An integer programming framework for critical elements detection in graphs

This study presents an integer programming framework for minimizing the connectivity and cohesiveness properties of a given graph by removing nodes and edges subject to a joint budgetary constraint. The connectivity and cohesiveness metrics are assumed to be general functions of sizes of the remaini...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Journal of combinatorial optimization Ročník 28; číslo 1; s. 233 - 273
Hlavní autori: Veremyev, Alexander, Prokopyev, Oleg A., Pasiliao, Eduardo L.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Boston Springer US 01.07.2014
Predmet:
ISSN:1382-6905, 1573-2886
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract This study presents an integer programming framework for minimizing the connectivity and cohesiveness properties of a given graph by removing nodes and edges subject to a joint budgetary constraint. The connectivity and cohesiveness metrics are assumed to be general functions of sizes of the remaining connected components and node degrees, respectively. We demonstrate that our approach encompasses, as special cases (possibly, under some mild conditions), several other models existing in the literature, including minimization of the total number of connected node pairs, minimization of the largest connected component size, and maximization of the number of connected components. We discuss computational complexity issues, derive linear mixed integer programming (MIP) formulations, and describe additional modeling enhancements aimed at improving the performance of MIP solvers. We also conduct extensive computational experiments with real-life and randomly generated network instances under various settings that reveal interesting insights and demonstrate advantages and limitations of the proposed framework.
AbstractList This study presents an integer programming framework for minimizing the connectivity and cohesiveness properties of a given graph by removing nodes and edges subject to a joint budgetary constraint. The connectivity and cohesiveness metrics are assumed to be general functions of sizes of the remaining connected components and node degrees, respectively. We demonstrate that our approach encompasses, as special cases (possibly, under some mild conditions), several other models existing in the literature, including minimization of the total number of connected node pairs, minimization of the largest connected component size, and maximization of the number of connected components. We discuss computational complexity issues, derive linear mixed integer programming (MIP) formulations, and describe additional modeling enhancements aimed at improving the performance of MIP solvers. We also conduct extensive computational experiments with real-life and randomly generated network instances under various settings that reveal interesting insights and demonstrate advantages and limitations of the proposed framework.
Author Veremyev, Alexander
Pasiliao, Eduardo L.
Prokopyev, Oleg A.
Author_xml – sequence: 1
  givenname: Alexander
  surname: Veremyev
  fullname: Veremyev, Alexander
  organization: Air Force Research Laboratory, Munitions Directorate
– sequence: 2
  givenname: Oleg A.
  surname: Prokopyev
  fullname: Prokopyev, Oleg A.
  email: droleg@pitt.edu
  organization: Department of Industrial Engineering, University of Pittsburgh
– sequence: 3
  givenname: Eduardo L.
