A bilevel partial interdiction problem with capacitated facilities and demand outsourcing
In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated facilities and outsourcing option. The problem is modeled as a static Stackelberg game between an intelligent attacker and a defender. The attacke...
Saved in:
Published in | Computers & operations research Vol. 41; pp. 346 - 358 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Elsevier Ltd
01.01.2014
Pergamon Press Inc |
Subjects | |
Online Access | Get full text |
ISSN | 0305-0548 1873-765X 0305-0548 |
DOI | 10.1016/j.cor.2012.08.013 |
Cover
Abstract | In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated facilities and outsourcing option. The problem is modeled as a static Stackelberg game between an intelligent attacker and a defender. The attacker's (leader's) objective is to cause the maximum (worst-case) disruption in an existing service network subject to an interdiction budget. On the other hand, the defender (follower) is responsible for satisfying the demand of all customers while minimizing the total demand-weighted transportation and outsourcing cost in the wake of the worst-case attack. She should consider the capacity reduction at the interdicted facilities where the number of interdictions cannot be known a priori, but depends on the attacker's budget allocation. We propose two different methods to solve this bilevel programming problem. The first one is a progressive grid search which is not viable on large sized instances. The second one is a multi-start simplex search heuristic developed to overcome the exponential time complexity of the first method. We also use an exhaustive search method to solve all combinations of full interdiction to assess the advantage of partial interdiction for the attacker. The test results suggest that under the partial interdiction approach the attacker can achieve a better utilization of his limited resources.
[Display omitted] A bilevel partial interdiction problem with capacitated facilities and demand outsourcing
► We investigate a bilevel facility interdiction problem between an attacker and defender, where the attacker is the leader who wants to cause the most disruption in a median type network and the defender tries to assign customer demand to the facilities according to the remaining capacities and outsource the unmet demand with a penalty. ► Partial interdiction is possible where a partially interdicted facility loses some of its capacity in proportion to the attack level. ► Two solution methods are proposed. The first is a progressive grid search heuristic that can be applied for instances with up to 10 facilities. The second is a multi-start revised simplex search procedure. Both of the heuristics call Cplex to optimally solve an integer programming model in the lower level problem. ► We evaluate the benefit of the partial interdiction approach over full interdiction from the attacker’s point of view. |
---|---|
AbstractList | In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated facilities and outsourcing option. The problem is modeled as a static Stackelberg game between an intelligent attacker and a defender. The attacker's (leader's) objective is to cause the maximum (worst-case) disruption in an existing service network subject to an interdiction budget. On the other hand, the defender (follower) is responsible for satisfying the demand of all customers while minimizing the total demand-weighted transportation and outsourcing cost in the wake of the worst-case attack. She should consider the capacity reduction at the interdicted facilities where the number of interdictions cannot be known a priori, but depends on the attacker's budget allocation. We propose two different methods to solve this bilevel programming problem. The first one is a progressive grid search which is not viable on large sized instances. The second one is a multi-start simplex search heuristic developed to overcome the exponential time complexity of the first method. We also use an exhaustive search method to solve all combinations of full interdiction to assess the advantage of partial interdiction for the attacker. The test results suggest that under the partial interdiction approach the attacker can achieve a better utilization of his limited resources. In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated facilities and outsourcing option. The problem is modeled as a static Stackelberg game between an intelligent attacker and a defender. The attacker's (leader's) objective is to cause the maximum (worst-case) disruption in an existing service network subject to an interdiction budget. On the other hand, the defender (follower) is responsible for satisfying the demand of all customers while minimizing the total demand-weighted transportation and outsourcing cost in the wake of the worst-case attack. She should consider the capacity reduction at the interdicted facilities where the number of interdictions cannot be known a priori, but depends on the attacker's budget allocation. We propose two different methods to solve this bilevel programming problem. The first one is a progressive grid search which is not viable on large sized instances. The second one is a multi-start simplex search heuristic developed to overcome the exponential time complexity of the first method. We also use an exhaustive search method to solve all combinations of full interdiction to assess the advantage of partial interdiction for the attacker. The test results suggest that under the partial interdiction approach the attacker can achieve a better utilization of his limited