a result, we get a mathematical model of our problem of the form ( <ref type="formula">2</ref>), ( <ref type="formula">4</ref>)-( <ref type="formula" target="#formula_14">9</ref>), ( <ref type="formula" target="#formula_17">11</ref>)-( <ref type="formula" target="#formula_20">13</ref>) (further referred to as Model 2). Similarly to Model 1', Model 2' is formed from Model 2 by replacing condition <ref type="bibr" target="#b4">(5)</ref> with the inequality <ref type="bibr" target="#b9">(10)</ref>, that is the problem (2), ( <ref type="formula">4</ref>),( <ref type="formula" target="#formula_11">6</ref>)-(13). Models 2, 2.1 are, in fact, polynomial partial integer programming problems, to which the corresponding nonlinear optimization methods are applicable, <ref type="bibr" target="#b13">[14]</ref>, <ref type="bibr" target="#b23">[24]</ref>, <ref type="bibr" target="#b24">[25]</ref>, <ref type="bibr" target="#b27">[28]</ref>, <ref type="bibr" target="#b28">[29]</ref>.</p><p>Finally, these models can be easily transferred into a continuous nonlinear optimization problem by replacing condition (2) with the following expressions:</p><formula xml:id="formula_21">( )( ) ( )( ) i i i i i i k x x 1 x 1 = 0, y y 1 y 1 = 0,i J , − + − + </formula><p>which simplification results in:</p><formula xml:id="formula_22">33 i i i i k x x = 0, y y = 0,i J . − − <label>(14)</label></formula><p>Model 3this will be a problem ( <ref type="formula">4</ref>)-( <ref type="formula" target="#formula_14">9</ref>), ( <ref type="formula" target="#formula_17">11</ref>)-( <ref type="formula" target="#formula_22">14</ref>), Model 3'this will be a problem ( <ref type="formula">4</ref>), ( <ref type="formula" target="#formula_11">6</ref>)-( <ref type="formula" target="#formula_22">14</ref>).</p><p>Let us generalize the designed mathematical models to the case if the modules A and B as well as other pairs of modules need pairwise interconnection, while our task is to find the shortest total path connecting the modules. In this case, in addition to the above Constraints 1-4, the condition of nonintersection of the connection paths (further referred to as Condition 5) need to be added.</p><p>We add an index L lJ  to the model to reflect the order number of a pair of connected modules.</p><p>As a result, we have a generalization of Model 1 (further referred to as Model 1.1).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Let</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•   ll lJ L</head><p>A ,B  be pairs of connected modules,</p><formula xml:id="formula_23">  l l L A ll M = M \ A ,B ,l J B   ,</formula><p>• </p><formula xml:id="formula_24">ll i i k L x , y B ,i J ,l J ;     (<label>19</label></formula><formula xml:id="formula_25">)</formula><formula xml:id="formula_26">ll i i k L x y = 0, i J ,l J ;  (20) ( ) 'il 'il kL M A ll x , y P ,i J ,l J ; ' B   <label>(21)</label></formula><formula xml:id="formula_27">l l L D D = ,l l ,l,l J ,     <label>(22)</label></formula><p>where</p><formula xml:id="formula_28">L lJ  ( ) ( ) fl fl 'il 'il kk x , y = x , y ; (23) ( ) ii 'il 'il sl l sl l j j k j=1 j=1 x , y = x x , y y , i J ;  + +     (24) ( )   il il l i i iJ k1 D = x , y .  −<label>(25)</label></formula><p>Here, l D expresses the set of way-nodes between l A and l B , excluding its starting and ending points.</p><p>Let us proceed to the formation of a generalization of Model 2 to the case of connecting several modules. It is required to find a set <ref type="bibr" target="#b14">(15)</ref>, such that the minimum function ( <ref type="formula">16</ref>) is attained and the constraints <ref type="bibr" target="#b18">(19)</ref>, <ref type="bibr" target="#b19">(20)</ref> hold,</p><formula xml:id="formula_29">L lJ  ( ) ( ) ( ) ( ) 22 sl sl x,y A l x x y y = 0;  − + − <label>(26) ( ) ( ) ( ) (</label></formula><p>)</p><formula xml:id="formula_30">22 fl fl x,y B l x x y y = 0;  − + − <label>(27) ( ) ( ) ( ) (</label></formula><p>)</p><formula xml:id="formula_31">22 'l 'l i i k x,y M AB ll x x y y = 0, i J ; '  − + −  <label>(28) ( ) ( ) ( )</label></formula><formula xml:id="formula_32">k 22 l l l l i i i i L i ,i =1 x x y y 1, l,l J .     − + −   <label>(29)</label></formula><p>Here, the condition ( <ref type="formula" target="#formula_32">29</ref>) is an analytic expression of the constraints <ref type="bibr" target="#b21">(22)</ref>, while ( <ref type="formula" target="#formula_29">26</ref>)-( <ref type="formula" target="#formula_31">28</ref>) are a direct generalization of conditions ( <ref type="formula" target="#formula_17">11</ref>)- <ref type="bibr" target="#b12">(13)</ref>.</p><p>Finally, replacing condition <ref type="bibr" target="#b18">(19)</ref> with the following expression, ( ) ( )</p><formula xml:id="formula_33">33 l l l l i i i i k L x x = 0, y y = 0, i J ,l J , − −  <label>(30)</label></formula><p>we get Model 3.1 as a generalization of Model 3.</p><p>Like ( <ref type="formula" target="#formula_10">5</ref>), <ref type="bibr" target="#b9">(10)</ref>, the linear analogue of ( <ref type="formula" target="#formula_16">10</ref>) is the condition:</p><formula xml:id="formula_34">ll i i k L x y 1, i J , l J , +   <label>(31)</label></formula><p>Taking into account <ref type="bibr" target="#b9">(10)</ref>, the condition (29) can be replaced by a linear constraint:</p><formula xml:id="formula_35">( ) ( ) ( ) k 22 l l l l 2 i i i i k L i ,i =1 x x x y C , l,l J ,         − + −    (<label>32</label></formula><formula xml:id="formula_36">)</formula><p>as a result, we get another version of the model (further referred to as Model 3.1').</p><p>Remark 1 In the constructed models, the number k expresses the upper bound on the path length between two connected modules. For reducing the dimension of the problem, it is advisable to conduct a preliminary study to estimate the value of k for specific pairs of modules and replace k with the corresponding found values l kk  , L lJ  for the pairs.