메뉴 건너뛰기




Volumn 39, Issue 1, 2007, Pages 3-14

Models for nuclear smuggling interdiction

Author keywords

Integer programming; Network interdiction; Stochastic programming

Indexed keywords

INTEGER PROGRAMMING; MATHEMATICAL MODELS; OPTIMIZATION; PROBABILITY DISTRIBUTIONS; SENSORS; STOCHASTIC PROGRAMMING;

EID: 33750629476     PISSN: 0740817X     EISSN: 15458830     Source Type: Journal    
DOI: 10.1080/07408170500488956     Document Type: Article
Times cited : (185)

References (39)
  • 2
    • 33750625838 scopus 로고    scopus 로고
    • Network interdiction under asymmetric information
    • Pittsburgh PA: Industrial Engineering Department, University of Pittsburgh. Technical report, 15260
    • Bailey, M. and Bayrak, H.(2005) Network interdiction under asymmetric information. Pittsburgh PA: Industrial Engineering Department, University of Pittsburgh. Technical report, 15260
    • (2005)
    • Bailey, M.1    Bayrak, H.2
  • 3
    • 33750609259 scopus 로고    scopus 로고
    • SPAR: Stochastic programming with adversarial recourse
    • Pittsburgh PA: Industrial Engineering Department, University of Pittsburgh. Technical report, 15260
    • Bailey, M. and Shechter, S. and Schaefer, A.(2004) SPAR: Stochastic programming with adversarial recourse. Pittsburgh PA: Industrial Engineering Department, University of Pittsburgh. Technical report, 15260
    • (2004)
    • Bailey, M.1    Shechter, S.2    Schaefer, A.3
  • 4
    • 33749267914 scopus 로고    scopus 로고
    • The US second line of defense: Preventing nuclear smuggling across Russia's borders
    • Washington DC: Center for the Strategic and International Studies. PONARS memo # 50
    • Ball, D.(1998) The US second line of defense: Preventing nuclear smuggling across Russia's borders. Washington DC: Center for the Strategic and International Studies. PONARS memo # 50
    • (1998)
    • Ball, D.1
  • 5
    • 0024640458 scopus 로고
    • Finding the most vital arcs in a network
    • [CSA]
    • Ball, M. and Golden, B. and Vohra, R. (1989) Finding the most vital arcs in a network Operations Research Letters, 8, pp. 73-76. http://www.csa.com/htbin/linkabst.cgi?issn=0167-6377&vol=8&iss= &firstpage=73[CSA]
    • (1989) Operations Research Letters , vol.8 , pp. 73-76
    • Ball, M.1    Golden, B.2    Vohra, R.3
  • 6
    • 0026114683 scopus 로고
    • Some properties of the bilevel programming problem
    • [CSA] http://dx.doi.org/10.1007%2FBF00941574
    • Bard, J. (1991) Some properties of the bilevel programming problem Journal of Optimization Theory and Applications, 68, pp. 371-378. http:// www.csa.com/htbin/linkabst.cgi?issn=0022-3239&vol=68&iss= &firstpage=371 http://dx.doi.org/10.1007%2FBF00941574
    • (1991) Journal of Optimization Theory and Applications , vol.68 , pp. 371-378
    • Bard, J.1
  • 8
    • 0027606149 scopus 로고
    • Bi-level linear programming
    • http://dx.doi.org/10.1016%2F0305-0548%2893%2990013-9
    • Ben-Ayed, O. (1993) Bi-level linear programming Computers & Operations Research, 20, pp. 485-501. http://www.csa.com/htbin/ linkabst.cgi?issn=0305-0548&vol=20&iss=&firstpage=485 http://dx.doi.org/10.1016%2F0305-0548%2893%2990013-9
    • (1993) Computers & Operations Research , vol.20 , pp. 485-501
    • Ben-Ayed, O.1
  • 9
    • 9644308639 scopus 로고
    • Partitioning procedures for solving mixed-variables programming problems
    • http://dx.doi.org/10.1007%2FBF01386316
    • Benders, J. (1962) Partitioning procedures for solving mixed-variables programming problems Numerische Mathematik, 4, pp. 238-252. http://www.csa.com/htbin/linkabst.cgi?issn=0029-599X&vol=4&iss= &firstpage=238 http://dx.doi.org/10.1007%2FBF01386316
    • (1962) Numerische Mathematik , vol.4 , pp. 238-252
    • Benders, J.1
  • 10
    • 33750613363 scopus 로고    scopus 로고
    • How to optimally interdict a belligerent project to develop a nuclear weapon
    • Monterey CA: Operations Research Department, Naval Postgraduate School. Technical report, 93943
    • Brown, G. and Carlyle, M. and Harney, R. and Skroch, E. and Wood, R.(2004) How to optimally interdict a belligerent project to develop a nuclear weapon. Monterey CA: Operations Research Department, Naval Postgraduate School. Technical report, 93943
