2004
DOI: 10.1002/net.20004
|View full text |Cite
|
Sign up to set email alerts
|

A directed cycle‐based column‐and‐cut generation method for capacitated survivable network design

Abstract: A network is said to be survivable if it has sufficient capacity for rerouting all of its flow under the failure of any one of its edges. Here, we present a polyhedral approach for designing survivable networks. We describe a mixed-integer programming model, in which sufficient slack is explicitly introduced on the directed cycles of the network while flow routing decisions are made. In case of a failure, flow is rerouted along the slacks reserved on directed cycles. We give strong valid inequalities that use … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
26
0

Year Published

2006
2006
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(29 citation statements)
references
References 26 publications
3
26
0
Order By: Relevance
“…Recently, considerable research attention has also been directed toward the design of survivable networks (see Rajan and Atamtürk [29] and Balakrishnan et al [6]). Rajan and Atamtürk [29] show that an extension of 2-partition inequalities are facet-defining for their problem.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Recently, considerable research attention has also been directed toward the design of survivable networks (see Rajan and Atamtürk [29] and Balakrishnan et al [6]). Rajan and Atamtürk [29] show that an extension of 2-partition inequalities are facet-defining for their problem.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[11], or Evolutionary Algorithms, cf. [8], only are either restricted to a single linear objective function or do not perform well on optimization problems with many constraints and few feasible solutions.…”
Section: Optimizationmentioning
confidence: 99%
“…Related Work: Resource allocation and process binding strategies are studied in [1,11], mostly based on either exact approaches like Integer Linear Programs (ILPs) or using meta-heuristics like Evolutionary Algorithms (EAs). Process and message scheduling as well as the parameter estimation has been thoroughly studied in approaches like [4].…”
Section: Introductionmentioning
confidence: 99%
“…• Ring protection and p-cycle protection, all the links are part of an overlaid structure, a ring or a p-cycle: Ring protection [4,9,10] and p-cycle protection [4,7,10] The above classification is quite broad and many variations exists for each protection method.…”
Section: Previous Workmentioning
confidence: 99%