resources. [PUBLICATION ABSTRACT] In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated facilities and outsourcing option. The problem is modeled as a static Stackelberg game between an intelligent attacker and a defender. The attacker's (leader's) objective is to cause the maximum (worst-case) disruption in an existing service network subject to an interdiction budget. On the other hand, the defender (follower) is responsible for satisfying the demand of all customers while minimizing the total demand-weighted transportation and outsourcing cost in the wake of the worst-case attack. She should consider the capacity reduction at the interdicted facilities where the number of interdictions cannot be known a priori, but depends on the attacker's budget allocation. We propose two different methods to solve this bilevel programming problem. The first one is a progressive grid search which is not viable on large sized instances. The second one is a multi-start simplex search heuristic developed to overcome the exponential time complexity of the first method. We also use an exhaustive search method to solve all combinations of full interdiction to assess the advantage of partial interdiction for the attacker. The test results suggest that under the partial interdiction approach the attacker can achieve a better utilization of his limited resources. [Display omitted] A bilevel partial interdiction problem with capacitated facilities and demand outsourcing ► We investigate a bilevel facility interdiction problem between an attacker and defender, where the attacker is the leader who wants to cause the most disruption in a median type network and the defender tries to assign customer demand to the facilities according to the remaining capacities and outsource the unmet demand with a penalty. ► Partial interdiction is possible where a partially interdicted facility loses some of its capacity in proportion to the attack level. ► Two solution methods are proposed. The first is a progressive grid search heuristic that can be applied for instances with up to 10 facilities. The second is a multi-start revised simplex search procedure. Both of the heuristics call Cplex to optimally solve an integer programming model in the lower level problem. ► We evaluate the benefit of the partial interdiction approach over full interdiction from the attacker’s point of view. |
Author | Şengül Akca, Sema Aras, Necati Aksen, Deniz |
Author_xml | – sequence: 1 givenname: Deniz surname: Aksen fullname: Aksen, Deniz email: daksen@ku.edu.tr organization: College of Administrative Sciences and Economics, Koç University, Rumelifeneri Yolu, Sarıyer, İstanbul, Turkey – sequence: 2 givenname: Sema surname: Şengül Akca fullname: Şengül Akca, Sema email: sema.sengul@boun.edu.tr organization: Department of Industrial Engineering, Boğaziçi University, Bebek, İstanbul, Turkey – sequence: 3 givenname: Necati surname: Aras fullname: Aras, Necati email: arasn@boun.edu.tr organization: Department of Industrial Engineering, Boğaziçi University, Bebek, İstanbul, Turkey |
BookMark | eNqNkT9vFDEQxS0UJC6BD0BniYZmN-N_a0dUUUQAKRJNCqgsr3cWfPLZh-0L4tvj46hSRJlmpvi90cx75-Qs5YSEvGUwMmDT5Xb0uYwcGB_BjMDEC7JhRotBT-rbGdmAADWAkuYVOa91C700Zxvy_ZrOIeIDRrp3pQUXaUgNyxJ8CznRfclzxB39HdpP6t3e-dBcw4WufYqhBazUpYUuuDu2fGg1H4oP6cdr8nJ1seKb__2C3N9-vL_5PNx9_fTl5vpu8JLzNkgOBoXwmvGFOe21ZEKsqxEK5GoWmJznk1ZXs9BSGb7KmbGZSe2EuwIpxAV5f1rbL_11wNrsLlSPMbqE-VAtmzRTiuvnoFKr7hCHqaPvHqHb_lbqf3RKcsNAwnGhPlG-5FoLrvafO923VlyIloE9hmO3todjj-FYMLaH05XskXJfws6VP09qPpw02N18CFhs9QGTxyUU9M0uOTyh_gud_qgN |
CODEN | CMORAP |
CitedBy_id | crossref_primary_10_1016_j_ejor_2018_03_031 crossref_primary_10_1016_j_ejor_2016_09_016 crossref_primary_10_1016_j_cie_2023_109007 crossref_primary_10_1016_j_cie_2017_02_022 crossref_primary_10_1016_j_cor_2020_104996 crossref_primary_10_1016_j_ejor_2017_11_035 crossref_primary_10_1007_s10589_015_9795_8 crossref_primary_10_1016_j_future_2017_08_056 crossref_primary_10_1287_trsc_2018_0875 crossref_primary_10_1108_IJLM_04_2021_0199 crossref_primary_10_1016_j_ejor_2020_02_016 crossref_primary_10_2139_ssrn_4156125 crossref_primary_10_3934_math_2022307 crossref_primary_10_1007_s00170_015_7756_0 crossref_primary_10_1007_s10479_017_2705_y crossref_primary_10_1016_j_ress_2021_108005 crossref_primary_10_1016_j_ijdrr_2019_101380 crossref_primary_10_3233_IFS_152042 crossref_primary_10_1007_s12046_020_1295_6 crossref_primary_10_1007_s12597_019_00354_7 crossref_primary_10_1016_j_tre_2016_07_002 crossref_primary_10_1057_s41274_017_0255_y crossref_primary_10_1016_j_ejor_2015_07_025 crossref_primary_10_17341_gazimmfd_615372 crossref_primary_10_1016_j_cie_2017_10_003 crossref_primary_10_1016_j_eswa_2015_10_029 crossref_primary_10_1016_j_tre_2024_103482 crossref_primary_10_1080_01630563_2016_1255958 crossref_primary_10_1007_s00500_018_3005_4 crossref_primary_10_3934_math_2022882 crossref_primary_10_1287_ijoc_2022_1196 crossref_primary_10_1016_j_ejor_2017_11_058 crossref_primary_10_1016_j_asoc_2018_04_011 crossref_primary_10_1016_j_tre_2017_03_010 crossref_primary_10_1016_j_cor_2019_01_014 crossref_primary_10_1016_j_cor_2019_104831 crossref_primary_10_1016_j_cor_2015_05_016 crossref_primary_10_1080_23302674_2023_2247964 crossref_primary_10_1080_01605682_2020_1740621 crossref_primary_10_1016_j_cie_2014_03_010 crossref_primary_10_1016_j_ejor_2024_07_013 crossref_primary_10_1016_j_eswa_2018_05_036 crossref_primary_10_1109_ACCESS_2020_3012963 crossref_primary_10_1007_s00500_024_09842_5 crossref_primary_10_1007_s10489_017_1116_8 crossref_primary_10_1016_j_cor_2018_02_020 crossref_primary_10_1057_s41274_017_0185_8 crossref_primary_10_1016_j_omega_2023_102885 crossref_primary_10_1016_j_asoc_2017_11_004 crossref_primary_10_1080_0305215X_2019_1577408 crossref_primary_10_2139_ssrn_4144324 crossref_primary_10_1007_s40314_021_01453_2 crossref_primary_10_1016_j_ress_2022_108440 crossref_primary_10_1016_j_cie_2016_11_004 |