</p><p>Remark 2 In the constructed models, it is easy to find the lower bound for the value of the objective function using the distance in the space L  . Thus, the objective function ( <ref type="formula">8</ref>) can be estimated as follows: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Software implementation and applications</head><p>Models 2.1, 3.1, 2.1', 3.1' were implemented in the Python software environment, using the nonlinear optimization package GEKKO <ref type="bibr" target="#b29">[30]</ref>, all models were tested using the APOPT nonlinear partial integer programming solver (Advanced Process OPTimizer) <ref type="bibr" target="#b30">[31]</ref>, while Models 2.1', 3.1', were also were solved using the IPOPT nonlinear partial integer programming solver (Interior Point OPTimizer) <ref type="bibr" target="#b22">[23]</ref>. On average, IPOPT showed a certain advantage over the results of APOPT on randomly generated problems of dimension 10 m,n,L J  , where the area under the modules is 60 %- 80 %. x , y = <ref type="bibr">( 1,1 , 1,2 , 1,3 , 2,3 , 3,3 , 3,4 , 4,4 , 4,4 , 4,4 )</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>−−</head><p>According to (33), the objective function reaches its lower bound, respectively, I is the optimal solution to the problem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>New routing models of practical problems of VLSI design are offered constructed by means of theories of Euclidean combinatorial configurations and f-representations of combinatorial sets mapped into Euclidean space. The models are validated by IPOPT and APOPT solvers, and an illustrative example is given.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 Figure 1 :</head><label>11</label><figDesc>Figure 1 shows an illustration for Models 1-3, where L = 5 , m= 5 , n=7 , Modules A , B are</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Cost considerations in network on chip, Integration</title>
		<author>
			<persName><forename type="first">E</forename><surname>Bolotin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Cidon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ginosar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kolodny</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.vlsi.2004.03.006</idno>
	</analytic>
	<monogr>
		<title level="j">the VLSI Journal</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="19" to="42" />
			<date type="published" when="2004-10">Oct. 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Haase</surname></persName>
		</author>
		<title level="m">Models, Methods, and Tools for Complex Chip Design: Selected Contributions from FDL 2012</title>
				<meeting><address><addrLine>Switzerland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Science &amp; Business Media</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Global Routing with Timing Constraints</title>
		<author>
			<persName><forename type="first">S</forename><surname>Held</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Muller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rotter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Scheifele</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Traub</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Vygen</surname></persName>
		</author>
		<idno type="DOI">10.1109/TCAD.2017.2697964</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems</title>
		<imprint>
			<biblScope unit="page" from="1" to="14" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">BonnTools: Mathematical Innovation for Layout and Timing Closure of Systems on a Chip</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Rautenbach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Vygen</surname></persName>
		</author>
		<idno type="DOI">10.1109/JPROC.2006.889373</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE</title>
				<meeting>the IEEE</meeting>
		<imprint>
			<date type="published" when="2007-03">Mar. 2007</date>
			<biblScope unit="volume">95</biblScope>
			<biblScope unit="page" from="555" to="572" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Combinatorial Problems in Chip Design</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korte</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Vygen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Building Bridges</title>
				<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="333" to="368" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Electronic Design Automation for IC Implementation</title>
	</analytic>
	<monogr>
		<title level="m">Circuit Design, and Process Technology</title>
				<editor>
			<persName><forename type="first">L</forename><surname>Lavagno</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">I</forename><forename type="middle">L</forename><surname>Markov</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Martin</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><forename type="middle">K</forename><surname>Scheffer</surname></persName>
		</editor>
		<meeting><address><addrLine>Boca Raton</addrLine></address></meeting>
		<imprint>
			<publisher>CRC Press</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note>2 edition</note>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Digital VLSI Design with Verilog: A Textbook from Silicon Valley Technical Institute</title>
		<author>
			<persName><forename type="first">J</forename><surname>Williams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Thomas</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008. 2008</date>
			<publisher>Springer</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
	<note>edition</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Multiscale Optimization in VLSI Physical Design Automation</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">F</forename><surname>Chan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">R</forename><surname>Shinnerl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sze</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Multiscale Optimization Methods and Applications</title>
				<editor>
