2009
DOI: 10.1016/j.cor.2007.09.004
|View full text |Cite
|
Sign up to set email alerts
|

Modeling – path availability to support disaster vulnerability assessment of network infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
64
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 164 publications
(66 citation statements)
references
References 27 publications
2
64
0
Order By: Relevance
“…Kovács and Tatham (2009) examine the resource configurations of humanitarian versus military organizations in order to be able to respond to large-scale disruptions. Matisziw and Murray (2009) formulate a model to evaluate the disruption of arcs vital to network operations and apply it to the Ohio interstate highway system to support the assessment of disaster vulnerability.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Kovács and Tatham (2009) examine the resource configurations of humanitarian versus military organizations in order to be able to respond to large-scale disruptions. Matisziw and Murray (2009) formulate a model to evaluate the disruption of arcs vital to network operations and apply it to the Ohio interstate highway system to support the assessment of disaster vulnerability.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Theorem 1: Let Q β be the optimal objective of the QP problem (8)(9)(10)(11) and OPT β be the minimum β-edge disruptor of graph G = (V, E). Then, Q β ≤ OPT β for β ∈ [0, 1].…”
Section: Model and Definitionsmentioning
confidence: 99%
“…[3], [10]. Matisziw and Murray [9] first proposed the pairwise connectivity as an effective measurement and use mathematical programming to solve for exact solutions. Arulselvan et al later define the Critical Node/Edge problem problems, which the main objective is to identify top k nodes/links whose removal minimize the pairwise connectivity in the residual network, and provide NP-completeness proofs and integer programming formulations.…”
Section: Introductionmentioning
confidence: 99%
“…A practical limitation of previous interdiction models for flow-based networks (Myung and Kim, 2004, Murray et al, 2007, Matisziw and Murray, 2009) is that the flow between two nodes is considered lost or unserved only if the two nodes are completely disconnected after interdiction. Although this assumption simplifies the mathematical representation of the problems and their solution, it also limits their practical applicability, especially to the context of transportation networks.…”
Section: Introductionmentioning
confidence: 99%
“…The authors propose a variable neighbourhood search algorithm to solve the model and test it on a case-study based on the Singapore rail transit system. Myung and Kim (2004), Murray et al (2007), and Matisziw and Murray (2009) study a flow interdiction problem on a network with multiple sources and destinations, where the system's value is measured in terms of the amount of demand that can still be served after interdiction. Scaparra et al (2015) build upon these models to devise a protection optimization model for railway systems.…”
Section: Introductionmentioning
confidence: 99%