Cites_doi | 10.1137/0403036 10.1093/comjnl/7.4.308 10.1080/00401706.1962.10490033 10.1016/j.cor.2006.09.019 10.1287/opre.12.6.934 10.1002/nav.3800180103 10.1016/j.ejor.2011.09.044 10.1007/s00158-003-0320-9 10.1287/opre.38.5.911 10.1002/nav.3800250412 10.1287/moor.8.4.538 10.1002/nav.3800170302 10.1016/j.compstruc.2004.03.072 10.1287/ijoc.12.4.272.11879 10.1016/j.cor.2010.06.002 10.1111/j.1467-8306.2004.00410.x 10.1007/s10898-008-9291-0 10.1287/mnsc.42.7.954 10.1016/0895-7177(93)90236-R 10.1016/j.biocon.2006.08.009 10.1007/BF01584329 10.1287/inte.1060.0252 10.1007/s10287-005-0025-1 10.1109/TPWRS.2004.825888 10.1080/07408170600729192 10.1002/1520-6750(199204)39:3<419::AID-NAV3220390310>3.0.CO;2-C 10.5711/morj.4.4.15 10.1007/s10100-009-0110-6 10.1109/TPWRS.2005.846198 10.1109/TPWRS.2008.2004825 10.1007/s10898-006-9067-3 10.1002/net.10039 10.1016/j.omega.2011.03.003 10.4095/213921 10.1007/s10957-010-9668-3 10.1111/j.1538-4632.2007.00698.x 10.1109/TPWRS.2005.851942 |
ContentType | Journal Article |
Copyright | 2012 Elsevier Ltd Copyright Pergamon Press Inc. Jan 2014 |
Copyright_xml | – notice: 2012 Elsevier Ltd – notice: Copyright Pergamon Press Inc. Jan 2014 |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1016/j.cor.2012.08.013 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts Computer and Information Systems Abstracts Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science Business |
EISSN | 1873-765X 0305-0548 |
EndPage | 358 |
ExternalDocumentID | 3102396331 10_1016_j_cor_2012_08_013 S0305054812001785 |
Genre | Feature |
GroupedDBID | --K --M -~X .DC .~1 0R~ 186 1B1 1OL 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 6J9 7-5 71M 8P~ 9JN 9JO AAAKF AAAKG AABNK AACTN AAEDT AAEDW AAFJI AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARIN AAXUO AAYFN AAYOK ABAOU ABBOA ABEFU ABFNM ABFRF ABJNI ABMAC ABMMH ABUCO ABXDB ABYKQ ACAZW ACDAQ ACGFO ACGFS ACNCT ACNNM ACRLP ACZNC ADBBV ADEZE ADGUI ADJOM ADMUD AEBSH AEFWE AEHXG AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AI. AIALX AIEXJ AIGVJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD APLSM ARUGR ASPBG AVARZ AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HAMUX HVGLF HZ~ H~9 IHE J1W KOM LY1 M41 MHUIS MO0 MS~ O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ PRBVW Q38 R2- RIG ROL RPZ RXW SDF SDG SDP SDS SES SEW SPC SPCBC SSB SSD SSO SSV SSW SSZ T5K TAE TN5 U5U UAO UPT VH1 WUQ XFK XPP ZMT ~02 ~G- AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 7SC 8FD EFKBS JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c422t-4208e33c712d1a7c74133ff83504f8d06ac26759b374582f4b11b147a3a90433 |
IEDL.DBID | AIKHN |
ISSN | 0305-0548 |
IngestDate | Fri Sep 05 12:21:18 EDT 2025 Fri Sep 05 12:23:38 EDT 2025 Fri Jul 25 05:42:46 EDT 2025 Tue Jul 01 02:06:28 EDT 2025 Thu Apr 24 22:58:51 EDT 2025 Fri Feb 23 02:33:28 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Simplex search Bilevel programming Outsourcing Partial facility interdiction |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c422t-4208e33c712d1a7c74133ff83504f8d06ac26759b374582f4b11b147a3a90433 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 ObjectType-Article-1 ObjectType-Feature-2 |
PQID | 1442810403 |
PQPubID | 23500 |
PageCount | 13 |
ParticipantIDs | proquest_miscellaneous_1671552743 proquest_miscellaneous_1475548206 proquest_journals_1442810403 crossref_citationtrail_10_1016_j_cor_2012_08_013 crossref_primary_10_1016_j_cor_2012_08_013 elsevier_sciencedirect_doi_10_1016_j_cor_2012_08_013 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | January 2014 2014-1-00 20140101 |
PublicationDateYYYYMMDD | 2014-01-01 |
PublicationDate_xml | – month: 01 year: 2014 text: January 2014 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | Computers & operations research |
PublicationYear | 2014 |
Publisher | Elsevier Ltd Pergamon Press Inc |
Publisher_xml | – name: Elsevier Ltd – name: Pergamon Press Inc |
References | Israeli, Wood (bib26) 2002; 40 Xeon Radio Free Europe—Radio Liberty. Afghanistan: mobile-phone towers are Taliban's new target. Wollmer (bib58) 1964; 12 2005 [accessed August.12]. Luersen, Le Riche, Guyon (bib36) 2004; 27 Stackelberg von (bib54) 1952 Intel Köppe, Queyranne, Ryan (bib27) 2010; 146 Gurson AP. Simplex search behavior in nonlinear optimization Salmerón, Wood, Baldick (bib45) 2004; 19 IBM ILOG CPLEX v12.1 parameters reference manual. Software—Intel Xeon W3690 average CPU mark report Luersen, Le Riche (bib35) 2004; 82 Lenstra (bib29) 1983; 8 Wikipedia, the Free Encyclopedia. 2003 Istanbul bombings Motto, Arroyo, Galiana (bib39) 2005; 20 O'Hanley, Church, Gilless (bib41) 2007; 134 Dempe S. Discrete bilevel optimization problems. Technical report D-04109. Germany: Institut für Wirtschaftsinformatik, Universität Leipzig; 2001. 