  surname: Pasiliao
  fullname: Pasiliao, Eduardo L.
  organization: Air Force Research Laboratory, Munitions Directorate
BookMark eNp9kM1OAyEURompiW31AdzxAuhlgIEum8afmiZudE0YhqnUGaYBjPHtZVJXLrq63-Z8996zQLMwBofQLYU7CiDvEwUlFQHKyUoyIPwCzamQjFRK1bOSmapIvQJxhRYpHQCgZD5HL-uAfchu7yI-xnEfzTD4sMddCe57jJ-4GyO20WdvTY9d7wYXcsKty85mP040LtTxI12jy870yd38zSV6f3x42zyT3evTdrPeEcuEyqQRtgHlQFZWtLVVIBowLedcMet4I7lppRK8hq6tLGWVMyvbSFsZwaTpqGVLRE-9No4pRdfpY_SDiT-agp5k6JMMXWToSYbmhZH_GOuzme7P0fj-LFmdyFS2hKJJH8avGMqDZ6Bfbsx2-Q
CitedBy_id crossref_primary_10_1016_j_physa_2019_122862
crossref_primary_10_1287_ijoc_2018_0829
crossref_primary_10_1016_j_ejor_2017_08_053
crossref_primary_10_1007_s10878_024_01173_3
crossref_primary_10_1002_net_21761
crossref_primary_10_1007_s00500_019_03824_8
crossref_primary_10_1007_s11590_020_01540_z
crossref_primary_10_1080_10556788_2016_1214958
crossref_primary_10_1016_j_ejor_2022_01_009
crossref_primary_10_1371_journal_pone_0321722
crossref_primary_10_17714_gumusfenbil_1569247
crossref_primary_10_1016_j_cja_2017_04_012
crossref_primary_10_1016_j_eswa_2025_129599
crossref_primary_10_1016_j_disopt_2018_06_005
crossref_primary_10_1007_s13278_017_0426_5
crossref_primary_10_1016_j_ejor_2021_03_051
crossref_primary_10_1109_TCYB_2018_2848116
crossref_primary_10_1287_ijoc_2020_0992
crossref_primary_10_1007_s10479_023_05630_w
crossref_primary_10_1088_2515_7620_ac9459
crossref_primary_10_1016_j_jocs_2022_101738
crossref_primary_10_3389_ffgc_2023_1186616
crossref_primary_10_1007_s10288_022_00518_0
crossref_primary_10_1007_s11067_018_9407_0
crossref_primary_10_1016_j_cor_2020_105138
crossref_primary_10_3390_en17010225
crossref_primary_10_1016_j_ecoinf_2025_103339
crossref_primary_10_1016_j_omega_2019_02_006
crossref_primary_10_1108_JDAL_07_2018_0012
crossref_primary_10_1186_s40649_015_0010_y
crossref_primary_10_1287_deca_2015_0325
crossref_primary_10_1007_s11269_023_03675_x
crossref_primary_10_1007_s10479_019_03315_x
crossref_primary_10_1007_s11590_018_1371_6
crossref_primary_10_1016_j_ejor_2015_05_037
crossref_primary_10_1371_journal_pone_0258060
crossref_primary_10_1016_j_cor_2018_11_016
crossref_primary_10_1016_j_ejor_2022_09_013
crossref_primary_10_1016_j_eswa_2016_08_051
crossref_primary_10_1016_j_physa_2019_122322
crossref_primary_10_1287_ijoc_2020_1018
crossref_primary_10_1016_j_jcss_2022_02_004
crossref_primary_10_1002_net_21622
crossref_primary_10_1007_s10479_016_2110_y
crossref_primary_10_1016_j_engappai_2016_06_010
crossref_primary_10_1038_s41598_019_47292_4
crossref_primary_10_1016_j_adhoc_2024_103744
crossref_primary_10_1002_net_21948
crossref_primary_10_1016_j_ejor_2022_11_039
crossref_primary_10_1016_j_ress_2024_110422
crossref_primary_10_1007_s10589_025_00698_5
crossref_primary_10_1016_j_disopt_2025_100889
crossref_primary_10_1016_j_ins_2023_119140
crossref_primary_10_1016_j_ress_2018_11_020
crossref_primary_10_1080_01605682_2021_1913078
crossref_primary_10_1142_S0217595920500414
crossref_primary_10_1016_j_tcs_2022_05_011
crossref_primary_10_1016_j_cor_2018_04_012
crossref_primary_10_1007_s10898_018_0703_5
crossref_primary_10_1109_TCCN_2024_3427123
crossref_primary_10_1287_ijoc_2022_0130
crossref_primary_10_1002_net_21834
crossref_primary_10_1016_j_cor_2021_105254
crossref_primary_10_1038_s41598_025_94886_2
crossref_primary_10_1016_j_cosrev_2018_02_002
crossref_primary_10_1209_0295_5075_118_68002
crossref_primary_10_1016_j_ejor_2017_06_050
crossref_primary_10_1109_ACCESS_2022_3207775
Cites_doi 10.1016/j.cor.2013.09.012
