Implicit Redundancy and Degeneracy
in Conic Program
Abstract
This paper examines the feasible region of a standard conic program represented as the intersection of a closed convex cone and a set of linear equalities. It is recently shown that when Slater constraint qualification (strict feasibility) fails for the classes of linear and semidefinite programs, two key properties emerge within the feasible region; (a) every point in the feasible region is degenerate; (b) the constraint system inherits implicit redundancies. In this paper we show that degeneracy and implicit redundancies are inherent and universal traits of all conic programs in the absence of strict feasibility.
Keywords: Degeneracy, Facial reduction, Implicit redundancy
1 Introduction
We consider the feasible region of a standard conic program represented as the intersection of a closed convex cone and an affine subspace . Throughout the paper we consider and in a finite dimensional Euclidean space . We represent the affine subspace by
where is a linear map. We define the feasible region of a conic program
We assume that is surjective. Since is not empty, being surjective means that itself does not contain any redundant equalities. If is not given surjective, numerical methods [24, 1, 8] can be used for sorting out redundant equalities from the system .
is said to hold strict feasibility (Slater constraint qualification) if contains a point the relative interior of . This paper particularly focuses on that fails strict feasibility, i.e., that lies on the relative boundary of . It is well-known that conic programs that fail this regularity condition does not guarantee strong duality, i.e., the primal and dual optimal values may not agree or the dual optimal value is not attained by a dual feasible point; see [31, Section 2]. For this reason, many optimization algorithms are developed under this regularity condition. The class of linear programs () avoids this pathology and consequences of absence of strict feasibility for linear programs are rarely discussed in the literature. A recent work [18] highlights the importance of strict feasibility for linear programs and reveals the connection between degeneracy of extreme points and strict feasibility.
The cone of -by- positive semidefinite matrices, , is a well-studied object. The computationally efficient facial structure of is clearly identified and there are successful numerical solvers that take advantage of this knowledge [2, 30, 27]. Let . When fails strict feasibility, two interesting properties are shown recently:
-
1.
Every point in is degenerate [16].
-
2.
When the domain of is restricted to be the minimal face of containing , is not surjective. In other words, contains implicitly redundant linear constraints [15].
We explain the meanings of degeneracy and implicit redundancy in Sections 2.3 and 3 respectively. In this paper we show that these two properties are universal properties of all conic programs that fail strict feasibility, not just restricted to linear and semidefinite programs.
1.1 Notation
Given a linear map , we let be the adjoint of . We use to denote the inner product between two vectors in the Euclidean space ; we omit the subscript when the meaning is clear. We use to denote the range of the map . Given a matrix , denotes the range of , formed by the linear combinations of columns of . is used to denote the null-space of .
Given a set , (, resp.) means the interior (relative interior, resp.) of . The dimension and the span of are denoted and , respectively. We use to indicate the orthogonal complement of . Given a vector , we often use to mean . and denote the usual vector spaces of vector of coordinates and -by- symmetric matrices, respectively. Given a matrix of size -by- and an index set , we use for the submatrix of formed by the columns of that correspond to .
is used for the nonnegative orthant and is used for the set of -by- positive semidefinite matrices, . When a general conic program is discussed, we omit the subscript and use the symbol . We use the notation to distinguish a particular setting for the cone from a general conic program. For example, when the feasible region of the semidefinite program is discussed, we use .
1.2 Related Work
The concept of implicit redundancies is introduced recently [18, 15]. Using this notion, [18] shows that every extreme point (basic feasible solution) of is degenerate in the absence of strict feasibility. [15] shows that also contains implicit redundant constraints in the absence of strict feasibility. Using the notion of implicit redundancies, [15] tightens the Barvinok-Pataki bound [3, 21], and further improves the bound presented in [17]. On the degeneracy side, a recent work [16] links the definition of degeneracy introduced by Pataki [34, Definition 3.3.1] to realize that every point in is degenerate. This is done by exploiting the facial structure of . Since a linear program is a special case of a semidefinite program, it immediately implies that every point in is degenerate, not just limited to the extreme points.
