A two-resource allocation algorithm with an application to large-scale zero-sum defensive games
暂无分享,去创建一个
[1] P. Douglas. The Cobb-Douglas Production Function Once Again: Its History, Its Testing, and Some New Empirical Values , 1976, Journal of Political Economy.
[2] Stephan Dempe,et al. A Minimax Resource Allocation Problem with Variable Resources , 2002, Eur. J. Oper. Res..
[3] Zhen Xie,et al. Optimal response to attacks on the open science grid , 2011, Comput. Networks.
[4] Natalia Alguacil,et al. A trilevel programming approach for electric grid defense planning , 2014, Comput. Oper. Res..
[5] Hanan Luss,et al. On Equitable Resource Allocation Problems: A Lexicographic Minimax Approach , 1999, Oper. Res..
[6] Uriel G. Rothblum,et al. Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..
[7] Vicki M. Bier,et al. Methodology for identifying near-optimal interdiction strategies for a power transmission system , 2007, Reliab. Eng. Syst. Saf..
[8] Hanan Luss. Equitable Resource Allocation: Models, Algorithms and Applications , 2012 .
[9] Tagish iSite,et al. The George B , 2010 .
[10] Naoki Katoh,et al. Resource Allocation Problems , 1998 .
[11] Kim-Chuan Toh,et al. SDPT3 -- A Matlab Software Package for Semidefinite Programming , 1996 .
[12] Martin C. Libicki. Cyberdeterrence and Cyberwar , 2009 .
[13] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[14] Uriel G. Rothblum,et al. Allocating multiple defensive resources in a zero-sum game setting , 2015, Ann. Oper. Res..
[15] Wei Yuan,et al. Optimal power grid protection through a defender-attacker-defender model , 2014, Reliab. Eng. Syst. Saf..
[16] Ronald L. Rivest,et al. Introduction to Algorithms, third edition , 2009 .
[17] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[18] R. Wets,et al. George B . Dantzig ( 1914 – 2005 ) , 2007 .
[19] Stephen J. Wright. Primal-Dual Interior-Point Methods , 1997, Other Titles in Applied Mathematics.
[20] R. Armstrong,et al. An Efficient Algorithm for a Class of Two-Resource Allocation Problems , 1998, INFORMS J. Comput..
[21] G. Cho. A NEW PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR OPTIMIZATION , 2009 .
[22] L. Berkovitz. Convexity and Optimization in Rn , 2001 .
[23] T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[24] Gregory Levitin,et al. Redundancy vs. Protection vs. False Targets for Systems Under Attack , 2009, IEEE Transactions on Reliability.
[25] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .
[26] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[27] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[28] Nimrod Megiddo,et al. A Two-Resource Allocation Problem Solvable in Linear Time , 1985, Math. Oper. Res..
[29] Lorenz T. Biegler,et al. On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming , 2006, Math. Program..