10.1007/s10589-012-9458-y
10.1002/bltj.10093
10.1137/S003614450342480
10.1103/RevModPhys.74.47
10.1007/PL00012580
10.1016/j.dam.2013.03.021
10.1016/j.cor.2007.09.004
10.1016/j.cor.2008.08.016
10.1007/978-3-642-20877-5_20
10.1007/978-1-4614-4109-0_2
10.1016/S0377-2217(03)00135-8
10.1287/ijoc.1090.0365
10.1007/s00265-003-0651-y
10.1016/j.cor.2012.02.008
10.1111/j.1467-9574.2007.00350.x
10.1137/050630106
10.1007/s10588-006-7084-x
10.1016/j.disopt.2006.12.003
10.1109/TNET.2011.2170849
10.1007/978-0-387-30165-5
10.1016/j.disopt.2012.07.001
10.1109/INFCOM.2010.5462098
10.1002/net.20464
10.5210/fm.v7i4.941
10.5486/PMD.1959.6.3-4.12
10.1145/800133.804355
10.1109/ICSMC.2011.6084086
10.1145/316188.316229
10.1007/978-3-540-89900-6_5
10.1086/jar.33.4.3629752
ContentType Journal Article
Copyright Springer Science+Business Media New York 2014
Copyright_xml – notice: Springer Science+Business Media New York 2014
DBID AAYXX
CITATION
DOI 10.1007/s10878-014-9730-4
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Mathematics
EISSN 1573-2886
EndPage 273
ExternalDocumentID 10_1007_s10878_014_9730_4
GroupedDBID -5D
-5G
-BR
-EM
-Y2
-~C
.86
.DC
.VR
06D
0R~
0VY
1N0
1SB
203
29K
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5VS
67Z
6NX
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYOK
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BAPOH
BDATZ
BGNMA
BSONS
CAG
COF
CS3
CSCUP
D-I
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
F5P
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
J9A
JBSCW
JCJTX
JZLTJ
KDC
KOV
LAK
LLZTM
M4Y
MA-
N2Q
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
OVD
P2P
P9R
PF0
PT4
PT5
QOS
R89
R9I
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S27
S3B
SAP
SDH
SHX
SISQX
SJYHP
SMT
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TEORI
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7X
Z83
Z88
ZMTXR
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABJCF
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFFHD
AFHIU
AFKRA
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ARAPS
ATHPR
AYFIA
AZQEC
BENPR
BGLVJ
CCPQU
CITATION
DWQXO
GNUQQ
HCIFZ
M2P
M7S
PHGZM
PHGZT
PQGLB
PTHSS
ID FETCH-LOGICAL-c358t-b5cb08e072c5d6c805b0ad44483ce4b74ad785460fd2c132ea9cb7c2a537af1c3
IEDL.DBID RSV
ISICitedReferencesCount 80
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000337042900013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1382-6905
IngestDate Sat Nov 29 04:54:11 EST 2025
Tue Nov 18 21:06:45 EST 2025
Fri Feb 21 02:33:41 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Critical edge detection
Mixed integer programming
Critical node detection
Network interdiction
Language English
License http://www.springer.com/tdm
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c358t-b5cb08e072c5d6c805b0ad44483ce4b74ad785460fd2c132ea9cb7c2a537af1c3
PageCount 41
ParticipantIDs crossref_primary_10_1007_s10878_014_9730_4
crossref_citationtrail_10_1007_s10878_014_9730_4
springer_journals_10_1007_s10878_014_9730_4
PublicationCentury 2000
PublicationDate 2014-07-01
PublicationDateYYYYMMDD 2014-07-01
PublicationDate_xml – month: 07
  year: 2014
  text: 2014-07-01
  day: 01
PublicationDecade 2010
PublicationPlace Boston
PublicationPlace_xml – name: Boston
PublicationTitle Journal of combinatorial optimization
PublicationTitleAbbrev J Comb Optim
PublicationYear 2014
Publisher Springer US
Publisher_xml – name: Springer US
References Chung, Lu (CR7) 2002; 6
Garey, Johnson (CR18) 1979
