-
2
-
-
33750625838
-
Network interdiction under asymmetric information
-
Pittsburgh PA: Industrial Engineering Department, University of Pittsburgh. Technical report, 15260
-
Bailey, M. and Bayrak, H.(2005) Network interdiction under asymmetric information. Pittsburgh PA: Industrial Engineering Department, University of Pittsburgh. Technical report, 15260
-
(2005)
-
-
Bailey, M.1
Bayrak, H.2
-
3
-
-
33750609259
-
SPAR: Stochastic programming with adversarial recourse
-
Pittsburgh PA: Industrial Engineering Department, University of Pittsburgh. Technical report, 15260
-
Bailey, M. and Shechter, S. and Schaefer, A.(2004) SPAR: Stochastic programming with adversarial recourse. Pittsburgh PA: Industrial Engineering Department, University of Pittsburgh. Technical report, 15260
-
(2004)
-
-
Bailey, M.1
Shechter, S.2
Schaefer, A.3
-
4
-
-
33749267914
-
The US second line of defense: Preventing nuclear smuggling across Russia's borders
-
Washington DC: Center for the Strategic and International Studies. PONARS memo # 50
-
Ball, D.(1998) The US second line of defense: Preventing nuclear smuggling across Russia's borders. Washington DC: Center for the Strategic and International Studies. PONARS memo # 50
-
(1998)
-
-
Ball, D.1
-
5
-
-
0024640458
-
Finding the most vital arcs in a network
-
[CSA]
-
Ball, M. and Golden, B. and Vohra, R. (1989) Finding the most vital arcs in a network Operations Research Letters, 8, pp. 73-76. http://www.csa.com/htbin/linkabst.cgi?issn=0167-6377&vol=8&iss= &firstpage=73[CSA]
-
(1989)
Operations Research Letters
, vol.8
, pp. 73-76
-
-
Ball, M.1
Golden, B.2
Vohra, R.3
-
6
-
-
0026114683
-
Some properties of the bilevel programming problem
-
[CSA] http://dx.doi.org/10.1007%2FBF00941574
-
Bard, J. (1991) Some properties of the bilevel programming problem Journal of Optimization Theory and Applications, 68, pp. 371-378. http:// www.csa.com/htbin/linkabst.cgi?issn=0022-3239&vol=68&iss= &firstpage=371 http://dx.doi.org/10.1007%2FBF00941574
-
(1991)
Journal of Optimization Theory and Applications
, vol.68
, pp. 371-378
-
-
Bard, J.1
-
8
-
-
0027606149
-
Bi-level linear programming
-
http://dx.doi.org/10.1016%2F0305-0548%2893%2990013-9
-
Ben-Ayed, O. (1993) Bi-level linear programming Computers & Operations Research, 20, pp. 485-501. http://www.csa.com/htbin/ linkabst.cgi?issn=0305-0548&vol=20&iss=&firstpage=485 http://dx.doi.org/10.1016%2F0305-0548%2893%2990013-9
-
(1993)
Computers & Operations Research
, vol.20
, pp. 485-501
-
-
Ben-Ayed, O.1
-
9
-
-
9644308639
-
Partitioning procedures for solving mixed-variables programming problems
-
http://dx.doi.org/10.1007%2FBF01386316
-
Benders, J. (1962) Partitioning procedures for solving mixed-variables programming problems Numerische Mathematik, 4, pp. 238-252. http://www.csa.com/htbin/linkabst.cgi?issn=0029-599X&vol=4&iss= &firstpage=238 http://dx.doi.org/10.1007%2FBF01386316
-
(1962)
Numerische Mathematik
, vol.4
, pp. 238-252
-
-
Benders, J.1
-
10
-
-
33750613363
-
How to optimally interdict a belligerent project to develop a nuclear weapon
-
Monterey CA: Operations Research Department, Naval Postgraduate School. Technical report, 93943
-
Brown, G. and Carlyle, M. and Harney, R. and Skroch, E. and Wood, R.(2004) How to optimally interdict a belligerent project to develop a nuclear weapon. Monterey CA: Operations Research Department, Naval Postgraduate School. Technical report, 93943
-
(2004)
-
-
Brown, G.1
Carlyle, M.2
Harney, R.3
Skroch, E.4
Wood, R.5
-
11
-
-
33749250103
-
Interdicting the activities of a linear program - A parametric approach
-
http://dx.doi.org/10.1016%2F0377-2217%2894%2900057-J
-
