-
1
-
-
0041776238
-
Bounds on the reliability polynomial for shellable independence systems
-
M. O. Ball and J. S. Provan, Bounds on the reliability polynomial for shellable independence systems, SIAM J Algebraic Dis Methods 3 (1982), 166-181.
-
(1982)
Siam J. Algebraic Dis Methods
, vol.3
, pp. 166-181
-
-
Ball, M.O.1
Provan, J.S.2
-
2
-
-
0037333770
-
The use of game theory to measure the vulnerability of stochastic networks
-
M. G. H. Bell, The use of game theory to measure the vulnerability of stochastic networks, IEEE Transactions on Reliability 52 (2003), 63-68.
-
(2003)
Ieee Transactions on Reliability
, vol.52
, pp. 63-68
-
-
Bell, M.G.H.1
-
3
-
-
0043222683
-
Strong inequalities for capacitated survivable network design problems
-
D. Bienstock and G. Muratore, Strong inequalities for capacitated survivable network design problems, Math Program 89 (2001), 127-147.
-
(2001)
Math Program
, vol.89
, pp. 127-147
-
-
Bienstock, D.1
Muratore, G.2
-
4
-
-
70349599839
-
-
throughput, Working paper, Department of Systems Engineering, University of Arkansas at Little Rock, Little Rock, Arkansas
-
Y. Chan, L. Jansen, W. Gaught, and S. Kissin, Singlecommodity multicriteria stochastic-networks: Improving reliability vs. throughput, Working paper, Department of Systems Engineering, University of Arkansas at Little Rock, Little Rock, Arkansas, 2006.
-
(2006)
Singlecommodity Multicriteria Stochastic-Networks: Improving Reliability VS
-
-
Chan, Y.1
Jansen, L.2
Gaught, W.3
Kissin, S.4
-
5
-
-
0031369832
-
Exact & approximate improvement to the throughput of a stochastic network
-
PII S0018952997093846
-
(Pubitemid 127827229) Y. Chan, E. Yam, and A. Marsh, Exact and approximate throughput to a stochastic network, IEEE Trans Reliabil 46 (1997), 473-486.
-
(1997)
IEEE Transactions on Reliability
, vol.46
, Issue.4
, pp. 473-486
-
-
Chan, Y.1
Yim, E.2
Marsh, A.3
-
7
-
-
0030232129
-
The delta-wye approximation procedure for two-terminal reliability
-
M. K. Chari, T. A. Feo, and J. S. Provan, The Delta-Wye approximation procedure for two-terminal reliability, Oper Res 44 (1996), 745-757.
-
(1996)
Oper. Res.
, vol.44
, pp. 745-757
-
-
Chari, M.K.1
Feo, T.A.2
Provan, J.S.3
-
8
-
-
0030282668
-
Calculating k-connectedness reliability using steiner bounds
-
M. K. Chari and J. S. Provan, Calculating k-connectedness reliability using Steiner bounds, Math Oper Res 21 (1996), 905-921.
-
(1996)
Math. Oper. Res.
, vol.21
, pp. 905-921
-
-
Chari, M.K.1
Provan, J.S.2
-
10
-
-
70349601173
-
-
Physical Science Laboratory, Report NMMP 97-02, New Mexico State University, Las Cruces, New Mexico
-
M. Combs, R. Laubenbacher, and A. Taha, An application of q-analysis as a tool for detecting and evaluating the presence of information warfare, Physical Science Laboratory, Report NMMP 97-02, New Mexico State University, Las Cruces, New Mexico, 1997.
-
(1997)
An Application of Q-analysis As a Tool for Detecting and Evaluating the Presence of Information Warfare
-
-
Combs, M.1
Laubenbacher, R.2
Taha, A.3
-
12
-
-
33947635163
-
Efficient calculation of the most reliable pair of link disjoint paths in telecommunication networks
-
DOI 10.1016/j.ejor.2006.03.005, PII S037722170600141X
-
(Pubitemid 46498512) T. Gomes and J. Craveirinha, Efficient calculation of the most reliable pair of link disjoint paths in telecommunication networks, Eur J Oper Res 181 (2007), 1055-1064.
-
(2007)
European Journal of Operational Research
, vol.181
, Issue.3
, pp. 1055-1064
-
-
Gomes, T.1
Craveirinha, J.2
-
13
-
-
0040348774
-
-
CRC Press, Boca Raton
-
D. D. Harms, M. Kraetzl, C. J. Colbourn, and J. S. Devitt, Network reliability: Experiments with a symbolic algebra environment, CRC Press, Boca Raton, 1995.
-
(1995)
Network Reliability: Experiments with A Symbolic Algebra Environment
-
-
Harms, D.D.1
Kraetzl, M.2
Colbourn, C.J.3
Devitt, J.S.4
-
14
-
-
33744531669
-
Simple algorithms for updating multi-resource allocations in an unreliable flow network
-
C.-C. Hsieh and M.-H. Lin, Simple algorithms for updating multi-resource allocations in an unreliable flow network, Computers Ind Eng 50 (2006), 120-129.
-
(2006)
Computers Ind. Eng.
, vol.50
, pp. 120-129
-
-
Hsieh, C.-C.1
Lin, M.-H.2
-
15
-
-
17444417821
-
The cross-entropy method for network reliability estimation
-
DOI 10.1007/s10479-005-5726-x
-
(Pubitemid 40550041) K.-P. Hui, N. Bean, M. Kraetzl, and D. P. Kroese, The crossentropy method for network reliability estimation, Annal Oper Res 134 (2005), 101-118.