Erdős, Rényi (CR15) 1959; 6
CR19
Zachary (CR40) 1977; 33
Arulselvan, Commander, Elefteriadou, Pardalos (CR2) 2009; 36
Myung, Kim (CR25) 2004; 156
CR17
CR39
CR16
CR37
CR14
CR12
CR34
Newman (CR26) 2003; 45
Oosten, Rutten, Spieksma (CR27) 2007; 61
Davis, Hu (CR10) 2011; 38
Lusseau, Schneider, Boisseau, Haase, Slooten, Dawson (CR23) 2003; 54
CR31
Shen, Smith (CR32) 2012; 60
Shen, Smith, Goli (CR33) 2012a; 9
Ventresca, Aleman (CR36) 2014; 43
Houck, Kim, O’Reilly, Picklesimer, Uzunalioglu (CR20) 2004; 8
Arulselvan, Commander, Shylo, Pardalos, Gulpinar, Harrison, Rustem (CR4) 2011
Arulselvan, Commander, Pardalos, Shylo (CR3) 2007
Köppe, Louveaux, Weismantel (CR21) 2008; 5
Addis, Di Summa, Grosso (CR1) 2013; 161
CR29
Bodlaender, Hendriks, Grigoriev, Grigorieva (CR5) 2010; 22
CR28
CR9
Walteros, Pardalos, Daras (CR38) 2012
CR22
Matisziw, Murray (CR24) 2009; 36
Zwaan, Berger, Grigoriev, Ogihara, Tarui (CR41) 2011
Borgatti (CR6) 2006; 12
Chung, Lu (CR8) 2006; 20
Di Summa, Grosso, Locatelli (CR11) 2012; 53
Dinh, Xuan, Thai, Pardalos, Znati (CR13) 2012; 20
Reka, Barabási (CR30) 2002; 74
Ventresca (CR35) 2012; 39
TN Dinh (9730_CR13) 2012; 20
S Shen (9730_CR32) 2012; 60
9730_CR29
M Ventresca (9730_CR36) 2014; 43
P Erdős (9730_CR15) 1959; 6
9730_CR28
M Summa Di (9730_CR11) 2012; 53
R Zwaan (9730_CR41) 2011
9730_CR22
SP Borgatti (9730_CR6) 2006; 12
M Oosten (9730_CR27) 2007; 61
TA Davis (9730_CR10) 2011; 38
A Reka (9730_CR30) 2002; 74
M Garey (9730_CR18) 1979
WW Zachary (9730_CR40) 1977; 33
9730_CR9
HL Bodlaender (9730_CR5) 2010; 22
MEJ Newman (9730_CR26) 2003; 45
9730_CR19
A Arulselvan (9730_CR3) 2007
9730_CR16
9730_CR17
9730_CR39
9730_CR14
M Ventresca (9730_CR35) 2012; 39
9730_CR37
9730_CR12
9730_CR34
B Addis (9730_CR1) 2013; 161
DJ Houck (9730_CR20) 2004; 8
9730_CR33
Matthias Köppe (9730_CR21) 2008; 5
9730_CR31
F Chung (9730_CR8) 2006; 20
A Arulselvan (9730_CR2) 2009; 36
A Arulselvan (9730_CR4) 2011
F Chung (9730_CR7) 2002; 6
JL Walteros (9730_CR38) 2012
TC Matisziw (9730_CR24) 2009; 36
Y-S Myung (9730_CR25) 2004; 156
D Lusseau (9730_CR23) 2003; 54
References_xml – year: 2007
  ident: CR3
  publication-title: Managing network risk via critical node identification, Risk Management in Telecommunication Networks
– volume: 43
  start-page: 261
  year: 2014
  end-page: 270
  ident: CR36
  article-title: A derandomized approximation algorithm for the critical node detection problem
  publication-title: Computers & Operations Research
  doi: 10.1016/j.cor.2013.09.012
– volume: 53
  start-page: 649
  issue: 3
  year: 2012
  end-page: 680
  ident: CR11
  article-title: Branch and cut algorithms for detecting critical nodes in undirected graphs
  publication-title: Computational Optimization and Applications
  doi: 10.1007/s10589-012-9458-y
– ident: CR22
– volume: 60
  start-page: 103
  issue: 2
  year: 2012
  end-page: 119
  ident: CR32
  article-title: Polynomial-time algorithms for solving a class of critical node problems on trees and series-parallel graphs
  publication-title: Networks
– volume: 8
  start-page: 153
  issue: 4
  year: 2004
  end-page: 172
  ident: CR20
  article-title: A network survivability model for critical national infrastructures
  publication-title: Bell Labs Technical Journal
  doi: 10.1002/bltj.10093
– ident: CR14
– volume: 45
  start-page: 167
  year: 2003
  end-page: 256
  ident: CR26
  article-title: The structure and function of complex networks
  publication-title: SIAM Review
  doi: 10.1137/S003614450342480