Chern, M. and Lin, K. (1995) Interdicting the activities of a linear program - a parametric approach European Journal of Operational Research, 86, pp. 580-591. http://www.csa.com/htbin/linkabst.cgi?issn= 0377-2217&vol=86&iss=&firstpage=580 http://dx.doi.org/ 10.1016%2F0377-2217%2894%2900057-J
-
(1995)
European Journal of Operational Research
, vol.86
, pp. 580-591
-
-
Chern, M.1
Lin, K.2
-
12
-
-
33750627579
-
-
Statement of Associate Director, Threat Reduction, Los Alamos National Laboratory, submitted to Committee on Energy and Natural Resources, US Senate, July 10
-
Cobb, D.(2002) Statement of Associate Director, Threat Reduction, Los Alamos National Laboratory, submitted to Committee on Energy and Natural Resources, US Senate, July 10
-
(2002)
-
-
Cobb, D.1
-
13
-
-
0020175509
-
Most vital links and nodes in weighted networks
-
http://dx.doi.org/10.1016%2F0167-6377%2882%2990020-7
-
Corley, H. and Sha, D. (1982) Most vital links and nodes in weighted networks Operations Research Letters, 1, pp. 157-160. http://www.csa.com/ htbin/linkabst.cgi?issn=0167-6377&vol=1&iss=&firstpage=157 http://dx.doi.org/10.1016%2F0167-6377%2882%2990020-7
-
(1982)
Operations Research Letters
, vol.1
, pp. 157-160
-
-
Corley, H.1
Sha, D.2
-
14
-
-
0032024334
-
Stochastic network interdiction
-
Cormican, K. and Morton, D. and Wood, R. (1998) Stochastic network interdiction Operations Research, 46, pp. 184-197. http://www.csa.com/ htbin/linkabst.cgi?issn=0030-364X&vol=46&iss=&firstpage=184
-
(1998)
Operations Research
, vol.46
, pp. 184-197
-
-
Cormican, K.1
Morton, D.2
Wood, R.3
-
15
-
-
0000096090
-
Maximizing the minimum source-sink path subject to a budget constraint
-
http://dx.doi.org/10.1007%2FBF01584329
-
Fulkerson, D. and Harding, G. (1977) Maximizing the minimum source-sink path subject to a budget constraint Mathematical Programming, 13, pp. 116-118. http://www.csa.com/htbin/linkabst.cgi?issn=0025-5610&vol= 13&iss=&firstpage=116 http://dx.doi.org/10.1007%2FBF01584329
-
(1977)
Mathematical Programming
, vol.13
, pp. 116-118
-
-
Fulkerson, D.1
Harding, G.2
-
16
-
-
0015419856
-
Generalized Benders decomposition
-
http://dx.doi.org/10.1007%2FBF00934810
-
Geoffrion, A. (1972) Generalized Benders decomposition Journal of Optimization Theory and Applications, 10, pp. 237-260. http://www.csa.com/htbin/linkabst.cgi?issn=0022-3239&vol=10&iss= &firstpage=237 http://dx.doi.org/10.1007%2FBF00934810
-
(1972)
Journal of Optimization Theory and Applications
, vol.10
, pp. 237-260
-
-
Geoffrion, A.1
-
17
-
-
0141444512
-
Optimal interdiction policy for a flow network
-
Ghare, P. and Montgomery, D. and Turner, T. (1971) Optimal interdiction policy for a flow network Naval Research Logistics Quarterly, 18, pp. 37-45. http://www.csa.com/htbin/linkabst.cgi?issn=0028-1441&vol= 18&iss=&firstpage=37
-
(1971)
Naval Research Logistics Quarterly
, vol.18
, pp. 37-45
-
-
Ghare, P.1
Montgomery, D.2
Turner, T.3
-
18
-
-
0141444514
-
A problem in network interdiction
-
Golden, B. (1978) A problem in network interdiction Naval Research Logistics Quarterly, 25, pp. 711-713. http://www.csa.com/htbin/ linkabst.cgi?issn=0028-1441&vol=25&iss=&firstpage=711
-
(1978)
Naval Research Logistics Quarterly
, vol.25
, pp. 711-713
-
-
Golden, B.1
-
20
-
-
33750626651
-
Illicit nuclear trafficking database
-
International Atomic Energy Agency. International Atomic Energy Agency. available at. Accessed 25 September 2006
-
International Atomic Energy Agency.(2004) Illicit nuclear trafficking database. International Atomic Energy Agency. available at http://www.iaea.org/NewsCenter/Features/RadSources/Fact_Figureshtml Accessed 25 September 2006
-
(2004)
-
-
-
22
