The Minimum Vulnerability Problem
暂无分享,去创建一个
[1] Guy Kortsarz,et al. On network design problems: fixed cost flows and the covering steiner problem , 2002, TALG.
[2] Andrew V. Goldberg,et al. Beyond the flow decomposition barrier , 1998, JACM.
[3] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[4] Aravind Srinivasan,et al. Approximation algorithms for the covering Steiner problem , 2002, Random Struct. Algorithms.
[5] Sven O. Krumke,et al. Flow Improvement and Network Flows with Fixed Costs , 1999 .
[6] Matthew Franklin,et al. Complexity and security of distributed protocols , 1994 .
[7] Mei Yang,et al. Dual-Homing Based Scalable Partia Multicast Protection , 2006, IEEE Transactions on Computers.
[8] Mei Yang,et al. Minimum-Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network , 2010, IEEE/ACM Transactions on Networking.
[9] Robert D. Carr,et al. Strengthening integrality gaps for capacitated network design and covering problems , 2000, SODA '00.
[10] R. Ravi,et al. A polylogarithmic approximation algorithm for the group Steiner tree problem , 2000, SODA '98.
[11] Mei Yang,et al. Minimum cost paths subject to minimum vulnerability for reliable communications , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).
[12] Hamid Zarrabi-Zadeh,et al. Finding paths with minimum shared edges , 2011, J. Comb. Optim..
[13] David P. Williamson,et al. The Design of Approximation Algorithms , 2011 .