2 Background
This section reviews basic notions and known results in the literature related to the main results. We present basic definitions including cones and faces, the goal of facial reduction process, and the notion of degeneracy.
2.1 Faces of Cones
A closed convex set is said to be a cone if implies , . The dual cone of is . A convex set is called a face of (denoted ) if
A face is said to be exposed if for some . is said to be facially exposed if every face of is exposed. Given a convex set , the minimal face of containing , denoted , is the intersection of faces of that contains , i.e.,
It is known that a point provides the characterization ; see [9, Proposition 2.2.5]. Given a face , the conjugate face of , denoted , is
Understanding the facial structure of a cone is important for designing a computationally efficient algorithm. Examples of cones that demonstrate great computational powers include the nonnegative orthant , the positive semidefinite cone , and the second-order (Lorentz) cone. Moreover, these cones lead to many successful interior point methods for solving the linear, semidefinite, second-order cone programs and the programs with Cartesian products of these cones [2, 30, 27].
We list facial characterizations of two cones. Every face has the form
(2.1) |
where for some index set and is the -by- identity matrix. Here, , the complement of . is another example of a well-understood cone. Every face has the form
(2.2) |
where for some and satisfies . Both and are facially exposed. Other examples of facially exposed cones are the second-order cone, the doubly nonnegative cone, the hyperbolocity cone [23, Theorem 23] and the cone of Euclidean distance matrices [29]. On the other hand, not every cone is facially exposed. For example, the exponential cone [19], the completely positive cone [35], and the copositive cone [10] are known to be not facially exposed.
2.2 Facial Reduction for Conic Programs
Facial reduction (FR) is first introduced by Borwein and Wolkowicz in the ’s [5, 6]. In-depth analysis for conic programs with linear objective functions, especially for semidefinite programs, has been conducted for the last two decades. Successful applications of FR are the semidefinite relaxations of NP-hard binary combinatorial optimization problems (e.g., see [36, 7]); and an analytical tool for measuring hardness of solving a problem numerically (e.g., see [28, 26]).
Facial reduction seeks to form an equivalent problem that satisfies strict feasibility. FR strives to find the minimal face of that contains in order to represent the set
Finding is often a challenging task and hence we often rely on an auxiliary lemma. Lemma 2.1 below lies in the heart of the FR algorithm.
Lemma 2.1.
[11, Theorem 3.1.3][Theorem of the Alternative] For a feasible system , exactly one of the following holds.
-
1.
Strict feasibility holds for ;
-
2.
There exists such that
(2.3)
We note that a solution to (2.3) yields
In other words, every feasible point lies in the orthogonal complement of , i.e.,
Consequently, we can rewrite the set by
(2.4) |
The ambiant space now reduces from to ; the dimension reduction is an attractive by-product of the FR process. This completes one iteration of the FR algorithm. Then the FR algorithm replaces the cone as in (2.4) (i.e., ) and solves the system 2.3 repeatedly until a strictly feasible point with respect to the reduced cone is guaranteed. Algorithm 2.1 summarizes the FR process.
Upon the termination of the FR process Algorithm 2.1, we obtain
Thus FR process allows an alternative representation of that satisfies strict feasibility:
It is important to note that the FR process does not alter the points in the set , i.e.,
(2.5) |
where each is defined in Algorithm 2.1. We emphasize that the representation of is different from , when .
The shortest length of FR process is called the singularity degree of , , first proposed by Sturm [28] for the class of semidefinite programs. This implies that Algorithm 2.1 requires at least number of iterations. Indicated by (2.5), we have and we use the superscript to distinguish the different representations of the set . Hence strict feasibility fails for , and . While it is possible to construct a general conic program that has an arbitrarily large singularity degree, linear programs have regardless of the problem dimension. is often used as a measure of the hardness of solving a problem numerically by engaging error bounds; see [26, 28].