			<persName><forename type="first">W</forename><forename type="middle">W</forename><surname>Hager</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S.-J</forename><surname>Huang</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Pardalos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">O</forename><forename type="middle">A</forename><surname>Prokopyev</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer US</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="1" to="67" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">SPICE: an optimization-based system for the design of integrated circuits</title>
		<author>
			<persName><forename type="first">W</forename><surname>Nye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">C</forename><surname>Riley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sangiovanni-Vincentelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Tits</surname></persName>
		</author>
		<author>
			<persName><forename type="first">'</forename><surname>Delight</surname></persName>
		</author>
		<idno type="DOI">10.1109/43.3185</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="501" to="519" />
			<date type="published" when="1988-04">Apr. 1988</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Malyugin&apos;s Theorems: A New Concept in Logical Control</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">P</forename><surname>Shmerko</surname></persName>
		</author>
		<idno type="DOI">10.1023/B:AURC.0000030902.91316.b9</idno>
	</analytic>
	<monogr>
		<title level="j">VLSI Design, and Data Structures for New Technologies, Automation and Remote Control</title>
		<imprint>
			<biblScope unit="volume">65</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="893" to="912" />
			<date type="published" when="2004-06">Jun. 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">The Induced Disjoint Paths Problem</title>
		<author>
			<persName><forename type="first">K</forename><surname>Kawarabayashi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Kobayashi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Integer Programming and Combinatorial Optimization</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Lodi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Panconesi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Rinaldi</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="47" to="61" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Placement problems in chip design: Modeling and optimization</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pichugina</surname></persName>
		</author>
		<idno type="DOI">10.1109/infocommst.2017.8246440</idno>
	</analytic>
	<monogr>
		<title level="m">4th International Scientific-Practical Conference Problems of Infocommunications</title>
				<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="465" to="473" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Signed Permutation Polytope Packing in VLSI Design</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pichugina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kartashov</surname></persName>
		</author>
		<idno type="DOI">10.1109/CADSM.2019.8779353</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)</title>
				<imprint>
			<date type="published" when="2019-02">2019. Feb. 2019</date>
			<biblScope unit="page" from="4" to="50" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Bazaraa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">D</forename><surname>Sherali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Shetty</surname></persName>
		</author>
		<title level="m">Nonlinear Programming: Theory and Algorithms</title>
				<meeting><address><addrLine>Hoboken, N.J</addrLine></address></meeting>
		<imprint>
			<publisher>Wiley-Interscience</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
	<note>3 edition</note>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Boolean Satisfiability Problem: Discrete and Continuous Reformulations with Applications</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pichugina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Matsyi</surname></persName>
		</author>
		<idno type="DOI">10.1109/TCSET49122.2020.235507</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET)</title>
				<imprint>
			<date type="published" when="2020-10">2020. Oct. 2020</date>
			<biblScope unit="page" from="623" to="627" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Quadratic Optimization Models and Convex Extensions on Permutation Matrix Set</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pichugina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yakovlev</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-33695-0_17</idno>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing IV</title>
				<imprint>
			<date type="published" when="2019-11">Nov. 2019</date>
			<biblScope unit="page" from="231" to="246" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Optimization on Combinatorial Configurations Using Genetic Algorithms</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yakovlev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kartashov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pichugina</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-2353/paper3.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019)</title>
				<meeting>the Second International Workshop on Computer Modeling and Intelligent Systems (CMIS-2019)<address><addrLine>Zaporizhzhia, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019-04">Apr. 2019</date>
			<biblScope unit="page" from="28" to="40" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m">Handbook of Combinatorial Optimization</title>
				<editor>
			<persName><forename type="first">P</forename><surname>Pardalos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D.-Z</forename><surname>Du</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><forename type="middle">L</forename><surname>Graham</surname></persName>
		</editor>
