Evader interdiction: algorithms, complexity and collateral damage (Q490228): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q34361359, #quickstatements; #temporary_batch_1712201099914
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / arXiv ID
 
Property / arXiv ID: 1108.0894 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved approximation for directed cut problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding the <i>n</i> Most Vital Links in Flow Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Polynomial flow-cut gaps and hardness of directed cut problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding the <i>n</i> Most Vital Nodes in a Flow Network / rank
 
Normal rank
Property / cites work
 
Property / cites work: Most vital links and nodes in weighted networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithms for capacitated rectangle stabbing and lot sizing with joint set-up costs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Graph Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: A threshold of ln <i>n</i> for approximating set cover / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some simplified NP-complete graph problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Primal-dual approximation algorithms for integral flow and multicut in trees / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant Ratio Approximation Algorithms for the Rectangle Stabbing Problem and the Rectilinear Partitioning Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithms for Minimum Coloring, Maximum Clique, Minimum Covering by Cliques, and Maximum Independent Set of a Chordal Graph / rank
 
Normal rank
Property / cites work
 
Property / cites work: Approximating the <i>k</i>-multicut problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Interdiction of Unreactive Markovian Evaders / rank
 
Normal rank
Property / cites work
 
Property / cites work: The checkpoint problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Submodular Function Minimization under Covering Constraints / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding All the Elementary Circuits of a Directed Graph / rank
 
Normal rank
Property / cites work
 
Property / cites work: Maintenance of a piercing set for intervals with applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Vertex cover might be hard to approximate to within \(2 - \varepsilon \) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Greedy ${\ensuremath{\Delta}}$ -Approximation Algorithm for Covering with Arbitrary Constraints and Submodular Cost / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial multicuts in trees / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal interdiction of a supply network / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Maximum Coverage Location Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the positive-negative partial set cover problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast stabbing of boxes in high dimensions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4452910 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228512 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3002782 / rank
 
Normal rank

Latest revision as of 13:50, 9 July 2024

scientific article
Language Label Description Also known as
English
Evader interdiction: algorithms, complexity and collateral damage
scientific article

    Statements

    Evader interdiction: algorithms, complexity and collateral damage (English)
    0 references
    0 references
    0 references
    0 references
    22 January 2015
    0 references
    network interdiction
    0 references
    bridge policy
    0 references
    submodular set cover
    0 references
    Markov chain
    0 references
    minimal cut
    0 references
    four color theorem
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers