A bi-level programming model for protection of hierarchical facilities under imminent attacks
暂无分享,去创建一个
Majid Salari | Farzad Dehghanian | Nasrin Aliakbarian | F. Dehghanian | M. Salari | Nasrin Aliakbarian
[1] Heinrich von Stackelberg,et al. Stackelberg (Heinrich von) - The Theory of the Market Economy, translated from the German and with an introduction by Alan T. PEACOCK. , 1953 .
[2] Richard D. Wollmer,et al. Removing Arcs from a Network , 1964 .
[3] Richard L. Church,et al. Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .
[4] Richard L. Church,et al. On a bi-level formulation to protect uncapacitated p-median systems with facility recovery time and frequent disruptions , 2010, Electron. Notes Discret. Math..
[5] Daniel Aloise,et al. A simple and effective genetic algorithm for the two-stage capacitated facility location problem , 2014, Comput. Ind. Eng..
[6] Maria Paola Scaparra,et al. Hedging against disruptions with ripple effects in location analysis , 2012 .
[7] C. D. Gelatt,et al. Optimization by Simulated Annealing , 1983, Science.
[8] F.D. Galiana,et al. A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat , 2005, IEEE Transactions on Power Systems.
[9] Deniz Aksen,et al. A bilevel partial interdiction problem with capacitated facilities and demand outsourcing , 2014, Comput. Oper. Res..
[10] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[11] J. Bard,et al. An algorithm for the discrete bilevel programming problem , 1992 .
[12] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[13] Vedat Verter,et al. Incorporating the threat of terrorist attacks in the design of public service facility networks , 2012, Optim. Lett..
[14] Jonathan F. Bard,et al. The Mixed Integer Linear Bilevel Programming Problem , 1990, Oper. Res..
[15] John D. Moteff,et al. Critical Infrastructure and Key Assets: Definition and Identification , 2004 .
[16] Deniz Aksen,et al. A bilevel fixed charge location model for facilities under imminent attack , 2012, Comput. Oper. Res..
[17] Richard L. Church,et al. Production , Manufacturing and Logistics An exact solution approach for the interdiction median problem with fortification , 2008 .
[18] Maria Paola Scaparra,et al. Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification , 2011, Comput. Oper. Res..
[19] W. C. Turner,et al. Optimal interdiction policy for a flow network , 1971 .
[20] Mercedes Landete,et al. Design and analysis of hybrid metaheuristics for the Reliability p-Median Problem , 2012, Eur. J. Oper. Res..
[21] Richard L. Church,et al. A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..
[22] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[23] Necati Aras,et al. The budget constrained r-interdiction median problem with capacity expansion , 2010, Central Eur. J. Oper. Res..
[24] J. C. Smith,et al. Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .
[25] Pierre Hansen,et al. Variable Neighborhood Search , 2018, Handbook of Heuristics.
[26] Alan W. McMasters,et al. Optimal interdiction of a supply network , 1970 .
[27] F. Wilcoxon. Individual Comparisons by Ranking Methods , 1945 .
[28] V. Cerný. Thermodynamical approach to the traveling salesman problem: An efficient simulation algorithm , 1985 .
[29] R. D. Galvão,et al. A hierarchical model for the location of perinatal facilities in the municipality of Rio de Janeiro , 2002, Eur. J. Oper. Res..
[30] Haldun Süral,et al. A review of hierarchical facility location models , 2007, Comput. Oper. Res..
[31] Richard L. Church,et al. Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .
[32] David Pisinger,et al. Large Neighborhood Search , 2018, Handbook of Metaheuristics.
[33] David P. Morton,et al. Stochastic Network Interdiction , 1998, Oper. Res..
[34] Marianthi G. Ierapetritou,et al. Resolution method for mixed integer bi-level linear problems based on decomposition technique , 2009, J. Glob. Optim..
[35] R. Kevin Wood,et al. Deterministic network interdiction , 1993 .
[36] Reza Zanjirani Farahani,et al. Hierarchical facility location problem: Models, classifications, techniques, and applications , 2014, Comput. Ind. Eng..