		<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Global approaches for facility layout and VLSI floorplanning</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Anjos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Liers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">presented at the Handbook on semidefinite, conic and polynomial optimization</title>
				<imprint>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">Handbook of Approximation Algorithms and Metaheuristics</title>
		<author>
			<persName><forename type="first">F</forename><surname>Teofilo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ed</forename><surname>Gonzalez</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2018">2018</date>
			<publisher>Routledge Handbooks Online</publisher>
		</imprint>
	</monogr>
	<note>Second Edition</note>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Genetic Algorithms for Solving Combinatorial Mass Balancing Problem</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yakovlev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kartashov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pichugina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Korobchynskyi</surname></persName>
		</author>
		<idno type="DOI">10.1109/UKRCON.2019.8879938</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON)</title>
				<imprint>
			<date type="published" when="2019-07">2019. Jul. 2019</date>
			<biblScope unit="page" from="1061" to="1064" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A Horizontal Method of Localizing Values of a Linear Function in Permutation-Based Optimization</title>
		<author>
			<persName><forename type="first">L</forename><surname>Koliechkina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pichugina</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-21803-4_36</idno>
	</analytic>
	<monogr>
		<title level="m">Optimization of Complex Systems: Theory, Models, Algorithms and Applications</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="355" to="364" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">On the Implementation of an Interior-Point Filter Line-Search Algorithm for Large-Scale Nonlinear Programming</title>
		<author>
			<persName><forename type="first">A</forename><surname>Wächter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">T</forename><surname>Biegler</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Theory and Methods of Euclidian Combinatorial Optimization: Current Status and Prospects</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">G</forename><surname>Stoyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Yakovlev</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10559-020-00253-6</idno>
	</analytic>
	<monogr>
		<title level="j">Cybern Syst Anal</title>
		<imprint>
			<biblScope unit="volume">56</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="366" to="379" />
			<date type="published" when="2020-05">May 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Nocedal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wright</surname></persName>
		</author>
		<title level="m">Numerical Optimization</title>
				<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<title level="m" type="main">Constraint Integer Programming: A New Approach to Integrate CP and MIP, in Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems</title>
		<author>
			<persName><forename type="first">T</forename><surname>Achterberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Berthold</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Koch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Wolter</surname></persName>
		</author>
		<editor>L. Perron and M. A. Trick</editor>
		<imprint>
			<date type="published" when="2008">2008</date>
			<publisher>Springer</publisher>
			<biblScope unit="page" from="6" to="20" />
			<pubPlace>Berlin Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Global optimization algorithms for VLSI compaction problems</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Al-Khayyal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Pardalos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Arabian J. Sci. Engrg</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="335" to="339" />
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">A survey of optimization techniques for integrated-circuit design</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Brayton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">D</forename><surname>Hachtel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Sangiovanni-Vincentelli</surname></persName>
		</author>
		<idno type="DOI">10.1109/PROC.1981.12170</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE</title>
				<meeting>the IEEE</meeting>
		<imprint>
			<date type="published" when="1981-10">Oct. 1981</date>
			<biblScope unit="volume">69</biblScope>
			<biblScope unit="page" from="1334" to="1362" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m">Handbook on semidefinite, conic and polynomial optimization</title>
				<editor>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Anjos</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Lasserre</surname></persName>
		</editor>
		<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
	<note>2012th edition</note>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">D R</forename><surname>Beal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">C</forename><surname>Hill</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Martin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Hedengren</surname></persName>
		</author>
		<idno type="DOI">10.3390/pr6080106</idno>
	</analytic>
	<monogr>
		<title level="j">GEKKO Optimization Suite, Processes</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page">106</biblScope>
			<date type="published" when="2018-08">Aug. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<author>
			<persName><forename type="first">Apmonitor</forename><surname>Apmonitor</surname></persName>
		</author>
		<ptr target="https://github.com/APMonitor/apopt" />
		<title level="m">/apopt</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