    • (2004)
    • Brown, G.1    Carlyle, M.2    Harney, R.3    Skroch, E.4    Wood, R.5
  • 11
    • 33749250103 scopus 로고
    • Interdicting the activities of a linear program - A parametric approach
    • http://dx.doi.org/10.1016%2F0377-2217%2894%2900057-J
    • Chern, M. and Lin, K. (1995) Interdicting the activities of a linear program - a parametric approach European Journal of Operational Research, 86, pp. 580-591. http://www.csa.com/htbin/linkabst.cgi?issn= 0377-2217&vol=86&iss=&firstpage=580 http://dx.doi.org/ 10.1016%2F0377-2217%2894%2900057-J
    • (1995) European Journal of Operational Research , vol.86 , pp. 580-591
    • Chern, M.1    Lin, K.2
  • 12
    • 33750627579 scopus 로고    scopus 로고
    • Statement of Associate Director, Threat Reduction, Los Alamos National Laboratory, submitted to Committee on Energy and Natural Resources, US Senate, July 10
    • Cobb, D.(2002) Statement of Associate Director, Threat Reduction, Los Alamos National Laboratory, submitted to Committee on Energy and Natural Resources, US Senate, July 10
    • (2002)
    • Cobb, D.1
  • 13
    • 0020175509 scopus 로고
    • Most vital links and nodes in weighted networks
    • http://dx.doi.org/10.1016%2F0167-6377%2882%2990020-7
    • Corley, H. and Sha, D. (1982) Most vital links and nodes in weighted networks Operations Research Letters, 1, pp. 157-160. http://www.csa.com/ htbin/linkabst.cgi?issn=0167-6377&vol=1&iss=&firstpage=157 http://dx.doi.org/10.1016%2F0167-6377%2882%2990020-7
    • (1982) Operations Research Letters , vol.1 , pp. 157-160
    • Corley, H.1    Sha, D.2
  • 14
    • 0032024334 scopus 로고    scopus 로고
    • Stochastic network interdiction
    • Cormican, K. and Morton, D. and Wood, R. (1998) Stochastic network interdiction Operations Research, 46, pp. 184-197. http://www.csa.com/ htbin/linkabst.cgi?issn=0030-364X&vol=46&iss=&firstpage=184
    • (1998) Operations Research , vol.46 , pp. 184-197
    • Cormican, K.1    Morton, D.2    Wood, R.3
  • 15
    • 0000096090 scopus 로고
    • Maximizing the minimum source-sink path subject to a budget constraint
    • http://dx.doi.org/10.1007%2FBF01584329
    • Fulkerson, D. and Harding, G. (1977) Maximizing the minimum source-sink path subject to a budget constraint Mathematical Programming, 13, pp. 116-118. http://www.csa.com/htbin/linkabst.cgi?issn=0025-5610&vol= 13&iss=&firstpage=116 http://dx.doi.org/10.1007%2FBF01584329
    • (1977) Mathematical Programming , vol.13 , pp. 116-118
    • Fulkerson, D.1    Harding, G.2
  • 16
    • 0015419856 scopus 로고
    • Generalized Benders decomposition
    • http://dx.doi.org/10.1007%2FBF00934810
    • Geoffrion, A. (1972) Generalized Benders decomposition Journal of Optimization Theory and Applications, 10, pp. 237-260. http://www.csa.com/htbin/linkabst.cgi?issn=0022-3239&vol=10&iss= &firstpage=237 http://dx.doi.org/10.1007%2FBF00934810
    • (1972) Journal of Optimization Theory and Applications , vol.10 , pp. 237-260
    • Geoffrion, A.1
  • 17
    • 0141444512 scopus 로고
    • Optimal interdiction policy for a flow network
    • Ghare, P. and Montgomery, D. and Turner, T. (1971) Optimal interdiction policy for a flow network Naval Research Logistics Quarterly, 18, pp. 37-45. http://www.csa.com/htbin/linkabst.cgi?issn=0028-1441&vol= 18&iss=&firstpage=37
    • (1971) Naval Research Logistics Quarterly , vol.18 , pp. 37-45
    • Ghare, P.1    Montgomery, D.2    Turner, T.3
  • 18
    • 0141444514 scopus 로고
    • A problem in network interdiction
    • Golden, B. (1978) A problem in network interdiction Naval Research Logistics Quarterly, 25, pp. 711-713. http://www.csa.com/htbin/ linkabst.cgi?issn=0028-1441&vol=25&iss=&firstpage=711
    • (1978) Naval Research Logistics Quarterly , vol.25 , pp. 711-713
    • Golden, B.1
  • 20
    • 33750626651 scopus 로고    scopus 로고
    • Illicit nuclear trafficking database
    • International Atomic Energy Agency. International Atomic Energy Agency. available at. Accessed 25 September 2006