Example 2.2 below is an illustration of the FR process. We leave more details on the FR algorithm to [9, 11] for general conic programs, [25, 18] for and and related examples.
Example 2.2 (FR on the exponential cone).
It is well-known that FR applied to and generates and , where . In plain language, FR for linear and semidefinite programs produces another semidefinite and linear programs in smaller dimensional spaces. This can be seen from the facial characterizations (2.1) and (2.2). It is because and are self-reproducing cones. The FR process illustrated in Example 2.2 shows that the self-reproducibility does not apply a general conic program. Note that is not polyhedral but the first FR iteration in Example 2.2 produces a polyhedral cone .
The feasible system is known to hold strict feasibility generically [22] and FR may seem unnecessary. However, many practical real-life examples seem to fail strict feasibility, e.g., see [18, 14]. As addressed in [18], a significant number of instances from the well-known NETLIB collection fails strict feasibility. We note that the significance of FR on has only been a recent topic of discussion.
It is important to note that FR enables the restriction of the domain within which we can operate with . Without FR, we cannot restrict the domain of without any further analysis. We utilize this observation to discuss the main results in Section 3 below.
2.3 Degeneracy
In this section we introduce a known notion of degeneracy and discuss related results.
Definition 2.3 (Pataki).
[34, Definition 3.3.1] Let . We say that is nondegenerate if
Characterizations of Definition 2.3 are available for some cones. Given , let be the support of , . Let be a matrix representation of . Then is called degenerate if has linearly dependent rows; see [34, Example 3.3.1]. We note that the usual degeneracy of a basic feasible solution for the standard linear program agrees with the degeneracy discussed in [34, Example 3.3.1]. A basic feasible solution of the standard linear program is called degenerate if there is a basic variable equal to ; see [4, Section 2]. This implies that (a submatrix of the so-called basis matrix) is a full-column rank matrix with more rows than columns. The characterization immediately indicates that is degenerate.
A nice characterization of Definition 2.3 customized for is available as well. For , let be a spectral decomposition of , where is a positive definite matrix of order . Let be the -th equality of the system . Then [34, Corollary 3.3.2] states
(2.6) |
In [16, Section 2], the degeneracy of each point in is realized using the characterization (2.6). We briefly explain the steps for recognizing the degeneracy. Since is facially exposed, we always obtain for some full column rank matrix . Then a solution to (2.3) is used to detect the linear dependence of the matrices in (2.6) after FR. We leave more details to [16, Section 2].
3 Main Result
We now present the main results of this paper.
Theorem 3.1 (Degeneracy in the absence of strict feasibility).
Suppose that strict feasibility fails for . Then every point in is degenerate.
Proof.
Suppose that strict feasibility fails for . Then by Lemma 2.1, there exists that solves (2.3). Note that and . Now let . Then
Hence . Therefore we conclude that . Consequently, by Definition 2.3, is degenerate. ∎
Now the results in [18, 16] can be viewed as a consequence of Theorem 3.1. An immediate application of Theorem 3.1 yields that that has a nondegenerate point holds strict feasibility. Moreover, that holds strict feasibility always has a nondegenerate point as we see in Proposition 3.2 below.
Proposition 3.2.
Every strictly feasible point is nondegenerate.
Proof.
Let be a strictly feasible point. Then . If , then Definition 2.3 immediately follows. Suppose to the contrary that
Then for some . Note that and hence , for all . This yields and . Therefore satisfies (2.3) and this contradicts the strict feasibility assumption. ∎
Theorem 3.1 and Proposition 3.2 lead to the following conclusion.
Corollary 3.3.
Given any feasible set , strict feasibility fails if, and only if, every point is degenerate. Moreover, strict feasibility holds if, and only if, contains a nondegenerate point.
If we restrict our attention to the extreme points of only, the converse of Theorem 3.1 is not true. For example, that represents the set of doubly stochastic matrices (the feasible region of the linear assignment problem) has a Slater point, but every extreme point is degenerate; see [18].
