-
1
-
-
85039439476
-
-
Abilene. 2005. http://abilene.internet2.edu.
-
(2005)
-
-
Abilene1
-
3
-
-
0024640458
-
Finding the most vital arcs in a network
-
Ball, M.O., B.L. Golden, and R.V. Vohra. 1989. Finding the most vital arcs in a network. Operations Research Letters. 8(2), 73-76.
-
(1989)
Operations Research Letters
, vol.8
, Issue.2
, pp. 73-76
-
-
Ball, M.O.1
Golden, B.L.2
Vohra, R.V.3
-
4
-
-
84888788464
-
A decomposition-based approximation for network inhibition
-
D.L. Woodruff.Boston: Kluwer Academic Publishers
-
Burch, C., R. Carr, S. Krumke, M. Marathe, C. Phillips, and E. Sundberg. 2003. A decomposition-based approximation for network inhibition. In Network Interdiction and Stochastic Integer Programming. Edited by D.L. Woodruff. Boston: Kluwer Academic Publishers, 51-69.
-
(2003)
Network Interdiction and Stochastic Integer Programming
, pp. 51-69
-
-
Burch, C.1
Carr, R.2
Krumke, S.3
Marathe, M.4
Phillips, C.5
Sundberg, E.6
-
7
-
-
26044461304
-
Identifying critical infrastructure: The median and covering facility interdiction problems
-
Church, R.L., M.P. Scaparra, and R.S. Middleton. 2004. Identifying critical infrastructure: the median and covering facility interdiction problems. Annals of the Association of American Geographers. 94(3), 491-502.
-
(2004)
Annals of the Association of American Geographers
, vol.94
, Issue.3
, pp. 491-502
-
-
Church, R.L.1
Scaparra, M.P.2
Middleton, R.S.3
-
9
-
-
28344448992
-
Finding the n most vital nodes in a flow network
-
Corley, H.W. and H. Chang. 1974. Finding the n most vital nodes in a flow network. Management Science. 21, 362-364.
-
(1974)
Management Science
, vol.21
, pp. 362-364
-
-
Corley, H.W.1
Chang, H.2
-
10
-
-
0020175509
-
Most vital links and nodes in weighted networks
-
Corley, H.W. and D.Y. Sha. 1982. Most vital links and nodes in weighted networks. Operations Research Letters. 1(4), 157-160.
-
(1982)
Operations Research Letters
, vol.1
, Issue.4
, pp. 157-160
-
-
Corley, H.W.1
Sha, D.Y.2
-
13
-
-
26844525729
-
The “Robust Yet Fragile” Nature of the Internet
-
Doyle, J.C., D.L. Alderson, L. Li, S. Low, M. Roughan, S. Shalunov, R. Tanaka, and W. Willinger. 2005. The “Robust Yet Fragile” Nature of the Internet. Proceedings of the National Academy of Sciences of the United States of America. 102(4), 14497-14502.
-
(2005)
Proceedings of the National Academy of Sciences of the United States of America.
, vol.102
, Issue.4
, pp. 14497-14502
-
-
Doyle, J.C.1
Alderson, D.L.2
Li, L.3
Low, S.4
Roughan, M.5
Shalunov, S.6
Tanaka, R.7
Willinger, W.8
-
19
-
-
41349120887
-
Attack vulnerability of complex networks
-
Holme, P., B.J. Kim, C.N. Yoon, and S.K. Han. 2002. Attack vulnerability of complex networks. Physical Review E. 65, 056109.
-
(2002)
Physical Review E
, vol.65
-
-
Holme, P.1
Kim, B.J.2
Yoon, C.N.3
Han, S.K.4
-
24
-
-
14044252116
-
Methodology for determining vulnerable links in a transportation network
-
Murray-Tuite, P.M. and H.S. Mahmassani. 2004. Methodology for determining vulnerable links in a transportation network. Transportation Research Record. 1882, 88-96.
-
(2004)
Transportation Research Record
, vol.1882
, pp. 88-96
-
-
Murray-Tuite, P.M.1
Mahmassani, H.S.2
-
25
-
-
1642618985
-
A cutting plane algorithm for computing k-edge survivability of a network
-
Myung, Y-S. and H. Kim. 2004. A cutting plane algorithm for computing k-edge survivability of a network. European Journal of Operational Research. 156, 579-589.
-
(2004)
European Journal of Operational Research
, vol.156
, pp. 579-589
-
-
Myung, Y.-S.1
Kim, H.2
-
27
-
-
0009026612
-
Finding the n most vital links in flow networks
-
Ratliff, H.D., G.T. Sicilia, and S.H. Lubore. 1975. Finding the n most vital links in flow networks. Management Science. 21(5), 531-539.
-
(1975)
Management Science
, vol.21
, Issue.5
, pp. 531-539
-
-
Ratliff, H.D.1
Sicilia, G.T.2
Lubore, S.H.3
-
28
-
-
0009075090
-
Removing arcs from a network
-
Wollmer, R. 1964. Removing arcs from a network. Operations Research. 12, 934-40.
-
(1964)
Operations Research
, vol.12
, pp. 934-940
-
-
Wollmer, R.1
-
29
-
-
38249007197
-
Deterministic network interdiction
-
Wood, R. K. 1993. Deterministic network interdiction. Mathematical Computer Modelling. 17(2), 1-18.
-
(1993)
Mathematical Computer Modelling
, vol.17
, Issue.2
, pp. 1-18
-
-
Wood, R.K.1
-
31
-
-
0024107887
-
Survivable network architectures for broad-band fiber optic networks: Model and performance comparison
-
Wu, T-H., D.J. Kolar, and R.H. Cardwell. 1988. Survivable network architectures for broad-band fiber optic networks: model and performance comparison. Journal of Lightwave Technology. 6(11), 1698-1709.
-
(1988)
Journal of Lightwave Technology
, vol.6
, Issue.11
, pp. 1698-1709
-
-
Wu, T.-H.1
Kolar, D.J.2
Cardwell, R.H.3
|