– ident: CR39
– ident: CR16
– ident: CR37
– volume: 74
  start-page: 47
  year: 2002
  end-page: 97
  ident: CR30
  article-title: Statistical mechanics of complex networks
  publication-title: Reviews of Modern Physics
  doi: 10.1103/RevModPhys.74.47
– ident: CR12
– volume: 6
  start-page: 125
  issue: 2
  year: 2002
  end-page: 145
  ident: CR7
  article-title: Connected components in random graphs with given expected degree sequences
  publication-title: Annals of Combinatorics
  doi: 10.1007/PL00012580
– ident: CR29
– volume: 161
  start-page: 2349
  issue: 16/17
  year: 2013
  end-page: 2360
  ident: CR1
  article-title: Identifying critical nodes in undirected graphs: Complexity results and polynomial algorithms for the case of bounded treewidth
  publication-title: Discrete Applied Mathematics
  doi: 10.1016/j.dam.2013.03.021
– volume: 36
  start-page: 16
  issue: 1
  year: 2009
  end-page: 26
  ident: CR24
  article-title: Modeling path availability to support disaster vulnerability assessment of network infrastructure
  publication-title: Computers & Operations Research
  doi: 10.1016/j.cor.2007.09.004
– volume: 36
  start-page: 2193
  issue: 7
  year: 2009
  end-page: 2200
  ident: CR2
  article-title: Detecting critical nodes in sparse graphs
  publication-title: Computers & Operations Research
  doi: 10.1016/j.cor.2008.08.016
– volume: 6
  start-page: 290
  year: 1959
  end-page: 297
  ident: CR15
  article-title: On random graphs
  publication-title: Publicationes Mathematicae Debrecen
– start-page: 184
  year: 2011
  end-page: 194
  ident: CR41
  article-title: How to cut a graph into many pieces
  publication-title: Theory and Applications of Models of Computation, Lecture Notes in Computer Science
  doi: 10.1007/978-3-642-20877-5_20
– start-page: 9
  year: 2012
  end-page: 26
  ident: CR38
  article-title: Selected topics in critical element detection
  publication-title: Applications of Mathematics and Informatics in Military Science, Springer Optimization and Its Applications
  doi: 10.1007/978-1-4614-4109-0_2
– year: 1979
  ident: CR18
  publication-title: Computers and Intractability: A Guide to the Theory of NP-completeness
– volume: 38
  start-page: 1
  issue: 1
  year: 2011
  end-page: 25
  ident: CR10
  article-title: The university of florida sparse matrix collection
  publication-title: ACM Transactions on Mathematical Software
– volume: 156
  start-page: 579
  issue: 3
  year: 2004
  end-page: 589
  ident: CR25
  article-title: A cutting plane algorithm for computing k-edge survivability of a network
  publication-title: European Journal of Operational Research
  doi: 10.1016/S0377-2217(03)00135-8
– ident: CR19
– volume: 22
  start-page: 433
  issue: 3
  year: 2010
  end-page: 442
  ident: CR5
  article-title: The valve location problem in simple network topologies
  publication-title: INFORMS Journal on Computing
  doi: 10.1287/ijoc.1090.0365
– volume: 54
  start-page: 396
  issue: 4
  year: 2003
  end-page: 405
  ident: CR23
  article-title: The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations
  publication-title: Behavioral Ecology and Sociobiology
  doi: 10.1007/s00265-003-0651-y
– volume: 33
  start-page: 452
  year: 1977
  end-page: 473
  ident: CR40
  article-title: An information flow model for conflict and fission in small groups
  publication-title: Journal of Anthropological Research
– volume: 39
  start-page: 2763
  issue: 11
  year: 2012
  end-page: 2775
  ident: CR35