We now proceed to the second main result. We first introduce a useful lemma. We include the proof of Lemma 3.4 for completeness.
Lemma 3.4.
Proof.
Let . Then for some . Clearly . Note that . Hence holds. For the opposite containment, let . Then for some . Furthermore, . ∎
Recall that is assumed to be surjective throughout this paper. We emphasize that alone does not have redundant equalities. Theorem 3.5 below shows that is no longer surjective when the domain of is restricted by the orthogonal complement of . That is, the constraint system contains implicit redundant constraints.
Theorem 3.5 (Implicit loss of surjectivity in the absence of strict feasibility).
Suppose strict feasibility fails for . Let be the set of vectors obtained by the FR process. Let and let . Then the map is not surjective. In other words, the equality constraint system in contains redundant constraints.
Proof.
Theorem 3.5 leads to the notion of implicit problem singularity, , discussed [18, 15, 16]. We state the definition of for a general conic program.
Definition 3.6.
Let be the cone obtained by the FR process. The implicit problem singularity of , , is the number of redundant equalities in the system
We discuss notions related to Definition 3.6 and their usages in Section 4 below.
Remark 3.7.
The implicit redundancies provide an interesting implication to the minimal representation of the affine space discussed in [32]. Let be the null-space of . Then, given , we obtain . Since and , [32] recognizes
Then [32, equation (2.18)] establishes as ‘the minimal subspace representation’ of . Theorem 3.5 and Definition 3.6 certify that indeed has a smaller dimension than when strict feasibility fails for .
4 Discussions
In this section we connect the main results to some topics in the literature, including the notions of different singularities and their usages, ill-conditioning that arises in the interior point methods, and differentiability of the optimal value function.
Other Singularity Notions
Theorem 3.5 indicates that the image under with its domain restricted by the FR process cannot span . Yet, it does not specify how different the dimension of the image is from in the absence of strict feasibility. We aim to provide a bound for the lost dimension.
As a related definition to the singularity degree, a notion of max-singularity degree is proposed in [18]. The max-singularity degree of , , is the longest nontrivial FR iterations for . We discuss some properties related to these singularity notions. Proposition 4.1 below is proved for the class of semidefinite programs using the facial structure of explicitly; see [25, Lemma 3.5.2]. We present a generalization.
Proposition 4.1.
Suppose that fails strict feasibility. Let generated by solving (2.3). Then the vectors in are linearly independent.
Proof.
Suppose strict feasibility fails for . Let be a sequence of vectors generated by FR iterations from Algorithm 2.1. We first show that the members in are linearly independent. Let
Note that , since implies that and the FR process terminates before the -th iteration. Since
we have
We consider two cases below:
-
1.
case 1: , for some .
Note that , . Thus must be orthogonal to all members in . Therefore .
-
2.
case 2: , for some .
Note that
If holds, then . This is a contradiction.
Since the members in are linearly independent, it immediately follows that the vectors in are linearly independent. ∎
Note that the property stated in Proposition 4.1 holds for any FR process. Thus Corollary 4.2 below follows.
Corollary 4.2.
Suppose that strict feasibility fails for and let be the cone obtained by the FR process. Then generates at most dimensional space. Moreover, contains at least number of implicitly redundant constraints.
Proof.
Let be the sequence of vectors obtained by the FR iterations by solving (2.3). Then Lemma 3.4 implies that
Finally, Proposition 4.1 implies that spans at most dimensional space. ∎
Corollary 4.2 gives rise to the following relationship:
This motivates the following question: how different can the , and be? Various instances are presented for and in the literature; [15, Example 3.2.13]; [25, Example 4.2.6]; and [18, Section 4.2.2]. Example 2.2 above shows that .