2000 [accessed August.012]. Wolff S. A local and globalized, constrained and simple bounded Nelder–Mead method. Technical report. Germany: Bauhaus-Universität Weimar; 2004. As of August 2012, the report was not available at its original source. It can be downloaded from 1999 [accessed August.12]. Nelder, Mead (bib40) 1965; 7 Salmerón, Wood, Baldick (bib46) 2009; 24 Church, Scaparra, Middleton (bib12) 2004; 94 2011 [accessed August.12]. Moore, Bard (bib38) 1990; 38 Scaparra MP, Church RL. Protecting supply systems to mitigate potential disaster: a model to fortify capacitated facilities. Kent Business School working paper no. 209. UK: University of Kent; 2010. . Saharidis, Ierapetritou (bib44) 2009; 44 Haftka, Gürdal (bib22) 1993 Smith, Lim, Sudargho (bib51) 2007; 38 Copyright IBM Corporation 1987 McMasters, Mustin (bib37) 1970; 17 Sherali, Adams (bib49) 1990; 3 Golden (bib19) 1971; 25 Scaparra, Church (bib47) 2008; 35 Bramel, Simchi-Levi (bib6) 1997 Chalk P, Hoffman B, Reville R, Kasupski A. Trends in terrorism. RAND Center for Terrorism Risk Management Policy Snyder, Scaparra, Daskin, Church (bib52) 2006 Liberatore, Scaparra, Daskin (bib30) 2011; 38 2001 [accessed August.12]. Brown, Carlyle, Salmerón, Wood (bib8) 2005 Arroyo, Galiana (bib2) 2005; 20 Brown, Carlyle, Salmerón, Wood (bib9) 2006; 36 Gümüş, Floudas (bib21) 2005; 2 PassMark 2008 [accessed August.12]. Spendley, Hext, Himsworth (bib53) 1962; 4 DeNegre S. Interdiction and discrete bilevel linear programming. Unpublished PhD thesis. Bethlehem (PA), USA: Department of Industrial and Systems Engineering, Lehigh University; 2011. Wood (bib59) 1993; 17 Chinchuluun, Huang, Pardalos (bib11) 2009 Church, Scaparra (bib13) 2007; 39 Brooks CH. The introduction to amoeba. Processor 3600 series specifications page BBC News UK. Arsonists target ambulance station. BBC online network Liberatore, Scaparra, Daskin (bib31) 2012; 40 Fulkerson, Harding (bib17) 1977; 13 Whiteman (bib55) 1999; 4 [accessed August.12]. Losada, Scaparra, O'Hanley (bib34) 2012; 217 Ghare, Montgomery, Turner (bib18) 1971; 18 Humphrey, Wilson (bib23) 2000; 12 Bard, Moore (bib3) 1992; 39 Deng (bib16) 1998; vol. 20 Barton, Ivey (bib4) 1996; 42 Losada C, Scaparra MP, Church RL, Daskin MS. The multiple resource probabilistic interdiction median problem. Kent Business School working paper no. 187. UK: University of Kent; 2009. 2009 [accessed August.12]. Lim, Smith (bib32) 2007; 39 Aksen, Piyade, Aras (bib1) 2010; 18 Bramel (10.1016/j.cor.2012.08.013_bib6) 1997 Köppe (10.1016/j.cor.2012.08.013_bib27) 2010; 146 Lenstra (10.1016/j.cor.2012.08.013_bib29) 1983; 8 10.1016/j.cor.2012.08.013_bib57 Haftka (10.1016/j.cor.2012.08.013_bib22) 1993 10.1016/j.cor.2012.08.013_bib56 10.1016/j.cor.2012.08.013_bib15 Aksen (10.1016/j.cor.2012.08.013_bib1) 2010; 18 10.1016/j.cor.2012.08.013_bib14 Arroyo (10.1016/j.cor.2012.08.013_bib2) 2005; 20 Scaparra (10.1016/j.cor.2012.08.013_bib47) 2008; 35 Smith (10.1016/j.cor.2012.08.013_bib51) 2007; 38 Brown (10.1016/j.cor.2012.08.013_bib8) 2005 Church (10.1016/j.cor.2012.08.013_bib12) 2004; 94 10.1016/j.cor.2012.08.013_bib10 Luersen (10.1016/j.cor.2012.08.013_bib35) 2004; 82 Liberatore (10.1016/j.cor.2012.08.013_bib30) 2011; 38 Losada (10.1016/j.cor.2012.08.013_bib34) 2012; 217 Israeli (10.1016/j.cor.2012.08.013_bib26) 2002; 40 10.1016/j.cor.2012.08.013_bib48 Humphrey (10.1016/j.cor.2012.08.013_bib23) 2000; 12 Deng (10.1016/j.cor.2012.08.013_bib16) 1998; vol. 20 Salmerón (10.1016/j.cor.2012.08.013_bib45) 2004; 19 Saharidis (10.1016/j.cor.2012.08.013_bib44) 2009; 44 Moore (10.1016/j.cor.2012.08.013_bib38) 1990; 38 Spendley (10.1016/j.cor.2012.08.013_bib53) 1962; 4 Sherali (10.1016/j.cor.2012.08.013_bib49) 1990; 3 Fulkerson (10.1016/j.cor.2012.08.013_bib17) 1977; 13 10.1016/j.cor.2012.08.013_bib42 10.1016/j.cor.2012.08.013_bib43 Wood (10.1016/j.cor.2012.08.013_bib59) 1993; 17 Stackelberg von (10.1016/j.cor.2012.08.013_bib54) 1952 Luersen (10.1016/j.cor.2012.08.013_bib36) 2004; 27 Golden (10.1016/j.cor.2012.08.013_bib19) 1971; 25 McMasters (10.1016/j.cor.2012.08.013_bib37) 1970; 17 Salmerón (10.1016/j.cor.2012.08.013_bib46) 2009; 24 Barton (10.1016/j.cor.2012.08.013_bib4) 1996; 42 Liberatore (10.1016/j.cor.2012.08.013_bib31) 2012; 40 Motto (10.1016/j.cor.2012.08.013_bib39) 2005; 20 Lim (10.1016/j.cor.2012.08.013_bib32) 2007; 39 Bard (10.1016/j.cor.2012.08.013_bib3) 1992; 39 10.1016/j.cor.2012.08.013_bib33 10.1016/j.cor.2012.08.013_bib5 Whiteman (10.1016/j.cor.2012.08.013_bib55) 1999; 4 10.1016/j.cor.2012.08.013_bib24 Gümüş (10.1016/j.cor.2012.08.013_bib21) 2005; 2 Wollmer (10.1016/j.cor.2012.08.013_bib58) 1964; 12 10.1016/j.cor.2012.08.013_bib25 10.1016/j.cor.2012.08.013_bib7 Brown (10.1016/j.cor.2012.08.013_bib9) 2006; 36 Nelder (10.1016/j.cor.2012.08.013_bib40) 1965; 7 O'Hanley (10.1016/j.cor.2012.08.013_bib41) 2007; 134 Snyder (10.1016/j.cor.2012.08.013_bib52) 2006 Church (10.1016/j.cor.2012.08.013_bib13) 2007; 39 10.1016/j.cor.2012.08.013_bib20 Chinchuluun (10.1016/j.cor.2012.08.013_bib11) 2009 Ghare (10.1016/j.cor.2012.08.013_bib18) 1971; 18 |
References_xml | – volume: 39 start-page: 15 year: 2007 end-page: 26 ident: bib32 article-title: Algorithms for discrete and continuous multicommodity flow network interdiction problems publication-title: IIE Transactions – volume: vol. 20 start-page: 149 year: 1998 end-page: 164 ident: bib16 article-title: Complexity issues in bilevel linear programming publication-title: Multilevel optimization: algorithms and applications. Nonconvex optimization and its applications – reference: ; 2009 [accessed August.12]. – volume: 94 start-page: 491 year: 2004 end-page: 502 ident: bib12 article-title: Identifying critical infrastructure: the median and covering facility interdiction problems publication-title: Annals of the Association of American Geographers – reference: Dempe S. Discrete bilevel optimization problems. Technical report D-04109. Germany: Institut für Wirtschaftsinformatik, Universität Leipzig; 2001. – reference: Xeon – volume: 12 start-page: 934 year: 1964 end-page: 940 ident: bib58 article-title: Removing arcs from a network publication-title: Operations Research – volume: 8 start-page: 538 year: 1983 end-page: 548 ident: bib29 article-title: Integer programming with a fixed number of variables