A bilevel mixed-integer program for critical infrastructure protection planning

Computers & Operations Research - Tập 35 - Trang 1905-1923 - 2008
Maria P. Scaparra1, Richard L. Church2
1Kent Business School, University of Kent, Canterbury, Kent, UK
2Department of Geography, University of California, Santa Barbara, CA, USA

Tài liệu tham khảo

Church RL, Scaparra MP. Protecting critical assets: the r-interdiction median problem with fortification. Geographical Analysis, 2006, forthcoming. Hakimi, 1964, Optimum location of switching centers and the absolute centers and medians of a graph, Operations Research, 12, 450, 10.1287/opre.12.3.450 Scaparra MP, Church RL. An optimal approach for the interdiction median problem with fortification. Working paper no. 78, Kent Business School, 2005. University of Kent, UK (Available at 〈http://www.kent.ac.uk/kbs/research-information/working-papers/)〉. Wollmer, 1964, Removing arcs from a network, Operations Research, 12, 934, 10.1287/opre.12.6.934 Wood, 1993, Deterministic network interdiction, Mathematical and Computer Modeling, 17, 1, 10.1016/0895-7177(93)90236-R Church, 2004, Identifying critical infrastructure: the median and covering facility interdiction problems, Annals of the Association of American Geographers, 94, 491, 10.1111/j.1467-8306.2004.00410.x Brown GG, Carlyle WM, Salmeron J, Wood K. Analyzing the vulnerability of critical infrastructure to attack and planning defenses. In: Greenberg HJ, series editor. Smith JC. volume editor, Tutorial in operations research: emerging theory, methods, and applications, INFORMS 2005. 2005. Hansen, 1992, New branch and bound rules for linear bilevel programming, SIAM Journal on Scientific and Statistical Computing, 13, 1194, 10.1137/0913069 Salmeron, 2004, Analysis of electric grid security under terrorist threat, IEEE Transactions on Power Systems, 19, 905, 10.1109/TPWRS.2004.825888 Jüttner, 2003, Supply chain risk management: outlining an agenda for future research, International Journal of Logistics: Research and Applications, 6, 197, 10.1080/13675560310001627016 Sheffi, 2001, Supply chain management under the threat of international terrorism, International Journal of Logistics Management, 12, 1, 10.1108/09574090110806262 Rice, 2003, Building a secure and resilient supply network, Supply Chain Management Review, 7, 22 Ball, 1995, Network reliability, vol. 7, 673 Raghavan, 1997, Network connectivity, 335 Balakrishnan, 2003, Connectivity-splitting models for survivable network design, Networks, 43, 10, 10.1002/net.10100 Drezner, 1987, Heuristic solution methods for two location problems with unreliable facilities, Journal of the Operational Research Society, 38, 509, 10.1057/jors.1987.88 Lee, 2001, On solving unreliable planar location problems, Computers and Operations Research, 28, 329, 10.1016/S0305-0548(99)00120-3 Bundschuh M, Klabjan D, Thurston DL. Modelling robust and reliable supply chains. Working paper, University of Illinois at Urbana-Champaign, 2003. Snyder, 2005, Reliability models for facility location: the expected failure cost case, Transportation Science, 39, 400, 10.1287/trsc.1040.0107 O’Hanley JR. Optimizing reserve selection planning in the face of uncertain site loss. PhD thesis, Department of Environmental Science, Policy and Management, University of California, Berkeley, 2005. Cormican, 1998, Stochastic network interdiction, Operations Research, 46, 184, 10.1287/opre.46.2.184 Fulkerson, 1977, Maximizing the minimum source-sink path subject to a budget constraint, Mathematical Programming, 13, 116, 10.1007/BF01584329 Israeli, 2002, Shortest-path network interdiction, Networks, 40, 97, 10.1002/net.10039 Lim C, Smith JC. Algorithms for discrete and continuous multicommodity flow network interdiction problems, IIE Transactions 2006, to appear. Israeli E. System interdiction and defense. PhD dissertation, Operations Research Department, Naval Post Graduate School, Monterey, CA, 1999. Stackelberg, 1952 Church RL, Cohon JL. Multiobjective location analysis of regional energy facility siting problems. Report prepared for the US Energy Research and Development Administration (BNL 50567), 1976. Hanjoul, 1987, A facility location problem with clients’ preference orderings, Regional Science and Urban Economics, 17, 451, 10.1016/0166-0462(87)90011-1 Bard, 1998 Dempe, 2002 Moore, 1990, The mixed integer linear bilevel programming problem, Operations Research, 38, 911, 10.1287/opre.38.5.911 Vicente, 1996, Discrete linear bilevel programming problem, Journal of Optimization Theory and Applications, 89, 597, 10.1007/BF02275351 Karlof, 1996, Bilevel programming applied to the flow shop scheduling problem, Computers and Operations Research, 23, 443, 10.1016/0305-0548(95)00034-8 Morton DP, Pan F.,Saegar KJ. Models for nuclear smuggling interdiction. In: Higle JL, Römisch W, editors, Stochastic Programing E-Print Series (SPEPS); 2006-5. Ahuja, 1993 Church, 2003, COBRA: a new formulation of the classic p-median location problem, Annals of Operations Research, 122, 103, 10.1023/A:1026142406234 Goodchild M, Noronha V. Location-allocation for small computers. Monograph No. 8., Department of Geography, The University of Iowa, Iowa City, 1983. Alp, 2003, An efficient genetic algorithm for the p-median problem, Annals of Operations Research, 122, 21, 10.1023/A:1026130003508 Gerrard, 1996, Closest assignment constraints and location models: properties and structure, Location Science, 4, 251, 10.1016/S0966-8349(97)00001-6 Rojeski, 1970, Central facilities location under an investment constraint, Geographical Analysis, 2, 343, 10.1111/j.1538-4632.1970.tb00864.x