The implicit redundancies can be used to tighten bounds that engage the number of linear constraints. An interesting usage of is shown for and in the literature. For the case of , is used for measuring the degree of degeneracy of a basic feasible solution [15, Corollary 4.1.12]. More specifically, every basic feasible solution has at most number of nonzero basic variables. This also translates to
every basic feasible solution has at least degenerate basic variables. | (4.1) |
In the case of , is used to tighten the Barvinok-Pataki bound [15, Theorem 3.2.7]:
(4.2) |
We observe that a large provides an especially useful bound since the term on the left-hand-side of the inequality (4.2) is quadratic in .
We now aim to generalize (4.1) and (4.2) to an arbitrary conic program. We first present a lemma. Note that Lemma 4.3 can be used to produce the well-known Barvinok-Pataki bound [3, 21].
Lemma 4.3.
(Pataki) [34, Theorem 3.3.1] Let . Then
Theorem 4.4.
Let be an extreme point of . Then
Proof.
Let be a set of vectors obtained by the FR iterations. Let . Let be the null-space of . Note that
(4.3) |
Since
we have
(4.4) |
Since is an extreme point of , . Then Lemma 4.3 implies
(4.5) |
Note that
Then we obtain
∎
Theorem 4.4 can be used for cones for which facial dimensions are known. For example, . Thus (4.1) can be viewed as a consequence of Theorem 4.4. It is well known that and (4.2) also follows from Theorem 4.4. Let be the copositive cone. The dimensions of the so-called maximal faces of the copositive cone are identified. A maximal face of is characterized by for some ; see [10, Theorem 5.5]. Moreover, . Then by Theorem 4.4, we conclude that an extreme point of , where is maximal, satisfies
Interior Point Methods
Interior point methods are the most popular class of algorithms for solving a linear conic program
A general framework of the interior point method applicable to the standard conic program is discussed in [20]. We aim to identify a repercussion that arises when the primal path-following interior point method is applied to an instance that fails strict feasibility. We follow the steps presented in [20]. First we construct the so-called logarithmically homogeneous self-concordant barrier (LHSCB) for the cone . For , consider
The barrier function maintains the variable in . The barrier functions , and are presented as examples for linear and semidefinite programs, respectively. The first-order optimality conditions for are
(4.6) |
The Naewton step for solving the optimality conditions (4.6) can be computed by solving
(4.7) |
Then by substituting into the middle block in (4.7), we obtain [20, equation 3.9]:
(4.8) |
Note that for infeasible-interior point method, some appropriate residuals are added to the right-hand-side of (4.8) but the data on the left-hand-side remains the same.
We now observe the limiting behaviour of the left-hand-side matrix in (4.8) with the barrier functions introduced in [20]. For the case of the linear program, we see that , where is the diagonal matrix with placed on the diagonal elements. Let and the -th iterate. Let be an optimal solution to and let . We note that and . Thus, is a singular matrix. As , ill-conditioning arises. For the case of the semidefinite program, the -th entry of the data matrix in (4.8) is . Let be an optimal solution and let be the matrix where . Let be a vector that solves (2.3). Then we observe
since . Hence is a singular matrix. Similarly, ill-conditioning arises in (4.8) as iterate approaches to .
Beside the fact that the dual optimal set is unbounded in the absence of strict feasibility, we see an ill-conditioned linear system that arises when an interior point method is used. The importance of strict feasibility for different classes numerical solvers is addressed in [18, 16]. [18] links the degeneracy to the stalling phenomena of the simplex method and the ill-conditioning that arises in the primal-dual path-following interior point methods for linear programs (even through the self-dual embedding). [16] presents a semi-smooth Newton method for solving the nearest point problem and why strict feasibility is needed for having a good performance of the algorithm.
Differentiability of the Optimal Value Function
The differentiability of the optimal value function is an interesting topic in the field of perturbation analysis. For the class of linear programs, many results are applicable under the nondegeneracy setting [13, 12]. Let be a convex function. We show that the optimal value function defined by
(4.9) |
is not differentiable at in the absence of strict feasibility. Proposition 4.5 is established under and in [15, 18]. We list the result in this paper as a generalization to [15, 18].