-
-
0141556071
-
System interdiction and defense
-
Monterey CA: Operations Research Department, Naval Postgraduate School. Working paper, 93943
-
Israeli, E. and Wood, R.(2001) System interdiction and defense. Monterey CA: Operations Research Department, Naval Postgraduate School. Working paper, 93943
-
(2001)
-
-
Israeli, E.1
Wood, R.2
-
23
-
-
0141764679
-
Shortest-path network interdiction
-
http://dx.doi.org/10.1002%2Fnet.10039
-
Israeli, E. and Wood, R. (2002) Shortest-path network interdiction Networks, 40, pp. 97-111. http://www.csa.com/htbin/linkabst.cgi?issn= 1566-113X&vol=40&iss=&firstpage=97 http://dx.doi.org/ 10.1002%2Fnet.10039
-
(2002)
Networks
, vol.40
, pp. 97-111
-
-
Israeli, E.1
Wood, R.2
-
24
-
-
84988271380
-
Nuclear nonproliferation: US efforts to help other countries combat nuclear smuggling need strengthened coordination and planning
-
Report to the Ranking Minority Member, Subcommittee on Emerging Threats, and Capabilities, Committee on Armed Services, US Senate, GAO-02-426, May 2002
-
Jones, G.(2002) Nuclear nonproliferation: US efforts to help other countries combat nuclear smuggling need strengthened coordination and planning, Report to the Ranking Minority Member, Subcommittee on Emerging Threats, and Capabilities, Committee on Armed Services, US Senate, GAO-02-426, May 2002
-
(2002)
-
-
Jones, G.1
-
25
-
-
0001547779
-
The cutting plane method for solving convex programs
-
http://dx.doi.org/10.1137%2F0108053
-
Kelley, J. (1960) The cutting plane method for solving convex programs SIAM Journal of Industrial and Applied Mathematics, 8, pp. 703-712. http://www.csa.com/htbin/linkabst.cgi?issn=&vol=8&iss= &firstpage=703 http://dx.doi.org/10.1137%2F0108053
-
(1960)
SIAM Journal of Industrial and Applied Mathematics
, vol.8
, pp. 703-712
-
-
Kelley, J.1
-
26
-
-
0000415520
-
The integer L-shaped method for stochastic integer programs with complete recourse
-
http://dx.doi.org/10.1016%2F0167-6377%2893%2990002-X
-
Laporte, G. and Louveaux, F. (1993) The integer L-shaped method for stochastic integer programs with complete recourse Operations Research Letters, 13, pp. 133-142. http://www.csa.com/htbin/linkabst.cgi?issn= 0167-6377&vol=13&iss=&firstpage=133 http://dx.doi.org/ 10.1016%2F0167-6377%2893%2990002-X
-
(1993)
Operations Research Letters
, vol.13
, pp. 133-142
-
-
Laporte, G.1
Louveaux, F.2
-
27
-
-
0024716461
-
The k-most vital arcs in the shortest path problem
-
http://dx.doi.org/10.1016%2F0167-6377%2889%2990065-5
-
Malik, K. and Mittal, A. and Gupta, S. (1989) The k-most vital arcs in the shortest path problem Operations Research Letters, 8, pp. 223-227. http://www.csa.com/htbin/linkabst.cgi?issn=0167-6377&vol=8&iss= &firstpage=223 http://dx.doi.org/10.1016%2F0167-6377%2889%2990065-5
-
(1989)
Operations Research Letters
, vol.8
, pp. 223-227
-
-
Malik, K.1
Mittal, A.2
Gupta, S.3
-
28
-
-
0141556069
-
Optimal interdiction of a supply network
-
McMasters, A. and Mustin, T. (1970) Optimal interdiction of a supply network Naval Research Logistics Quarterly, 17, pp. 261-268. http://www.csa.com/htbin/linkabst.cgi?issn=0028-1441&vol=17&iss= &firstpage=261
-
(1970)
Naval Research Logistics Quarterly
, vol.17
, pp. 261-268
-
-
McMasters, A.1
Mustin, T.2
-
29
-
-
0033315611
-
Restricted-recourse bounds for stochastic linear programming
-
Morton, D. and Wood, R. (1999) Restricted-recourse bounds for stochastic linear programming Operations Research, 47, pp. 943-956. http://www.csa.com/htbin/linkabst.cgi?issn=0030-364X&vol=47&iss= &firstpage=943
-
(1999)
Operations Research
, vol.47
, pp. 943-956
-
-
Morton, D.1
Wood, R.2
-
30
-
-
33750619327
-
Overview of NA-25
-