-
(2005)
Annals of Operations Research
, vol.134
, Issue.1
, pp. 101-118
-
-
Hui, K.-P.1
Bean, N.2
Kraetzl, M.3
Kroese, D.P.4
-
16
-
-
70349601171
-
Linear programming derived functional bounds for closed queueing networks: A primal approach
-
C. Humes, Linear programming derived functional bounds for closed queueing networks: A primal approach, Lect Appl Math 33 (1997), 139-162.
-
(1997)
Lect. Appl. Math.
, vol.33
, pp. 139-162
-
-
Humes, C.1
-
17
-
-
0025682454
-
A heuristic method of link reliability assignment for maximal reliability
-
S. P. Jain and K. Gopal, A heuristic method of link reliability assignment for maximal reliability, Microelectron Reliab 30 (1990), 673-679.
-
(1990)
Microelectron Reliab
, vol.30
, pp. 673-679
-
-
Jain, S.P.1
Gopal, K.2
-
18
-
-
0026926965
-
Estimation of survivability of communication networks
-
(Pubitemid 23588327) H. Kalyoncu and B. Sankur, Estimation of survivability of communication network, Electron Lett 28 (1992), 1790-1791.
-
(1992)
Electronics Letters
, vol.28
, Issue.19
, pp. 1790-1791
-
-
Kalyoncu, H.1
Sankur, B.2
-
20
-
-
61449161981
-
Generating a representative subset of the nondominated frontier in multiple criteria decision making
-
E. Karasakal and M. Koksalan, Generating a representative subset of the nondominated frontier in multiple criteria decision making, Oper Res 57 (2009), 187-199.
-
(2009)
Oper Res.
, vol.57
, pp. 187-199
-
-
Karasakal, E.1
Koksalan, M.2
-
21
-
-
0031220073
-
A heuristic for estimating nadir criterion values in multiple objective linear programming
-
(Pubitemid 127684746) P. Korhonen, S. Salo, and R. E. Steuer, A heuristic for estimating nadir criterion values in multiple objective linear programming, Oper Res 45 (1997), 751-757.
-
(1997)
Operations Research
, vol.45
, Issue.5
, pp. 751-757
-
-
Korhonen, P.1
Salo, S.2
Steuer, R.E.3
-
22
-
-
84974858123
-
IMOST: Interactive multiple objective system technique
-
Y.-S. Lai, IMOST: Interactive multiple objective system technique, J Oper Res Soc 46 (1995), 958-976.
-
(1995)
J. oper. Res. Soc.
, vol.46
, pp. 958-976
-
-
Lai, Y.-S.1
-
23
-
-
0033185124
-
Improving information network performance: Reliability vs. Invulnerability
-
D. Lyle, Y. Chan, and E. Head, Improving information network performance: reliability vs. invulnerability, Trans Inst Ind Eng 31 (1999), 909-919.
-
(1999)
Trans Inst. Ind. Eng.
, vol.31
, pp. 909-919
-
-
Lyle, D.1
Chan, Y.2
Head, E.3
-
24
-
-
0024703421
-
Deterministic models for estimating vulnerability of networks
-
Y. Y. Malashenko, V. S. Rogozhin, and Y. V. Ferapontov, Deterministic models for estimating vulnerability of networks, Soviet J Computer Systems Sci 27 (1989), 125-135.
-
(1989)
Soviet J. Computer Systems Sci.
, vol.27
, pp. 125-135
-
-
Malashenko, Y.Y.1
Rogozhin, V.S.2
Ferapontov, Y.V.3
-
25
-
-
0033130512
-
The probabilistic longest path problem
-
(Pubitemid 129320701) C. Murat and V. T. Paschos, The probabilistic longest path problem, Networks 33 (1999), 207-219.
-
(1999)
Networks
, vol.33
, Issue.3
, pp. 207-219
-
-
Murat, C.1
Paschos, V.Th.2
-
26
-
-
70349601174
-
Reliability of directed networks using the factoring theorem
-
L. B. Page and J. E. Perry, Reliability of directed networks using the factoring theorem, IEEE Trans Reliab 36 (1989), 445-453.
-
(1989)
Ieee. Trans Reliab
, vol.36
, pp. 445-453
-
-
Page, L.B.1
Perry, J.E.2
-
27
-
-
33644529075
-
Detecting a security disturbance in multi commodity stochastic networks
-
DOI 10.1007/s11235-006-5520-3
-
(Pubitemid 43296626) A. R. Robinson, Y. Chan, and D. C. Dietz, Detecting a security disturbance in multi commodity stochastic networks, Telecommun Systems 31 (2006), 11-27.
-
(2006)
Telecommunication Systems
, vol.31
, Issue.1
, pp. 11-27
-
-
Robinson, A.R.1
Chan, Y.2
Dietz, D.C.3
-
28
-
-
70349589212
-
On a function for the vulnerability of a directed flow network
-
M. Sengoku, S. Shinoda, and R. Yatsuboshi, On a function for the vulnerability of a directed flow network, Networks 18 (1988), 73-83.
-
(1988)
Networks
, vol.18
, pp. 73-83
-
-
Sengoku, M.1
Shinoda, S.2
Yatsuboshi, R.3
-
30
-
-
38549098290
-
Balancing terrorism and natural disasters-defensive strategy with endogenous attacker effort
-
DOI 10.1287/opre.1070.0434
-
(Pubitemid 351159542) J. Zhuang and V. M. Bier, Balancing terrorism and natural disastersdefensive strategy with endogenous attacker effort, Oper Res 55 (2007), 976-991.
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
|