Proposition 4.5.
For any , perturbing by a solution of (2.3) leads to an infeasible problem.
Proof.
Let be a solution to (2.3). We consider for some . Then replacing the right-hand-side vector of by implies
By Farkas’ lemma, the perturbed system is infeasible. ∎
Proposition 4.5 immediately implies Corollary 4.6 below.
Corollary 4.6.
Suppose that strict feasibility fails for . Then the optimal value function defined in (4.9) is not differentiable at .
Proof.
Setting for an arbitrary small yields . ∎
5 Conclusions
We showed two universal properties of the standard conic program that fails strict feasibility. First we showed that every point is degenerate in the absence of strict feasibility. We also noted that the application of FR can alter the algebraic interpretation of a point. For instance, in the absence of strict feasibility, a strictly feasible point in the facially reduced set is nondegenerate, whereas the same point is degenerate before FR. Understanding the points for which FR influences the degeneracy status presents an interesting avenue for exploration. Second, we showed that the constraint system that fails strict feasibility inherits implicitly redundant constraints. We saw different usages of the singularity notions conveyed by the FR process. While quantifies the computational challenge associated with solving a given problem, provides a measure for the number of implicitly redundant linear constraints. We further elucidated on how the implicit redundancies impact the bound that engages the number of constraints and the near optimal behaviour of the interior point methods.
Acknowledgement
The author would like to thank professor Henry Wolkowicz for providing helpful comments.
References
- [1] E.D. Andersen. Finding all linearly dependent rows in large-scale linear programming. Optimization methods & software, 6(3):219–227, 1995.
- [2] MOSEK ApS. The MOSEK optimization toolbox for MATLAB manual. Version 10.0., 2022.
- [3] A. I. Barvinok. A remark on the rank of positive semidefinite matrices subject to affine constraints. Discrete and Computational Geometry, 25:23–31, 2001.
- [4] D. Bertsimas and J. Tsitsiklis. Introduction to Linear Optimization. Athena Scientific, Belmont, MA, 1997.
- [5] J.M. Borwein and H. Wolkowicz. Characterization of optimality for the abstract convex program with finite-dimensional range. J. Austral. Math. Soc. Ser. A, 30(4):390–411, 1980/81.
- [6] J.M. Borwein and H. Wolkowicz. Regularizing the abstract convex program. J. Math. Anal. Appl., 83(2):495–530, 1981.
- [7] F. Burkowski, Y-L. Cheung, and H. Wolkowicz. Efficient use of semidefinite programming for selection of rotamers in protein conformations. INFORMS J. Comput., 26(4):748–766, 2014.
- [8] C. Cartis and N. Gould. Finding a point in the relative interior of a polyhedron. Council for the Central Laboratory of the Research Councils, pages 1–59, 2006.
- [9] Y.-L. Cheung. Preprocessing and Reduction for Semidefinite Programming via Facial Reduction: Theory and Practice. PhD thesis, University of Waterloo, 2013.
- [10] P. J.C. Dickinson. Geometry of the copositive and completely positive cones. Journal of Mathematical Analysis and Applications, 380(1):377 – 395, 2011.
- [11] D. Drusvyatskiy and H. Wolkowicz. The many faces of degeneracy in conic optimization. Foundations and Trends® in Optimization, 3(2):77–170, 2017.
- [12] A.V. Fiacco. Introduction to Sensitivity and Stability Analysis in Nonlinear Programming, volume 165 of Mathematics in Science and Engineering. Academic Press, 1983.
- [13] R.M. Freund. Postoptimal analysis of a linear program under simultaneous changes in matrix coefficients. Number 24, pages 1–13, 1985. Mathematical programming, I.
- [14] H. Hu, H. Im, J. Lin, N. Lütkenhaus, and H. Wolkowicz. Robust Interior Point Method for Quantum Key Distribution Rate Computation. Quantum, 6:792, September 2022.