  article-title: Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem
  publication-title: Computers & Operations Research
  doi: 10.1016/j.cor.2012.02.008
– ident: CR17
– ident: CR31
– start-page: 79
  year: 2011
  end-page: 91
  ident: CR4
  article-title: Cardinality-constrained critical node detection problem
  publication-title: Performance Models and Risk Management in Communications Systems, Springer Optimization and Its Applications
– ident: CR9
– ident: CR34
– volume: 9
  start-page: 172
  issue: 3
  year: 2012a
  end-page: 188
  ident: CR33
  article-title: Exact interdiction models and algorithms for disconnecting networks via node deletions
  publication-title: Discrete Optimization
– volume: 61
  start-page: 35
  issue: 1
  year: 2007
  end-page: 60
  ident: CR27
  article-title: Disconnecting graphs by removing vertices: a polyhedral approach
  publication-title: Statistica Neerlandica
  doi: 10.1111/j.1467-9574.2007.00350.x
– volume: 20
  start-page: 395
  issue: 2
  year: 2006
  end-page: 411
  ident: CR8
  article-title: The volume of the giant component of a random graph with given expected degrees
  publication-title: SIAM Journal on Discrete Mathematics
  doi: 10.1137/050630106
– volume: 12
  start-page: 21
  issue: 1
  year: 2006
  end-page: 34
  ident: CR6
  article-title: Identifying sets of key players in a social network
  publication-title: Computational & Mathematical Organization Theory
  doi: 10.1007/s10588-006-7084-x
– volume: 5
  start-page: 293
  issue: 2
  year: 2008
  end-page: 313
  ident: CR21
  article-title: Intermediate integer programming representations using value disjunctions
  publication-title: Discrete Optimization
  doi: 10.1016/j.disopt.2006.12.003
– ident: CR28
– volume: 20
  start-page: 609
  issue: 2
  year: 2012
  end-page: 619
  ident: CR13
  article-title: On new approaches of assessing network vulnerability: hardness and approximation
  publication-title: IEEE/ACM Transactions on Networking
  doi: 10.1109/TNET.2011.2170849
– volume: 36
  start-page: 16
  issue: 1
  year: 2009
  ident: 9730_CR24
  publication-title: Computers & Operations Research
  doi: 10.1016/j.cor.2007.09.004
– volume: 74
  start-page: 47
  year: 2002
  ident: 9730_CR30
  publication-title: Reviews of Modern Physics
  doi: 10.1103/RevModPhys.74.47
– volume: 20
  start-page: 609
  issue: 2
  year: 2012
  ident: 9730_CR13
  publication-title: IEEE/ACM Transactions on Networking
  doi: 10.1109/TNET.2011.2170849
– ident: 9730_CR31
  doi: 10.1007/978-0-387-30165-5
– ident: 9730_CR33
  doi: 10.1016/j.disopt.2012.07.001
– ident: 9730_CR14
  doi: 10.1109/INFCOM.2010.5462098
– volume: 43
  start-page: 261
  year: 2014
  ident: 9730_CR36
  publication-title: Computers & Operations Research
  doi: 10.1016/j.cor.2013.09.012
– volume: 12
  start-page: 21
  issue: 1
  year: 2006
  ident: 9730_CR6
  publication-title: Computational & Mathematical Organization Theory
  doi: 10.1007/s10588-006-7084-x
– ident: 9730_CR17
– volume: 45
  start-page: 167
  year: 2003
  ident: 9730_CR26
  publication-title: SIAM Review
  doi: 10.1137/S003614450342480
– volume-title: Computers and Intractability: A Guide to the Theory of NP-completeness
  year: 1979
  ident: 9730_CR18
– volume-title: Managing network risk via critical node identification, Risk Management in Telecommunication Networks
  year: 2007
  ident: 9730_CR3
– volume: 20
  start-page: 395
  issue: 2
  year: 2006
  ident: 9730_CR8