National Nuclear Security Administration. Office of International Material Protection and Cooperation. Department of Energy and National Nuclear Security Administration. available at http://www.nnsa.doe.gov/ na-20/na25_fact.shtml. Accessed 25 September 2006
-
National Nuclear Security Administration.(2006) Office of International Material Protection and Cooperation. Department of Energy and National Nuclear Security Administration. Overview of NA-25. available at http://www.nnsa.doe.gov/na-20/na25_fact.shtml http://www.nnsa.doe.gov/ na-20/na25_fact.shtml. Accessed 25 September 2006
-
(2006)
-
-
-
31
-
-
33750618622
-
Models and methods for stochastic network interdiction
-
Austin TX: The University of Texas at Austin. 78712
-
Pan, F.(2005) Models and methods for stochastic network interdiction. Austin TX: The University of Texas at Austin. 78712
-
(2005)
-
-
Pan, F.1
-
33
-
-
33749254720
-
Models for proliferation interdiction response analysis
-
Monterey CA: Naval Postgraduate School. 93943
-
Reed, B.(1994) Models for proliferation interdiction response analysis. Monterey CA: Naval Postgraduate School. 93943
-
(1994)
-
-
Reed, B.1
-
34
-
-
33750619487
-
Department of Energy press release: Russian Federation dedicate "second line of defense". US nuclear detection technology to help secure Russian borders
-
September 2
-
Richardson, B.(1998) Department of Energy press release: Russian Federation dedicate "second line of defense". US nuclear detection technology to help secure Russian borders. September 2
-
(1998)
-
-
Richardson, B.1
-
35
-
-
0014534894
-
L-shaped linear programs with applications to optimal control and stochastic programming
-
http://dx.doi.org/10.1137%2F0117061
-
Van Slyke, R. and Wets, R. (1969) L-shaped linear programs with applications to optimal control and stochastic programming SIAM Journal on Applied Mathematics, 17, pp. 638-663. http://www.csa.com/htbin/ linkabst.cgi?issn=0036-1399&vol=17&iss=&firstpage=638 http://dx.doi.org/10.1137%2F0117061
-
(1969)
SIAM Journal on Applied Mathematics
, vol.17
, pp. 638-663
-
-
Van Slyke, R.1
Wets, R.2
-
36
-
-
0001590955
-
Two-person zero-sum games for network interdiction
-
Washburn, A. and Wood, R. (1994) Two-person zero-sum games for network interdiction Operations Research, 43, pp. 243-251. http://www.csa.com/ htbin/linkabst.cgi?issn=0030-364X&vol=43&iss=&firstpage=243
-
(1994)
Operations Research
, vol.43
, pp. 243-251
-
-
Washburn, A.1
Wood, R.2
-
37
-
-
0009075090
-
Removing arcs from a network
-
Wollmer, R. (1964) Removing arcs from a network Operations Research, 12, pp. 934-940. http://www.csa.com/htbin/linkabst.cgi?issn= 0030-364X&vol=12&iss=&firstpage=934
-
(1964)
Operations Research
, vol.12
, pp. 934-940
-
-
Wollmer, R.1
-
38
-
-
0000877462
-
Two-stage linear programming under uncertainty with 0-1 integer first stage variables
-
http://dx.doi.org/10.1007%2FBF01581648
-
Wollmer, R. (1980) Two-stage linear programming under uncertainty with 0-1 integer first stage variables Mathematical Programming, 19, pp. 279-288. http://www.csa.com/htbin/linkabst.cgi?issn=0025-5610&vol= 19&iss=&firstpage=279 http://dx.doi.org/10.1007%2FBF01581648
-
(1980)
Mathematical Programming
, vol.19
, pp. 279-288
-
-
Wollmer, R.1
-
39
-
-
38249007197
-
Deterministic network interdiction
-
http://dx.doi.org/10.1016%2F0895-7177%2893%2990236-R
-
Wood, R. (1993) Deterministic network interdiction Mathematical and Computer Modeling, 17, pp. 1-18. http://www.csa.com/htbin/ linkabst.cgi?issn=&vol=17&iss=&firstpage=1 http://dx.doi.org/ 10.1016%2F0895-7177%2893%2990236-R
-
(1993)
Mathematical and Computer Modeling
, vol.17
, pp. 1-18
-
-
Wood, R.1
|