    • International Atomic Energy Agency.(2004) Illicit nuclear trafficking database. International Atomic Energy Agency. available at http://www.iaea.org/NewsCenter/Features/RadSources/Fact_Figureshtml Accessed 25 September 2006
    • (2004)
  • 22
    • 0141556071 scopus 로고    scopus 로고
    • System interdiction and defense
    • Monterey CA: Operations Research Department, Naval Postgraduate School. Working paper, 93943
    • Israeli, E. and Wood, R.(2001) System interdiction and defense. Monterey CA: Operations Research Department, Naval Postgraduate School. Working paper, 93943
    • (2001)
    • Israeli, E.1    Wood, R.2
  • 23
    • 0141764679 scopus 로고    scopus 로고
    • Shortest-path network interdiction
    • http://dx.doi.org/10.1002%2Fnet.10039
    • Israeli, E. and Wood, R. (2002) Shortest-path network interdiction Networks, 40, pp. 97-111. http://www.csa.com/htbin/linkabst.cgi?issn= 1566-113X&vol=40&iss=&firstpage=97 http://dx.doi.org/ 10.1002%2Fnet.10039
    • (2002) Networks , vol.40 , pp. 97-111
    • Israeli, E.1    Wood, R.2
  • 24
    • 84988271380 scopus 로고    scopus 로고
    • Nuclear nonproliferation: US efforts to help other countries combat nuclear smuggling need strengthened coordination and planning
    • Report to the Ranking Minority Member, Subcommittee on Emerging Threats, and Capabilities, Committee on Armed Services, US Senate, GAO-02-426, May 2002
    • Jones, G.(2002) Nuclear nonproliferation: US efforts to help other countries combat nuclear smuggling need strengthened coordination and planning, Report to the Ranking Minority Member, Subcommittee on Emerging Threats, and Capabilities, Committee on Armed Services, US Senate, GAO-02-426, May 2002
    • (2002)
    • Jones, G.1
  • 25
    • 0001547779 scopus 로고
    • The cutting plane method for solving convex programs
    • http://dx.doi.org/10.1137%2F0108053
    • Kelley, J. (1960) The cutting plane method for solving convex programs SIAM Journal of Industrial and Applied Mathematics, 8, pp. 703-712. http://www.csa.com/htbin/linkabst.cgi?issn=&vol=8&iss= &firstpage=703 http://dx.doi.org/10.1137%2F0108053
    • (1960) SIAM Journal of Industrial and Applied Mathematics , vol.8 , pp. 703-712
    • Kelley, J.1
  • 26
    • 0000415520 scopus 로고
    • The integer L-shaped method for stochastic integer programs with complete recourse
    • http://dx.doi.org/10.1016%2F0167-6377%2893%2990002-X
    • Laporte, G. and Louveaux, F. (1993) The integer L-shaped method for stochastic integer programs with complete recourse Operations Research Letters, 13, pp. 133-142. http://www.csa.com/htbin/linkabst.cgi?issn= 0167-6377&vol=13&iss=&firstpage=133 http://dx.doi.org/ 10.1016%2F0167-6377%2893%2990002-X
    • (1993) Operations Research Letters , vol.13 , pp. 133-142
    • Laporte, G.1    Louveaux, F.2
  • 27
    • 0024716461 scopus 로고
    • The k-most vital arcs in the shortest path problem
    • http://dx.doi.org/10.1016%2F0167-6377%2889%2990065-5
    • Malik, K. and Mittal, A. and Gupta, S. (1989) The k-most vital arcs in the shortest path problem Operations Research Letters, 8, pp. 223-227. http://www.csa.com/htbin/linkabst.cgi?issn=0167-6377&vol=8&iss= &firstpage=223 http://dx.doi.org/10.1016%2F0167-6377%2889%2990065-5
    • (1989) Operations Research Letters , vol.8 , pp. 223-227
    • Malik, K.1    Mittal, A.2    Gupta, S.3
  • 28
    • 0141556069 scopus 로고
    • Optimal interdiction of a supply network
    • McMasters, A. and Mustin, T. (1970) Optimal interdiction of a supply network Naval Research Logistics Quarterly, 17, pp. 261-268. http://www.csa.com/htbin/linkabst.cgi?issn=0028-1441&vol=17&iss= &firstpage=261
    • (1970) Naval Research Logistics Quarterly , vol.17 , pp. 261-268
    • McMasters, A.1    Mustin, T.2
  • 29
    • 0033315611 scopus 로고    scopus 로고
    • Restricted-recourse bounds for stochastic linear programming
    • Morton, D. and Wood, R. (1999) Restricted-recourse bounds for stochastic linear programming Operations Research, 47, pp. 943-956. http://www.csa.com/htbin/linkabst.cgi?issn=0030-364X&vol=47&iss= &firstpage=943
    • (1999) Operations Research , vol.47 , pp. 943-956
