Partial interdiction median models for multi-sourcing supply systems
暂无分享,去创建一个
Zheng Zheng | Shaohui Zhang | Wen-Bo Du | Xiaoyi Zhang | Wen Du | Shaohui Zhang | Xiaoyi Zhang | Zheng Zheng
[1] António Pais Antunes,et al. A hierarchical location model for public facility planning , 2008, Eur. J. Oper. Res..
[2] Deniz Aksen,et al. A bilevel partial interdiction problem with capacitated facilities and demand outsourcing , 2014, Comput. Oper. Res..
[3] Mark S. Daskin,et al. Planning for Disruptions in Supply Chain Networks , 2006 .
[4] Kai-Yuan Cai,et al. Protection issues for supply systems involving random attacks , 2014, Comput. Oper. Res..
[5] Pierre Hansen,et al. New Branch-and-Bound Rules for Linear Bilevel Programming , 1989, SIAM J. Sci. Comput..
[6] Kai-Yuan Cai,et al. A Distributed Protective Approach for Multiechelon Supply Systems , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.
[7] Alan T. Murray,et al. Critical network infrastructure analysis: interdiction and system flow , 2007, J. Geogr. Syst..
[8] Robert G. Jeroslow,et al. The polynomial hierarchy and a simple model for competitive analysis , 1985, Math. Program..
[9] Maria Paola Scaparra,et al. Hedging against disruptions with ripple effects in location analysis , 2012 .
[10] S. L. Hakimi,et al. Optimum Locations of Switching Centers and the Absolute Centers and Medians of a Graph , 1964 .
[11] Richard L. Church,et al. Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .
[12] P. Shi,et al. The 2011 eastern Japan great earthquake disaster: Overview and comments , 2011 .
[13] M. P. Scaparra,et al. Protecting Supply Systems to Mitigate Potential Disaster , 2012 .
[14] Zhu Yue-n. Leader-follower hierachical decision model for critical infrastructure protection and its solving algorithm , 2014 .
[15] Heinrich von Stackelberg,et al. Stackelberg (Heinrich von) - The Theory of the Market Economy, translated from the German and with an introduction by Alan T. PEACOCK. , 1953 .
[16] George Q. Huang,et al. Optimal configuration of cluster supply chains with augmented Lagrange coordination , 2015, Comput. Ind. Eng..
[17] Kai-Yuan Cai,et al. The r-interdiction median problem with probabilistic protection and its solution algorithm , 2013, Comput. Oper. Res..
[18] Richard L. Church,et al. Production , Manufacturing and Logistics An exact solution approach for the interdiction median problem with fortification , 2008 .
[19] George Q. Huang,et al. Optimal configuration of assembly supply chains using analytical target cascading , 2010 .
[20] Richard D. Wollmer,et al. Removing Arcs from a Network , 1964 .
[21] George Q. Huang,et al. Extending analytical target cascading for optimal supply chain network configuration of a product family , 2009, Int. J. Comput. Integr. Manuf..
[22] Chase Rainwater,et al. Robust facility location: Hedging against failures , 2014, Reliab. Eng. Syst. Saf..
[23] Richard L. Church,et al. Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .
[24] Hugh R. Medal,et al. A multi-objective integrated facility location-hardening model: Analyzing the pre- and post-disruption tradeoff , 2014, Eur. J. Oper. Res..
[25] Richard L. Church,et al. The stochastic interdiction median problem with disruption intensity levels , 2012, Ann. Oper. Res..
[26] Ting Qu,et al. Extending analytical target cascading for optimal configuration of supply chains with alternative autonomous suppliers , 2008 .
[27] Richard L. Church,et al. A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..
[28] J. Cole Smith,et al. Basic Interdiction Models , 2010 .
[29] Vedat Verter,et al. Incorporating the threat of terrorist attacks in the design of public service facility networks , 2012, Optim. Lett..
[30] Alan T. Murray. An overview of network vulnerability modeling approaches , 2013 .
[31] Necati Aras,et al. A Bilevel p-median model for the planning and protection of critical facilities , 2013, J. Heuristics.
[32] Jie Lu,et al. The Definition of Optimal Solution and an Extended Kuhn-Tucker Approach for Fuzzy Linear Bilevel Programming , 2005, IEEE Intell. Informatics Bull..
[33] Necati Aras,et al. A Matheuristic for Leader-Follower Games Involving Facility Location-Protection-Interdiction Decisions , 2013 .
[34] S. Hakimi. Optimum Distribution of Switching Centers in a Communication Network and Some Related Graph Theoretic Problems , 1965 .
[35] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[36] Alan T. Murray,et al. Vital Nodes, Interconnected Infrastructures, and the Geographies of Network Survivability , 2006 .
[37] Xuwei Qin,et al. A two-stage stochastic mixed-integer program for the capacitated logistics fortification planning under accidental disruptions , 2013, Computers & industrial engineering.
[38] Jonathan F. Bard,et al. Practical Bilevel Optimization: Algorithms and Applications , 1998 .
[39] J. C. Smith,et al. Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .
[40] George Q. Huang,et al. A generic analytical target cascading optimization system for decentralized supply chain configuration over supply chain grid , 2010 .
[41] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[42] David P. Morton,et al. Stochastic Network Interdiction , 1998, Oper. Res..
[43] Necati Aras,et al. The budget constrained r-interdiction median problem with capacity expansion , 2010, Central Eur. J. Oper. Res..
[44] Fei Tao,et al. Big Data in product lifecycle management , 2015, The International Journal of Advanced Manufacturing Technology.
[45] C. L. Philip Chen,et al. Data-intensive applications, challenges, techniques and technologies: A survey on Big Data , 2014, Inf. Sci..
[46] Natalia Alguacil,et al. A trilevel programming approach for electric grid defense planning , 2014, Comput. Oper. Res..
[47] Maria Paola Scaparra,et al. Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification , 2011, Comput. Oper. Res..
[48] George B.Richardson. The Theory of the Market Economy. , 1995, Revue économique.
[49] Da Ruan,et al. An Extended Branch and Bound Algorithm for bilevel Multi-Follower Decision Making in a Referential-Uncooperative Situation , 2007, Int. J. Inf. Technol. Decis. Mak..
[50] R. Kevin Wood,et al. Deterministic network interdiction , 1993 .