  publication-title: SIAM Journal on Discrete Mathematics
  doi: 10.1137/050630106
– ident: 9730_CR12
– volume: 60
  start-page: 103
  issue: 2
  year: 2012
  ident: 9730_CR32
  publication-title: Networks
  doi: 10.1002/net.20464
– start-page: 79
  volume-title: Performance Models and Risk Management in Communications Systems, Springer Optimization and Its Applications
  year: 2011
  ident: 9730_CR4
– volume: 36
  start-page: 2193
  issue: 7
  year: 2009
  ident: 9730_CR2
  publication-title: Computers & Operations Research
  doi: 10.1016/j.cor.2008.08.016
– start-page: 9
  volume-title: Applications of Mathematics and Informatics in Military Science, Springer Optimization and Its Applications
  year: 2012
  ident: 9730_CR38
  doi: 10.1007/978-1-4614-4109-0_2
– volume: 22
  start-page: 433
  issue: 3
  year: 2010
  ident: 9730_CR5
  publication-title: INFORMS Journal on Computing
  doi: 10.1287/ijoc.1090.0365
– ident: 9730_CR22
  doi: 10.5210/fm.v7i4.941
– volume: 161
  start-page: 2349
  issue: 16/17
  year: 2013
  ident: 9730_CR1
  publication-title: Discrete Applied Mathematics
  doi: 10.1016/j.dam.2013.03.021
– volume: 6
  start-page: 290
  year: 1959
  ident: 9730_CR15
  publication-title: Publicationes Mathematicae Debrecen
  doi: 10.5486/PMD.1959.6.3-4.12
– volume: 6
  start-page: 125
  issue: 2
  year: 2002
  ident: 9730_CR7
  publication-title: Annals of Combinatorics
  doi: 10.1007/PL00012580
– volume: 54
  start-page: 396
  issue: 4
  year: 2003
  ident: 9730_CR23
  publication-title: Behavioral Ecology and Sociobiology
  doi: 10.1007/s00265-003-0651-y
– volume: 5
  start-page: 293
  issue: 2
  year: 2008
  ident: 9730_CR21
  publication-title: Discrete Optimization
  doi: 10.1016/j.disopt.2006.12.003
– ident: 9730_CR37
– ident: 9730_CR39
  doi: 10.1145/800133.804355
– ident: 9730_CR19
  doi: 10.1109/ICSMC.2011.6084086
– volume: 8
  start-page: 153
  issue: 4
  year: 2004
  ident: 9730_CR20
  publication-title: Bell Labs Technical Journal
  doi: 10.1002/bltj.10093
– ident: 9730_CR34
– start-page: 184
  volume-title: Theory and Applications of Models of Computation, Lecture Notes in Computer Science
  year: 2011
  ident: 9730_CR41
  doi: 10.1007/978-3-642-20877-5_20
– volume: 38
  start-page: 1
  issue: 1
  year: 2011
  ident: 9730_CR10
  publication-title: ACM Transactions on Mathematical Software
– volume: 61
  start-page: 35
  issue: 1
  year: 2007
  ident: 9730_CR27
  publication-title: Statistica Neerlandica
  doi: 10.1111/j.1467-9574.2007.00350.x
– volume: 156
  start-page: 579
  issue: 3
  year: 2004
  ident: 9730_CR25
  publication-title: European Journal of Operational Research
  doi: 10.1016/S0377-2217(03)00135-8
– volume: 53
  start-page: 649
  issue: 3
  year: 2012
  ident: 9730_CR11
  publication-title: Computational Optimization and Applications
  doi: 10.1007/s10589-012-9458-y
– volume: 39
  start-page: 2763
  issue: 11
  year: 2012
  ident: 9730_CR35
  publication-title: Computers & Operations Research
  doi: 10.1016/j.cor.2012.02.008
– ident: 9730_CR16
  doi: 10.1145/316188.316229
– ident: 9730_CR9
– ident: 9730_CR29
– ident: 9730_CR28
  doi: 10.1007/978-3-540-89900-6_5
– volume: 33
  start-page: 452
  year: 1977
  ident: 9730_CR40
  publication-title: Journal of Anthropological Research
  doi: 10.1086/jar.33.4.3629752
SSID ssj0009054
Score 2.3337429
Snippet This study presents an integer programming framework for minimizing the connectivity and cohesiveness properties of a given graph by removing nodes and edges...