    • Morton, D.1    Wood, R.2
  • 30
    • 33750619327 scopus 로고    scopus 로고
    • Overview of NA-25
    • National Nuclear Security Administration. Office of International Material Protection and Cooperation. Department of Energy and National Nuclear Security Administration. available at http://www.nnsa.doe.gov/ na-20/na25_fact.shtml. Accessed 25 September 2006
    • National Nuclear Security Administration.(2006) Office of International Material Protection and Cooperation. Department of Energy and National Nuclear Security Administration. Overview of NA-25. available at http://www.nnsa.doe.gov/na-20/na25_fact.shtml http://www.nnsa.doe.gov/ na-20/na25_fact.shtml. Accessed 25 September 2006
    • (2006)
  • 31
    • 33750618622 scopus 로고    scopus 로고
    • Models and methods for stochastic network interdiction
    • Austin TX: The University of Texas at Austin. 78712
    • Pan, F.(2005) Models and methods for stochastic network interdiction. Austin TX: The University of Texas at Austin. 78712
    • (2005)
    • Pan, F.1
  • 33
    • 33749254720 scopus 로고
    • Models for proliferation interdiction response analysis
    • Monterey CA: Naval Postgraduate School. 93943
    • Reed, B.(1994) Models for proliferation interdiction response analysis. Monterey CA: Naval Postgraduate School. 93943
    • (1994)
    • Reed, B.1
  • 34
    • 33750619487 scopus 로고    scopus 로고
    • Department of Energy press release: Russian Federation dedicate "second line of defense". US nuclear detection technology to help secure Russian borders
    • September 2
    • Richardson, B.(1998) Department of Energy press release: Russian Federation dedicate "second line of defense". US nuclear detection technology to help secure Russian borders. September 2
    • (1998)
    • Richardson, B.1
  • 35
    • 0014534894 scopus 로고
    • L-shaped linear programs with applications to optimal control and stochastic programming
    • http://dx.doi.org/10.1137%2F0117061
    • Van Slyke, R. and Wets, R. (1969) L-shaped linear programs with applications to optimal control and stochastic programming SIAM Journal on Applied Mathematics, 17, pp. 638-663. http://www.csa.com/htbin/ linkabst.cgi?issn=0036-1399&vol=17&iss=&firstpage=638 http://dx.doi.org/10.1137%2F0117061
    • (1969) SIAM Journal on Applied Mathematics , vol.17 , pp. 638-663
    • Van Slyke, R.1    Wets, R.2
  • 36
    • 0001590955 scopus 로고
    • Two-person zero-sum games for network interdiction
    • Washburn, A. and Wood, R. (1994) Two-person zero-sum games for network interdiction Operations Research, 43, pp. 243-251. http://www.csa.com/ htbin/linkabst.cgi?issn=0030-364X&vol=43&iss=&firstpage=243
    • (1994) Operations Research , vol.43 , pp. 243-251
    • Washburn, A.1    Wood, R.2
  • 37
    • 0009075090 scopus 로고
    • Removing arcs from a network
    • Wollmer, R. (1964) Removing arcs from a network Operations Research, 12, pp. 934-940. http://www.csa.com/htbin/linkabst.cgi?issn= 0030-364X&vol=12&iss=&firstpage=934
    • (1964) Operations Research , vol.12 , pp. 934-940
    • Wollmer, R.1
  • 38
    • 0000877462 scopus 로고
    • Two-stage linear programming under uncertainty with 0-1 integer first stage variables
    • http://dx.doi.org/10.1007%2FBF01581648
    • Wollmer, R. (1980) Two-stage linear programming under uncertainty with 0-1 integer first stage variables Mathematical Programming, 19, pp. 279-288. http://www.csa.com/htbin/linkabst.cgi?issn=0025-5610&vol= 19&iss=&firstpage=279 http://dx.doi.org/10.1007%2FBF01581648
    • (1980) Mathematical Programming , vol.19 , pp. 279-288
    • Wollmer, R.1
  • 39
    • 38249007197 scopus 로고
    • Deterministic network interdiction
    • http://dx.doi.org/10.1016%2F0895-7177%2893%2990236-R
    • Wood, R. (1993) Deterministic network interdiction Mathematical and Computer Modeling, 17, pp. 1-18. http://www.csa.com/htbin/ linkabst.cgi?issn=&vol=17&iss=&firstpage=1 http://dx.doi.org/ 10.1016%2F0895-7177%2893%2990236-R
    • (1993) Mathematical and Computer Modeling , vol.17 , pp. 1-18
    • Wood, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.