- [15] H. Im. Implicit Loss of Surjectivity and Facial Reduction: Theory and Applications. PhD thesis, University of Waterloo, 2023.
- [16] H. Im, W. Jung, W.M. Moursi, D. Torregrosa-Belen, and H. Wolkowicz. Projection, stability and singularity degree for spectrahedra. Technical report, in progress. 30 pages.
- [17] H. Im and H. Wolkowicz. A strengthened Barvinok-Pataki bound on SDP rank. Oper. Res. Lett., 49(6):837–841, 2021.
- [18] H. Im and H. Wolkowicz. Revisiting degeneracy, strict feasibility, stability, in linear programming. European J. Oper. Res., 310(2):495–510, 2023.
- [19] S.B. Lindstrom, B.F. Lourenço, and T.-K. Pong. Error bounds, facial residual functions and applications to the exponential cone. Mathematical programming, 200(1):229–278, 2023.
- [20] A.S. Nemirovski and M.J. Todd. Interior-point methods for optimization. Acta Numer., 17:191–234, 2008.
- [21] G. Pataki. On the rank of extreme matrices in semidefinite programs and the multiplicity of optimal eigenvalues. 23(2):339–358, 1998.
- [22] G. Pataki and L. Tunçel. On the generic properties of convex optimization problems in conic form. Math. Programming, to appear.
- [23] J. Renegar. Hyperbolic programs, and their derivative relaxations. Found. Comput. Math., 6(1):59–79, 2006.
- [24] L. Schork and J. Gondzio. Rank revealing Gaussian elimination by the maximum volume concept. Linear Algebra Appl., 592:1–19, 2020.
- [25] S. Sremac. Error bounds and singularity degree in semidefinite programming. PhD thesis, University of Waterloo, 2019.
- [26] S. Sremac, H.J. Woerdeman, and H. Wolkowicz. Error bounds and singularity degree in semidefinite programming. SIAM J. Optim., 31(1):812–836, 2021.
- [27] J.F Sturm. Using sedumi 1.02, a matlab toolbox for optimization over symmetric cones. Optimization methods and software, 11(1-4):625–653, 1999.
- [28] J.F. Sturm. Error bounds for linear matrix inequalities. SIAM J. Optim., 10(4):1228–1248 (electronic), 2000.
- [29] P. Tarazaga. Faces of the cone of Euclidean distance matrices: characterizations, structure and induced geometry. Linear Algebra Appl., 408:1–13, 2005.
- [30] K.-C. Toh, M.J. Todd, and R.H. Tütüncü. On the implementation and usage of sdpt3 – a matlab software package for semidefinite-quadratic-linear programming, version 4.0. In Handbook on Semidefinite, Conic and Polynomial Optimization, International Series in Operations Research Management Science, pages 715–754. Springer US, New York, NY, 2012.
- [31] L. Tunçel. Polyhedral and semidefinite programming methods in combinatorial optimization. Fields Institute monographs ; 27. American Mathematical Society, Providence, RI, 2010.
- [32] L. Tunçel and H. Wolkowicz. Strong duality and minimal representations for cone optimization. coap, 53(2):619–648, 2012.
- [33] F. Wang and H. Wolkowicz. Singularity degree of non-facially exposed faces. Technical report, 2022 submitted. 19 pages.
- [34] H. Wolkowicz, R. Saigal, and L. Vandenberghe, editors. Handbook of semidefinite programming. International Series in Operations Research & Management Science, 27. Kluwer Academic Publishers, Boston, MA, 2000. Theory, algorithms, and applications.
- [35] Q. Zhang. Completely positive cones: Are they facially exposed? Linear algebra and its applications, 558:195–204, 2018.
- [36] Q. Zhao, S.E. Karisch, F. Rendl, and H. Wolkowicz. Semidefinite programming relaxations for the quadratic assignment problem. volume 2, pages 71–109. 1998. Semidefinite programming and interior-point approaches for combinatorial optimization problems (Toronto, ON, 1996).