SourceID crossref
springer
SourceType Enrichment Source
Index Database
Publisher
StartPage 233
SubjectTerms Combinatorics
Convex and Discrete Geometry
Mathematical Modeling and Industrial Mathematics
Mathematics
Mathematics and Statistics
Operations Research/Decision Theory
Optimization
Theory of Computation
Title An integer programming framework for critical elements detection in graphs
URI https://link.springer.com/article/10.1007/s10878-014-9730-4
Volume 28
WOSCitedRecordID wos000337042900013&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLink
  customDbUrl:
  eissn: 1573-2886
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0009054
  issn: 1382-6905
  databaseCode: RSV
  dateStart: 19970301
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB509aAH3-L6IgdPSiBtkyY9LqKI4CK-2FtJkxQErbKt_n4nfewDVNBjyqSUmUlnhvnyDcCJxcdSCUV1YBnlLrE0sZrhMo4Ty43juhk2IYdDNRolt-097rJDu3ctyfpPPXPZTXk22IDTBN2S8kVYwmin_Gm8u3-aMu0y0UyyxdQRSz_RtTK_e8V8MJrvhNYB5nL9X5-2AWttPkkGjQNswoIrtmB1hmUQVzcTatZyG64HBak5ItyYtOCsVxQjeYfSIpjGEtNOQCCugZeXxLqqRm353aSmuS534PHy4uH8irYDFaiJhKpoJkzGlGMyNMLGRjGRMW05VmgRGiWTXFu0G49ZbkODZarTicmkCbWIpM4DE-1Cr3gr3B4QTGRiaZhv20iecBSLuDWhMHnAsKQL-8A6zaamZRv3Qy9e0ilPsldaikpLvdJS3ofTyZb3hmrjN-GzzhRpe-rKn6X3_yR9ACuht6Wnz4wPoVeNP9wRLJvP6rkcH9fe9gUNvc6A
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB50FdSDb3F95uBJKaRt0rTHRVxW3V1EV9lbSZMsCFplW_39TvrYB6igx5RJKTOTzgzz5RuAM42PRchDR7qaOsxE2om0pLgMgkgzZZgsh02Ifj8cDqO76h53VqPd65Zk8aeeuewWWjZYlzkRuqXDFmGJYcCyOL77h6cp0y7l5SRbTB2x9ON1K_O7V8wHo_lOaBFg2hv_-rRNWK_ySdIqHWALFky6DWszLIO46k2oWbMduGmlpOCIMGNSgbNeUYyMapQWwTSWqGoCAjElvDwj2uQFasvuJgXNdbYLj-2rwWXHqQYqOMrnYe4kXCU0NFR4iutAhZQnVGqGFZqPRkkEkxrtxgI60p7CMtXISCVCeZL7Qo5c5e9BI31LzT4QTGQCoaht2wgWMRTzmVYeVyOXYknnNYHWmo1VxTZuh168xFOeZKu0GJUWW6XFrAnnky3vJdXGb8IXtSni6tRlP0sf_En6FFY6g1437l73bw9h1bN2LQC6R9DIxx_mGJbVZ_6cjU8Kz_sCxJ7RXg
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1ZS8QwEB50FdEHb3E98-CTEjbbJj0eF3XxXBY82LeSJikIWpdt9fc76bEHqCA-pkxKmZmSGebL9wGcaHzsByKgsq0Z5SbUNNSS4dLzQs2V4bIUm_B7vWAwCPuVzmlWo93rkWR5p8GyNKV5a6iT1tTFt8Ayw7Y5DTFFKZ-HBW41g2y7_vA8Yd1lolS1xTIS20BRjzW_e8XswTQ7FS0Om-7avz9zHVarOpN0ysTYgDmTbsLKFPsgru7HlK3ZFtx0UlJwR5gRqUBbb2hGkhq9RbC8JapSRiCmhJ1nRJu8QHPZ3aSgv8624al7-Xh-RSuhBapcEeQ0FipmgWG-o4T2VMBEzKTm2Lm5GKzY51JjPLnHEu0obF-NDFXsK0cK15dJW7k70EjfU7MLBAscz1fMjnN8HnI0c7lWjlBJm2Gr5zSB1V6OVMVCbsUwXqMJf7J1WoROi6zTIt6E0_GWYUnB8ZvxWR2WqPobs5-t9_5kfQxL_YtudHfdu92HZceGtcDtHkAjH32YQ1hUn_lLNjoqkvALrqzaQg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+integer+programming+framework+for+critical+elements+detection+in+graphs&rft.jtitle=Journal+of+combinatorial+optimization&rft.au=Veremyev%2C+Alexander&rft.au=Prokopyev%2C+Oleg+A.&rft.au=Pasiliao%2C+Eduardo+L.&rft.date=2014-07-01&rft.pub=Springer+US&rft.issn=1382-6905&rft.eissn=1573-2886&rft.volume=28&rft.issue=1&rft.spage=233&rft.epage=273&rft_id=info:doi/10.1007%2Fs10878-014-9730-4&rft.externalDocID=10_1007_s10878_014_9730_4
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1382-6905&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1382-6905&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1382-6905&client=summon