New solution approaches for the maximum-reliability stochastic network interdiction problem
暂无分享,去创建一个
[1] Oktay Günlük,et al. Mixing mixed-integer inequalities , 2001, Math. Program..
[2] Sanjeeb Dash,et al. Strengthened Benders Cuts for Stochastic Integer Programs with Continuous Recourse , 2017, INFORMS J. Comput..
[3] Delbert Ray Fulkerson,et al. Maximizing the minimum source-sink path subject to a budget constraint , 1977, Math. Program..
[4] David P. Morton,et al. A Stochastic Program for Interdicting Smuggled Nuclear Material , 2003 .
[5] David P. Morton,et al. Stochastic Network Interdiction , 1998, Oper. Res..
[6] Feng Pan,et al. Minimizing a stochastic maximum‐reliability path , 2008, Networks.
[7] Laurence A. Wolsey,et al. Integer and Combinatorial Optimization , 1988 .
[8] James E. Falk,et al. Jointly Constrained Biconvex Programming , 1983, Math. Oper. Res..
[9] Richard D. Wollmer,et al. Removing Arcs from a Network , 1964 .
[10] Feng Pan,et al. Network deployment of radiation detectors with physics-based detection probability calculations , 2011, Ann. Oper. Res..
[11] David L. Woodruff,et al. Interdicting Stochastic Networks with Binary Interdiction Effort , 2003 .
[12] David K. Smith. Network Flows: Theory, Algorithms, and Applications , 1994 .
[13] M. L. Fisher,et al. An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..
[14] Gerald G. Brown,et al. Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..
[15] David P. Morton,et al. Models for nuclear smuggling interdiction , 2007 .
[16] Garth P. McCormick,et al. Computability of global solutions to factorable nonconvex programs: Part I — Convex underestimating problems , 1976, Math. Program..
[17] R. Fortet. L’algebre de Boole et ses applications en recherche operationnelle , 1960 .
[18] Alexander Schrijver,et al. Combinatorial optimization. Polyhedra and efficiency. , 2003 .
[19] B. Golden. A problem in network interdiction , 1978 .
[20] Shabbir Ahmed,et al. Maximizing a class of submodular utility functions with constraints , 2017, Math. Program..
[21] Jeff T. Linderoth,et al. Reformulation and sampling to solve a stochastic network interdiction problem , 2008 .
[22] R. Kevin Wood,et al. Deterministic network interdiction , 1993 .
[23] Alper Atamtürk,et al. Maximizing a class of submodular utility functions , 2011, Math. Program..
[24] Iain Dunning,et al. Computing in Operations Research Using Julia , 2013, INFORMS J. Comput..
[25] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.