publication-title: Mathematics of Operations Research – volume: 4 start-page: 15 year: 1999 end-page: 30 ident: bib55 article-title: Improving single strike effectiveness for network interdiction publication-title: Military Operations Research – reference: ; 2000 [accessed August.012]. – start-page: 234−57 year: 2006 ident: bib52 article-title: Planning for disruptions in supply chain networks publication-title: TutORials in Operations Research – volume: 38 start-page: 181 year: 2007 end-page: 199 ident: bib51 article-title: Survivable network design under optimal and heuristic interdiction scenarios publication-title: Journal of Global Optimization – year: 1952 ident: bib54 article-title: The theory of the market economy – volume: 18 start-page: 37 year: 1971 end-page: 45 ident: bib18 article-title: Optimal interdiction policy for a flow network publication-title: Naval Research Logistics Quarterly – volume: 40 start-page: 97 year: 2002 end-page: 111 ident: bib26 article-title: Shortest-path network interdiction publication-title: Networks – volume: 146 start-page: 137 year: 2010 end-page: 150 ident: bib27 article-title: Parametric integer programming algorithm for bilevel mixed integer programs publication-title: Journal of Optimization Theory and Application – reference: Brooks CH. The introduction to amoeba. – year: 1993 ident: bib22 article-title: Elements of structural optimization – year: 1997 ident: bib6 article-title: The logic of logistics: theory, algorithms, and applications for logistics management publication-title: Springer series in operations research – volume: 19 start-page: 905 year: 2004 end-page: 912 ident: bib45 article-title: Analysis of electric grid security under terrorist threat publication-title: IEEE Transactions on Power Systems – reference: ; 2005 [accessed August.12]. – volume: 35 start-page: 1905 year: 2008 end-page: 1923 ident: bib47 article-title: A bilevel mixed-integer program for critical infrastructure protection planning publication-title: Computers & Operations Research – reference: IBM ILOG CPLEX v12.1 parameters reference manual. – volume: 38 start-page: 357 year: 2011 end-page: 366 ident: bib30 article-title: Analysis of facility protection strategies against uncertain numbers of attacks: the stochastic publication-title: Computers and Operations Research – reference: Software—Intel Xeon W3690 average CPU mark report, – reference: 〉; 2008 [accessed August.12]. – volume: 20 start-page: 789 year: 2005 end-page: 797 ident: bib2 article-title: On the solution of the bilevel programming formulation of the terrorist threat problem publication-title: IEEE Transactions on Power Systems – reference: BBC News UK. Arsonists target ambulance station. BBC online network, – volume: 82 start-page: 2251 year: 2004 end-page: 2260 ident: bib35 article-title: Globalized Nelder–Mead method for engineering optimization publication-title: Computers and Structures – reference: Wolff S. A local and globalized, constrained and simple bounded Nelder–Mead method. Technical report. Germany: Bauhaus-Universität Weimar; 2004. As of August 2012, the report was not available at its original source. It can be downloaded from: – reference: PassMark – reference: DeNegre S. Interdiction and discrete bilevel linear programming. Unpublished PhD thesis. Bethlehem (PA), USA: Department of Industrial and Systems Engineering, Lehigh University; 2011. – volume: 20 start-page: 1357 year: 2005 end-page: 1365 ident: bib39 article-title: MILP for the analysis of electric grid security under disruptive threat publication-title: IEEE Transactions on Power Systems – reference: Radio Free Europe—Radio Liberty. Afghanistan: mobile-phone towers are Taliban's new target. 〈 – volume: 44 start-page: 29 year: 2009 end-page: 51 ident: bib44 article-title: Resolution method for mixed integer bi-level linear problems based on decomposition technique publication-title: Journal of Global Optimization – reference: Scaparra MP, Church RL. Protecting supply systems to mitigate potential disaster: a model to fortify capacitated facilities. Kent Business School working paper no. 209. UK: University of Kent; 2010. – volume: 39 start-page: 129 year: 2007 end-page: 146 ident: bib13 article-title: Protecting critical assets: the publication-title: Geographical Analysis – volume: 17 start-page: 1 year: 1993 end-page: 18 ident: bib59 article-title: Deterministic network interdiction publication-title: Mathematical and Computer Modelling – volume: 7 start-page: 308 year: 1965 end-page: 313 ident: bib40 article-title: A simplex method for function minimization publication-title: Computer Journal – reference: Processor 3600 series specifications page, – reference: Gurson AP. Simplex search behavior in nonlinear optimization, – reference: ; 2001 [accessed August.12]. – volume: 3 start-page: 411 year: 1990 end-page: 430 ident: bib49 article-title: A hierarchy of relaxations between the continuous and convex hull representations for zero-one programming problems publication-title: SIAM Journal on Discrete Mathematics – volume: 24 start-page: 96 year: 2009 end-page: 104 ident: bib46 article-title: Worst-case interdiction analysis of large-scale electric power grids publication-title: IEEE Transactions on Power Systems – volume: 38 start-page: 911 year: 1990 end-page: 921 ident: bib38 article-title: The mixed-integer linear bilevel programming problem publication-title: Operations Research – volume: 39 start-page: 419 year: 1992 end-page: 435 ident: bib3 article-title: An algorithm for the discrete bilevel programming problem publication-title: Naval Research Logistics – start-page: 197 year: 2009 