2008
DOI: 10.1016/j.trb.2007.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Securitizing congestion: The congestion call option

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 7 publications
0
15
0
Order By: Relevance
“…Remark 1: This is a simplified version of networklevel two-point traffic dynamics presented at Friesz et al (2008Friesz et al ( , 2011. Hence, the proof of this proposition is omitted.…”
Section: Feasible Set Of Departure Rate Patterns ( )mentioning
confidence: 99%
“…Remark 1: This is a simplified version of networklevel two-point traffic dynamics presented at Friesz et al (2008Friesz et al ( , 2011. Hence, the proof of this proposition is omitted.…”
Section: Feasible Set Of Departure Rate Patterns ( )mentioning
confidence: 99%
“…It is rather difficult to find examples of transportation papers that have followed such an approach, but one exception is that of Friesz et al (2008). This paper exploits the theory of stochastic differential equations to propose a model based on Brownian motion, which distinguishes separate notions of deterministic change and stochastic variation.…”
Section: Example 8: Capturing Stochasticity Through Brownian Motionmentioning
confidence: 99%
“…As noted above, we maintain the focus of the present paper on discrete-time (day-to-day) systems in which the state variables are simple variables rather than functions of (within-day) time, and so modify and the continuous-time approach of Friesz et al (2008). Thus we suppose that within-day time is divided into n discrete time periods, with travellers assumed to make a joint choice of route and departure time among the 2n alternatives therefore possible in our two-route network.…”
Section: Example 8: Capturing Stochasticity Through Brownian Motionmentioning
confidence: 99%
“…As explained in Section 2, the additional travel cost imposed on link 1 is calculated following the first part of Equation (84), to be more specific, the integral R t a t ð Þ t a s ð Þds in this example. As the environmental capacity constraint is greater than the access control restriction for link 2, 8 t 2 [0, T], no pollution pricing should be implemented on this link, which is reflected by Figure 6(b) 6 wherein the additional travel cost (integral of the corresponding Lagrange multiplier) caused by the environmental capacity constraint is zero throughout the entire planning horizon. As the access control is activated, an amount of access price is charged to maintain the traffic volume on the link.…”
Section: The Deterministic Queuing Model Casementioning
confidence: 99%
“…As the access control is activated, an amount of access price is charged to maintain the traffic volume on the link. For link 1, the access pricing is first activated because the access control constraint is smaller than the 6 In the legend of this figure, "AC" means the access control, whereas "AP" means the air pollution control.…”
Section: The Deterministic Queuing Model Casementioning
confidence: 99%