ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
6
views
0
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
540
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
On the power of randomization in network interdiction
Author(s):
Dimitris Bertsimas
,
Ebrahim Nasrabadi
,
James B. Orlin
Publication date
Created:
January 2016
Publication date
(Print):
January 2016
Journal:
Operations Research Letters
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Further versions
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Network and Systems Medicine
Author and article information
Journal
Title:
Operations Research Letters
Abbreviated Title:
Operations Research Letters
Publisher:
Elsevier BV
ISSN (Print):
01676377
Publication date Created:
January 2016
Publication date (Print):
January 2016
Volume
: 44
Issue
: 1
Pages
: 114-120
Article
DOI:
10.1016/j.orl.2015.11.005
SO-VID:
a7add4cd-958d-4c79-af17-ddc0dec87f2b
Copyright ©
© 2016
License:
http://www.elsevier.com/tdm/userlicense/1.0/
History
Data availability:
Comments
Comment on this article
Sign in to comment
Related Documents Log
scite_
Similar content
540
Machine learning based approaches to solve the maximum flow network interdiction problem
Authors:
N. Orkun Baycik
Interdicting Gq Activation in Airway Disease by Receptor-Dependent and Receptor-Independent Mechanisms
Authors:
J L Benovic
,
R. Carr
,
C. Koziol-White
…
Interdiction-Based Approaches to Identify Damage in Disrupted Critical Infrastructures with Dependencies
Authors:
N. Baycik
,
Thomas Sharkey
See all similar
Cited by
8
Network Inspection for Detecting Strategic Attacks
Authors:
Mathieu Dahan
,
Lina Sela
,
Saurabh Amin
Shortest Path Network Interdiction With Goal Threshold
Authors:
Xiangyu Wei
,
Cheng Zhu
,
Kaiming Xiao
…
Network Interdiction Using Adversarial Traffic Flows
Authors:
Xinzhe Fu
,
Eytan Modiano
See all cited by