end-page: 221 ident: bib11 article-title: Multilevel (hierarchical) optimization: complexity issues, optimality conditions, algorithms publication-title: Advances in applied mathematics and global optimization – reference: ; 1999 [accessed August.12]. – reference: Intel – volume: 27 start-page: 43 year: 2004 end-page: 54 ident: bib36 article-title: A constrained, globalised, and bounded Nelder–Mead method for engineering optimization publication-title: Structural and Multidisciplinary Optimization – volume: 12 start-page: 272 year: 2000 end-page: 283 ident: bib23 article-title: A revised simplex search procedure for the stochastic simulation response surface optimization publication-title: INFORMS Journal on Computing – volume: 17 start-page: 261 year: 1970 end-page: 268 ident: bib37 article-title: Optimal interdiction of supply network publication-title: Naval Research Logistics Quarterly – volume: 36 start-page: 530 year: 2006 end-page: 544 ident: bib9 article-title: Defending critical infrastructure publication-title: Interfaces – reference: Losada C, Scaparra MP, Church RL, Daskin MS. The multiple resource probabilistic interdiction median problem. Kent Business School working paper no. 187. UK: University of Kent; 2009. – reference: Wikipedia, the Free Encyclopedia. 2003 Istanbul bombings, – volume: 2 start-page: 181 year: 2005 end-page: 212 ident: bib21 article-title: Global optimization of mixed-integer bilevel programming problems publication-title: Computational Management Science – volume: 134 start-page: 130 year: 2007 end-page: 141 ident: bib41 article-title: Locating and protecting critical reserve sites to minimize expected and worst-case losses publication-title: Biological Conservation – reference: Copyright IBM Corporation 1987, – reference: Chalk P, Hoffman B, Reville R, Kasupski A. Trends in terrorism. RAND Center for Terrorism Risk Management Policy, – volume: 13 start-page: 116 year: 1977 end-page: 118 ident: bib17 article-title: Maximizing the minimum source-sink path subject to a budget constraint publication-title: Mathematical Programming – volume: 217 start-page: 519 year: 2012 end-page: 530 ident: bib34 article-title: Optimizing system resilience: a facility protection model with recovery time publication-title: European Journal of Operational Research – volume: 42 start-page: 954 year: 1996 end-page: 973 ident: bib4 article-title: Nelder–Mead simplex modifications for simulation optimization publication-title: Management Science – reference: . – reference: [accessed August.12]. – volume: 4 start-page: 441 year: 1962 end-page: 461 ident: bib53 article-title: Sequential application of simplex design in optimization and evolutionary operations publication-title: Technometrics – volume: 40 start-page: 21 year: 2012 end-page: 30 ident: bib31 article-title: Hedging against disruptions with ripple effects in location analysis publication-title: Omega – reference: ; 2011 [accessed August.12]. – volume: 18 start-page: 269 year: 2010 end-page: 291 ident: bib1 article-title: The budget constrained r-interdiction median problem with capacity expansion publication-title: Central European Journal of Operations Research – start-page: 102 year: 2005 end-page: 123 ident: bib8 article-title: Analyzing the vulnerability of critical infrastructure to attack and planning defenses publication-title: TutORials in Operations Research – volume: 25 start-page: 711 year: 1971 end-page: 713 ident: bib19 article-title: A problem in network interdiction publication-title: Naval Research Logistics Quarterly – volume: 3 start-page: 411 issue: 3 year: 1990 ident: 10.1016/j.cor.2012.08.013_bib49 article-title: A hierarchy of relaxations between the continuous and convex hull representations for zero-one programming problems publication-title: SIAM Journal on Discrete Mathematics doi: 10.1137/0403036 – ident: 10.1016/j.cor.2012.08.013_bib15 – ident: 10.1016/j.cor.2012.08.013_bib57 – volume: 7 start-page: 308 issue: 4 year: 1965 ident: 10.1016/j.cor.2012.08.013_bib40 article-title: A simplex method for function minimization publication-title: Computer Journal doi: 10.1093/comjnl/7.4.308 – volume: 4 start-page: 441 issue: 4 year: 1962 ident: 10.1016/j.cor.2012.08.013_bib53 article-title: Sequential application of simplex design in optimization and evolutionary operations publication-title: Technometrics doi: 10.1080/00401706.1962.10490033 – ident: 10.1016/j.cor.2012.08.013_bib48 – volume: 35 start-page: 1905 issue: 6 year: 2008 ident: 10.1016/j.cor.2012.08.013_bib47 article-title: A bilevel mixed-integer program for critical infrastructure protection planning publication-title: Computers & Operations Research doi: 10.1016/j.cor.2006.09.019 – start-page: 234−57 year: 2006 ident: 10.1016/j.cor.2012.08.013_bib52 article-title: Planning for disruptions in supply chain networks publication-title: TutORials in Operations Research – ident: 10.1016/j.cor.2012.08.013_bib25 – volume: 12 start-page: 934 issue: 6 year: 1964 ident: 10.1016/j.cor.2012.08.013_bib58 article-title: Removing arcs from a network publication-title: Operations Research doi: 10.1287/opre.12.6.934 – volume: 18 start-page: 37 issue: 1 year: 1971 ident: 10.1016/j.cor.2012.08.013_bib18 article-title: Optimal interdiction policy for a flow network publication-title: Naval Research Logistics Quarterly doi: 10.1002/nav.3800180103 – volume: 217 start-page: 519 issue: 3 year: 2012 ident: 10.1016/j.cor.2012.08.013_bib34 article-title: Optimizing system resilience: a facility protection model with recovery time publication-title: European Journal of Operational Research doi: 10.1016/j.ejor.2011.09.044 – ident: 10.1016/j.cor.2012.08.013_bib33 – ident: 10.1016/j.cor.2012.08.013_bib5 – volume: 27 start-page: 43 issue: 1−2 year: 2004 ident: 10.1016/j.cor.2012.08.013_bib36 article-title: A constrained, globalised, and bounded Nelder–Mead method for engineering optimization publication-title: Structural and Multidisciplinary Optimization doi: 10.1007/s00158-003-0320-9 – year: 1993 ident: 10.1016/j.cor.2012.08.013_bib22 – year: 1997 ident: 10.1016/j.cor.2012.08.013_bib6 article-title: The logic of logistics: theory, algorithms, and applications for logistics management – volume: 38 start-page: 911 issue: 5 year: 1990 ident: 10.1016/j.cor.2012.08.013_bib38 article-title: The mixed-integer linear bilevel programming problem publication-title: Operations Research doi: 10.1287/opre.38.5.911 – start-page: 197 year: 2009 ident: 10.1016/j.cor.2012.08.013_bib11 article-title: Multilevel (hierarchical) optimization: complexity issues, optimality conditions, algorithms – volume: 25 start-page: 711 issue: 4 year: 1971 ident: 10.1016/j.cor.2012.08.013_bib19 article-title: A problem in network interdiction publication-title: Naval Research Logistics Quarterly doi: 10.1002/nav.3800250412 – volume: 8 start-page: 538 issue: 4 year: 1983 ident: 10.1016/j.cor.2012.08.013_bib29 article-title: Integer programming with a fixed number of variables publication-title: Mathematics of Operations Research doi: 10.1287/moor.8.4.538 – volume: 17 start-page: 261 issue: 3 year: 1970 ident: 10.1016/j.cor.2012.08.013_bib37 article-title: Optimal interdiction of supply network publication-title: Naval Research Logistics Quarterly doi: 10.1002/nav.3800170302 – ident: 10.1016/j.cor.2012.08.013_bib43 – volume: 82 start-page: 2251 issue: 23−26 year: 2004 ident: 10.1016/j.cor.2012.08.013_bib35 article-title: Globalized Nelder–Mead method for engineering optimization publication-title: Computers and Structures doi: 10.1016/j.compstruc.2004.03.072 – volume: 12 start-page: 272 issue: 4 year: 2000 ident: 10.1016/j.cor.2012.08.013_bib23 article-title: A revised simplex search procedure for the stochastic simulation response surface optimization publication-title: INFORMS Journal on Computing doi: 10.1287/ijoc.12.4.272.11879 – volume: 38 start-page: 357 issue: 1 year: 2011 ident: 10.1016/j.cor.2012.08.013_bib30 article-title: Analysis of facility protection strategies against uncertain numbers of attacks: the stochastic R-interdiction median problem with fortification publication-title: Computers and Operations Research doi: 10.1016/j.cor.2010.06.002 – volume: 94 start-page: 491 issue: 3 year: 2004 ident: 10.1016/j.cor.2012.08.013_bib12 article-title: Identifying critical infrastructure: the median and covering facility interdiction problems publication-title: Annals of the Association of American Geographers doi: 10.1111/j.1467-8306.2004.00410.x – volume: vol. 20 start-page: 149 year: 1998 ident: 10.1016/j.cor.2012.08.013_bib16 article-title: Complexity issues in bilevel linear programming – volume: 44 start-page: 29 issue: 1 year: 2009 ident: 10.1016/j.cor.2012.08.013_bib44 article-title: Resolution method for mixed integer bi-level linear problems based on decomposition technique publication-title: Journal of Global Optimization doi: 10.1007/s10898-008-9291-0 – volume: 42 start-page: 954 issue: 7 year: 1996 ident: 10.1016/j.cor.2012.08.013_bib4 article-title: Nelder–Mead simplex modifications for simulation optimization publication-title: Management Science doi: 10.1287/mnsc.42.7.954 – volume: 17 start-page: 1 issue: 2 year: 1993 ident: 10.1016/j.cor.2012.08.013_bib59 article-title: Deterministic network interdiction publication-title: Mathematical and Computer Modelling doi: 10.1016/0895-7177(93)90236-R – ident: 10.1016/j.cor.2012.08.013_bib42 – volume: 134 start-page: 130 issue: 1 year: 2007 ident: 10.1016/j.cor.2012.08.013_bib41 article-title: Locating and protecting critical reserve sites to minimize expected and worst-case losses publication-title: Biological Conservation doi: 10.1016/j.biocon.2006.08.009 – volume: 13 start-page: 116 issue: 1 year: 1977 ident: 10.1016/j.cor.2012.08.013_bib17 article-title: Maximizing the minimum source-sink path subject to a budget constraint publication-title: Mathematical Programming doi: 10.1007/BF01584329 – volume: 36 start-page: 530 issue: 6 year: 2006 ident: 10.1016/j.cor.2012.08.013_bib9 article-title: Defending critical infrastructure publication-title: Interfaces doi: 10.1287/inte.1060.0252 – volume: 2 start-page: 181 issue: 3 year: 2005 ident: 10.1016/j.cor.2012.08.013_bib21 article-title: Global optimization of mixed-integer bilevel programming problems publication-title: Computational Management Science doi: 10.1007/s10287-005-0025-1 – volume: 19 start-page: 905 issue: 2 year: 2004 ident: 10.1016/j.cor.2012.08.013_bib45 article-title: Analysis of electric grid security under terrorist threat publication-title: IEEE Transactions on Power Systems doi: 10.1109/TPWRS.2004.825888 – ident: 10.1016/j.cor.2012.08.013_bib56 – volume: 39 start-page: 15 issue: 1 year: 2007 ident: 10.1016/j.cor.2012.08.013_bib32 article-title: Algorithms for discrete and continuous multicommodity flow network interdiction problems publication-title: IIE Transactions doi: 10.1080/07408170600729192 – volume: 39 start-page: 419 issue: 3 year: 1992 ident: 10.1016/j.cor.2012.08.013_bib3 article-title: An algorithm for the discrete bilevel programming problem publication-title: Naval Research Logistics doi: 10.1002/1520-6750(199204)39:3<419::AID-NAV3220390310>3.0.CO;2-C – volume: 4 start-page: 15 issue: 4 year: 1999 ident: 10.1016/j.cor.2012.08.013_bib55 article-title: Improving single strike effectiveness for network