Exact interdiction models and algorithms for disconnecting networks via node deletions
暂无分享,去创建一个
[1] J. C. Smith,et al. Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .
[2] I. Esra Buyuktahtakin,et al. Mixed integer programming approaches to lot-sizing and asset replacement problems , 2009 .
[3] Churlzu Lim,et al. Algorithms for Network Interdiction and Fortification Games , 2008 .
[4] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[5] Panos M. Pardalos,et al. Detecting critical nodes in sparse graphs , 2009, Comput. Oper. Res..
[6] Alan T. Murray,et al. Exploring the vulnerability of network infrastructure to disruption , 2008 .
[7] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[8] Ravindra K. Ahuja,et al. Network Flows: Theory, Algorithms, and Applications , 1993 .
[9] Zhou Tao,et al. Epidemic dynamics on complex networks , 2006 .
[10] Jose M. Arroyo,et al. Bilevel programming applied to power system vulnerability analysis under multiple contingencies , 2010 .
[11] R. Kevin Wood,et al. Deterministic network interdiction , 1993 .
[12] Jonathan L. Gross,et al. Handbook of graph theory , 2007, Discrete mathematics and its applications.
[13] Stephen P. Borgatti,et al. Identifying sets of key players in a social network , 2006, Comput. Math. Organ. Theory.
[14] Benjamin Fabian,et al. How Robust is the Internet? - Insights from Graph Analysis , 2014, CRiSIS.
[15] Yuhai Tu,et al. How robust is the Internet? , 2000, Nature.
[16] Mihalis Yannakakis,et al. Node-and edge-deletion NP-complete problems , 1978, STOC.
[17] Marco Di Summa,et al. Complexity of the critical node problem over trees , 2011, Comput. Oper. Res..
[18] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[19] Ali Ridha Mahjoub,et al. Design of Survivable Networks: A survey , 2005, Networks.
[20] David P. Morton,et al. Stochastic Network Interdiction , 1998, Oper. Res..
[21] Alan T. Murray,et al. A Methodological Overview of Network Vulnerability Analysis , 2008 .
[22] Ibrahim. Akgun. The K-Group Maximum-Flow Network-Interdiction Problem , 2000 .
[23] Taieb Znati,et al. On Approximation of New Optimization Methods for Assessing Network Vulnerability , 2010, 2010 Proceedings IEEE INFOCOM.
[24] Jonathan Cole Smith,et al. Survivable network design under optimal and heuristic interdiction scenarios , 2007, J. Glob. Optim..
[25] Hanif D. Sherali,et al. Exploiting Special Structures in Constructing a Hierarchy of Relaxations for 0-1 Mixed Integer Problems , 1998, Oper. Res..
[26] Pablo Alvarez,et al. Tri-level optimization models to defend critical infrastructure , 2007 .
[27] David L. Alderson,et al. OR FORUM - Catching the "Network Science" Bug: Insight and Opportunity for the Operations Researcher , 2008, Oper. Res..
[28] J. Cole Smith,et al. Dynamic-programming-based inequalities for the capacitated lot-sizing problem , 2010 .
[29] Panos M. Pardalos,et al. Handbook of Optimization in Telecommunications , 2006 .
[30] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[31] Jonathan Cole Smith,et al. Polynomial‐time algorithms for solving a class of critical node problems on trees and series‐parallel graphs , 2012, Networks.