Evader interdiction: algorithms, complexity and collateral damage
暂无分享,去创建一个
Alexander Gutfraind | Matthew P. Johnson | Kiyan Ahmadizadeh | Kiyan Ahmadizadeh | A. Gutfraind | Matthew P. Johnson
[1] Shimon Even,et al. Graph Algorithms: Contents , 2011 .
[2] Shimon Even,et al. Graph Algorithms , 1979 .
[3] Fanica Gavril,et al. Algorithms for Minimum Coloring, Maximum Clique, Minimum Covering by Cliques, and Maximum Independent Set of a Chordal Graph , 1972, SIAM J. Comput..
[4] Robin Thomas,et al. Efficiently four-coloring planar graphs , 1996, STOC '96.
[5] H. W. Corley,et al. Finding the n Most Vital Nodes in a Flow Network , 1974 .
[6] Mohit Singh,et al. Approximating the k-multicut problem , 2006, SODA '06.
[7] Feng Pan,et al. Interdiction of a Markovian Evader , 2010, ICS 2011.
[8] Guy Kortsarz,et al. The checkpoint problem , 2012, Theor. Comput. Sci..
[9] Mihalis Yannakakis,et al. Primal-dual approximation algorithms for integral flow and multicut in trees , 1997, Algorithmica.
[10] Satoru Iwata,et al. Submodular Function Minimization under Covering Constraints , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[11] Samir Khuller,et al. The complexity of finding most vital arcs and nodes , 1995 .
[12] Subhash Khot,et al. Vertex cover might be hard to approximate to within 2-/spl epsiv/ , 2003, 18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings..
[13] Frank Nielsen,et al. Maintenance of a Piercing Set for Intervals with Applications , 2000, Algorithmica.
[14] Christos Koufogiannakis,et al. Greedy Δ-Approximation Algorithm for Covering with Arbitrary Constraints and Submodular Cost , 2013, Algorithmica.
[15] Noga Alon,et al. Improved approximation for directed cut problems , 2007, STOC '07.
[16] H. W. Corley,et al. Most vital links and nodes in weighted networks , 1982, Oper. Res. Lett..
[17] Alan W. McMasters,et al. Optimal interdiction of a supply network , 1970 .
[18] Feng Pan,et al. Optimal Interdiction of Unreactive Markovian Evaders , 2009, CPAIOR.
[19] Frank Nielsen,et al. Fast stabbing of boxes in high dimensions , 1996, Theor. Comput. Sci..
[20] N. Megiddo,et al. The Maximum Coverage Location Problem , 1983 .
[21] Donald B. Johnson,et al. Finding All the Elementary Circuits of a Directed Graph , 1975, SIAM J. Comput..
[22] Toshihide Ibaraki,et al. Constant Ratio Approximation Algorithms for the Rectangle Stabbing Problem and the Rectilinear Partitioning Problem , 2000, J. Algorithms.
[23] Pauli Miettinen,et al. On the Positive-Negative Partial Set Cover problem , 2008, Inf. Process. Lett..
[24] S. Lubore,et al. Finding the N most vital links in flow networks , 2011 .
[25] Danny Segev,et al. Partial multicuts in trees , 2006, Theor. Comput. Sci..
[26] David P. Morton,et al. A Stochastic Program for Interdicting Smuggled Nuclear Material , 2003 .
[27] Ariel Rubinstein,et al. A study in the pragmatics of persuasion: a game theoretical approach , 2006 .
[28] Dror Rawitz,et al. Algorithms for capacitated rectangle stabbing and lot sizing with joint set-up costs , 2008, TALG.
[29] Bengt Sennblad,et al. The gene evolution model and computing its associated probabilities , 2009, JACM.
[30] Wen-Lian Hsu,et al. Linear Time Algorithms on Circular-Arc Graphs , 1991, Inf. Process. Lett..
[31] David Zuckerman. Linear Degree Extractors and the Inapproximability of Max Clique and Chromatic Number , 2007, Theory Comput..
[32] David L. Woodruff,et al. Network Interdiction and Stochastic Integer Programming , 2013 .
[33] David S. Johnson,et al. Some simplified NP-complete problems , 1974, STOC '74.