interdiction publication-title: Military Operations Research doi: 10.5711/morj.4.4.15 – ident: 10.1016/j.cor.2012.08.013_bib10 – ident: 10.1016/j.cor.2012.08.013_bib14 – start-page: 102 year: 2005 ident: 10.1016/j.cor.2012.08.013_bib8 article-title: Analyzing the vulnerability of critical infrastructure to attack and planning defenses publication-title: TutORials in Operations Research – volume: 18 start-page: 269 issue: 3 year: 2010 ident: 10.1016/j.cor.2012.08.013_bib1 article-title: The budget constrained r-interdiction median problem with capacity expansion publication-title: Central European Journal of Operations Research doi: 10.1007/s10100-009-0110-6 – volume: 20 start-page: 789 issue: 2 year: 2005 ident: 10.1016/j.cor.2012.08.013_bib2 article-title: On the solution of the bilevel programming formulation of the terrorist threat problem publication-title: IEEE Transactions on Power Systems doi: 10.1109/TPWRS.2005.846198 – volume: 24 start-page: 96 issue: 1 year: 2009 ident: 10.1016/j.cor.2012.08.013_bib46 article-title: Worst-case interdiction analysis of large-scale electric power grids publication-title: IEEE Transactions on Power Systems doi: 10.1109/TPWRS.2008.2004825 – ident: 10.1016/j.cor.2012.08.013_bib24 – volume: 38 start-page: 181 issue: 2 year: 2007 ident: 10.1016/j.cor.2012.08.013_bib51 article-title: Survivable network design under optimal and heuristic interdiction scenarios publication-title: Journal of Global Optimization doi: 10.1007/s10898-006-9067-3 – volume: 40 start-page: 97 issue: 2 year: 2002 ident: 10.1016/j.cor.2012.08.013_bib26 article-title: Shortest-path network interdiction publication-title: Networks doi: 10.1002/net.10039 – volume: 40 start-page: 21 issue: 1 year: 2012 ident: 10.1016/j.cor.2012.08.013_bib31 article-title: Hedging against disruptions with ripple effects in location analysis publication-title: Omega doi: 10.1016/j.omega.2011.03.003 – ident: 10.1016/j.cor.2012.08.013_bib7 doi: 10.4095/213921 – volume: 146 start-page: 137 issue: 1 year: 2010 ident: 10.1016/j.cor.2012.08.013_bib27 article-title: Parametric integer programming algorithm for bilevel mixed integer programs publication-title: Journal of Optimization Theory and Application doi: 10.1007/s10957-010-9668-3 – year: 1952 ident: 10.1016/j.cor.2012.08.013_bib54 – ident: 10.1016/j.cor.2012.08.013_bib20 – volume: 39 start-page: 129 issue: 2 year: 2007 ident: 10.1016/j.cor.2012.08.013_bib13 article-title: Protecting critical assets: the r-interdiction median problem with fortification publication-title: Geographical Analysis doi: 10.1111/j.1538-4632.2007.00698.x – volume: 20 start-page: 1357 issue: 3 year: 2005 ident: 10.1016/j.cor.2012.08.013_bib39 article-title: MILP for the analysis of electric grid security under disruptive threat publication-title: IEEE Transactions on Power Systems doi: 10.1109/TPWRS.2005.851942 |
SSID | ssj0000721 |
Score | 2.3321462 |
Snippet | In this paper, partial facility interdiction decisions are integrated for the first time into a median type network interdiction problem with capacitated... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 346 |
SubjectTerms | Bilevel programming Budgeting Decisions Demand Game theory Mathematical models Mathematical problems Mathematical programming Networks Operations research Outsourcing Partial facility interdiction Search methods Searching Simplex search Studies |
Title | A bilevel partial interdiction problem with capacitated facilities and demand outsourcing |
URI | https://dx.doi.org/10.1016/j.cor.2012.08.013 https://www.proquest.com/docview/1442810403 https://www.proquest.com/docview/1475548206 https://www.proquest.com/docview/1671552743 |
Volume | 41 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB76ANGDj6pYrWUFT0JssrtN7LEUS1XoxQr1FLLJBio1LZp69Lc7s9n4AnvwlMfOLsk-5rEz-w3AufLJOSUCR7kidaQWrhOhGuEo0UXxl6JEUCbaYuyPHuTttDutwKA8C0NhlZb3FzzdcGv7pmN7s7OczTr3NFVR4UAJVeSYr0Kdi57frUG9f3M3Gn8x5MAcvyJ6hyqUzk0T5oU2HgV4cQPk6Ym_xNMvRm2kz3AXtq3ayPrFl-1BRWcN2Cij1huwU2ZnYHaxNmDrG9TgPjz2mUIG8KbnbEn_h40RUgROD3OwgdnEMoz2ZVmMEjSmw2c6YSnezQ3sKouyhCX6mS6LVW62_bHtA5gMryeDkWPTKjix5Dx3yKGuhYgDjydeFMSoUwiRpqiKuTK9Slw_ijmaET0lAnKqpVJ5nvJkEImoR3Bnh1DLFpk-AoZvFFrQSINWSY_rSGtUoWIUeJJrP5VNcMvODGMLOU6ZL-ZhGVv2FGL_h9T_IWXD9EQTLj6rLAu8jXXEshyh8MekCVEerKvWKkcztCv2FU0gNMTQNnWx-OyzGNcaOVCiTC9WRBOg9kWI92to_MCg2klx_L-vO4FNfJLFNk8LavnLSp-i4pOrNlQv3722nd4fxtr_cw |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDLbGkHgceAwQgwFB4oRU1jZZy47TBBowdmFI4xQ1bSoNjW6CjSO_HTtNx0NiB06tGidKEye2Y-czwJkKyDnFQ0e5PHWE5q4ToRrhKN5A8ZeiRFAm2qIXdB7F7aAxKEG7uAtDYZV278_3dLNb2y91O5r1yXBYfyBWRYUDJVSeY34JlkWDhxTXd_HxFedBAGC5K6HhEHnh2jRBXmjhUXiXb2A8Pf6XcPq1TRvZc70FG1ZpZK28X9tQ0lkFVoqY9QpsFrkZmF2qFVj_BjS4A08tpnD5v-sRm9DfYWOEE4HMYa41MJtWhtGpLItRfsZ09UwnLMW3kQFdZVGWsES_0GM8m5pDf2x7F_rXV_12x7FJFZxY-P7UIXe65jwOPT_xojBGjYLzNEVFzBXpZeIGUeyjEdFUPCSXWiqU5ylPhBGPmgR2tgflbJzpfWD4RaH9jDRokzR9HWmNClSM4k74OkhFFdxiMGVsAccp78VIFpFlzxLHX9L4S8qF6fEqnM-rTHK0jUXEopgh-YNlJEqDRdVqxWxKu17f0ABCMwwtUxeLT-fFuNLIfRJlejwjmhB1L8K7X0AThAbTTvCD__XuBFY7_fuu7N707g5hDUtEfuBTg_L0daaPUAWaqmPD4p_umgBN |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+bilevel+partial+interdiction+problem+with+capacitated+facilities+and+demand+outsourcing&rft.jtitle=Computers+%26+operations+research&rft.au=Aksen%2C+Deniz&rft.au=Akca%2C+Sema+Sengul&rft.au=Aras%2C+Necati&rft.date=2014-01-01&rft.issn=0305-0548&rft.volume=41&rft.spage=346&rft.epage=358&rft_id=info:doi/10.1016%2Fj.cor.2012.08.013&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0305-0548&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0305-0548&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0305-0548&client=summon |