- Shopping Bag ( 0 items )
The Network Interdiction Problem has a wide variety of applications in areas such as transportation, but more recently and very prominently, it has applications in the communications area. Network Interdiction and Shastic Integer Programming focuses on problems associated with protecting and attacking computer, transportation, and social networks. These research areas gain importance as the world becomes more dependent on interconnected systems. Optimization models that address the shastic nature of the problems are an important part of the book and it contains discussion of recent efforts to provide methods for addressing shastic mixed integer programs.
The book is organized with interdiction papers first and the shastic programming papers in the second part. See the foreword by Roger Wets for further details on the topical coverage. Each chapter represents state-of-the-art research and all chapters have been carefully peer-reviewed.
Preface. Contributing Authors.
Foreword; R. Wets.
1. Interdicting Smuggled Nuclear Material; Feng Pan, et al.
2. Enumerating Near-Min s-t Cuts; A. Balcioglu, R.K. Wood.
3. A Decomposition-Based Approximation for Network Inhibition; C. Burch, et al.
4. Interdicting Shastic Networks; R. Hemmeke, et al.
5. Shastic Batch-Sizing; G. Lulli, S. Sen.
6. Decomposition with Convexification; S. Sen, et al.