Skip to main content
Erschienen in: Soft Computing 23/2019

14.02.2019 | Methodologies and Application

The bi-objective critical node detection problem with minimum pairwise connectivity and cost: theory and algorithms

verfasst von: Juan Li, Panos M. Pardalos, Bin Xin, Jie Chen

Erschienen in: Soft Computing | Ausgabe 23/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An effective way to analyze and apprehend structural properties of networks is to find their most critical nodes. This paper studies a bi-objective critical node detection problem, denoted as Bi-CNDP. In this variant, we do not make any assumptions on the psychology of decision makers and seek to find a set of solutions which minimize the pairwise connectivity of the induced graph and the cost of removing these critical nodes at the same time. After explicitly stating the formulation of Bi-CNDP, we first prove the NP-hardness of this problem for general graphs and the existence of a polynomial algorithm for constructing the \(\varepsilon \)-approximated Pareto front for Bi-CNDPs on trees. Then different approaches of determining the mating pool and the replacement pool are proposed for the decomposition-based multi-objective evolutionary algorithms. Based on this, two types of decomposition-based multi-objective evolutionary algorithms (MOEA/D and DMOEA-\(\varepsilon \hbox {C}\)) are modified and applied to solve the proposed Bi-CNDP. Numerical experiments on sixteen famous benchmark problems with random and logarithmic weights are firstly conducted to assess different types of the mating pool and the replacement pool. Besides, computational results between two improved algorithms, i.e., I-MOEA/D and I-DMOEA-\(\varepsilon \hbox {C}\), demonstrate that they behave differently on these instances and I-DMOEA-\(\varepsilon \hbox {C}\) shows better performance on the majority of test instances. Finally, a decision-making process from the perspective of minimizing the pairwise connectivity of the induced graph given a constraint on the cost of removing nodes is presented for helping decision makers to identify the most critical nodes for further protection or attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Fußnoten
1
The numbers of nodes and edges of ER, WS, and FF graphs in the main body of Ventresca (2012) are slightly different from the data set obtained from the website given in Ventresca (2012). Here, these characteristics are given based on the data set downloaded from the website.
 
2
A vertex in an undirected connected graph is an articulation point if and only if removing it disconnects the graph. Articulation points represent vulnerabilities in a connected network.
 
3
The nadir point is the upper bound of the PF.
 
Literatur
Zurück zum Zitat Addis B, Di Summa M, Grosso A (2013) Identifying critical nodes in undirected graphs: complexity results and polynomial algorithms for the case of bounded treewidth. Discrete Appl Math 161(16–17):2349–2360MathSciNetMATHCrossRef Addis B, Di Summa M, Grosso A (2013) Identifying critical nodes in undirected graphs: complexity results and polynomial algorithms for the case of bounded treewidth. Discrete Appl Math 161(16–17):2349–2360MathSciNetMATHCrossRef
Zurück zum Zitat Addis B, Aringhieri R, Grosso A, Hosteins P (2016) Hybrid constructive heuristics for the critical node problem. Ann Oper Res 238(1):1–13MathSciNetMATH Addis B, Aringhieri R, Grosso A, Hosteins P (2016) Hybrid constructive heuristics for the critical node problem. Ann Oper Res 238(1):1–13MathSciNetMATH
Zurück zum Zitat Aringhieri R, Grosso A, Hosteins P, Scatamacchia R (2015) VNS solutions for the critical node problem. Electron Notes Discrete Math 47:37–44MathSciNetMATHCrossRef Aringhieri R, Grosso A, Hosteins P, Scatamacchia R (2015) VNS solutions for the critical node problem. Electron Notes Discrete Math 47:37–44MathSciNetMATHCrossRef
Zurück zum Zitat Aringhieri R, Grosso A, Hosteins P, Scatamacchia R (2016a) A general evolutionary framework for different classes of critical node problems. Eng Appl Artif Intell 55:128–145MATHCrossRef Aringhieri R, Grosso A, Hosteins P, Scatamacchia R (2016a) A general evolutionary framework for different classes of critical node problems. Eng Appl Artif Intell 55:128–145MATHCrossRef
Zurück zum Zitat Aringhieri R, Grosso A, Hosteins P, Scatamacchia R (2016b) Local search metaheuristics for the critical node problem. Networks 67(3):209–221MATHCrossRef Aringhieri R, Grosso A, Hosteins P, Scatamacchia R (2016b) Local search metaheuristics for the critical node problem. Networks 67(3):209–221MATHCrossRef
Zurück zum Zitat Aringhieri R, Grosso A, Hosteins P, Scatamacchia R (2019) Polynomial and pseudo-polynomial time algorithms for different classes of the distance critical node problem. Discrete Appl Math 253:103–121MathSciNetMATHCrossRef Aringhieri R, Grosso A, Hosteins P, Scatamacchia R (2019) Polynomial and pseudo-polynomial time algorithms for different classes of the distance critical node problem. Discrete Appl Math 253:103–121MathSciNetMATHCrossRef
Zurück zum Zitat Arulselvan A, Commander CW, Pardalos PM, Shylo O (2007) Managing network risk via critical node identification. Risk management in telecommunication networks, Springer Arulselvan A, Commander CW, Pardalos PM, Shylo O (2007) Managing network risk via critical node identification. Risk management in telecommunication networks, Springer
Zurück zum Zitat Arulselvan A, Commander CW, Elefteriadou L, Pardalos PM (2009) Detecting critical nodes in sparse graphs. Comput Oper Res 36(7):2193–2200MathSciNetMATHCrossRef Arulselvan A, Commander CW, Elefteriadou L, Pardalos PM (2009) Detecting critical nodes in sparse graphs. Comput Oper Res 36(7):2193–2200MathSciNetMATHCrossRef
Zurück zum Zitat Arulselvan A, Commander CW, Shylo O, Pardalos PM (2011) Cardinality-constrained critical node detection problem. Springer, New YorkMATHCrossRef Arulselvan A, Commander CW, Shylo O, Pardalos PM (2011) Cardinality-constrained critical node detection problem. Springer, New YorkMATHCrossRef
Zurück zum Zitat Aspnes J, Chang K, Yampolskiy A (2005) Inoculation strategies for victims of viruses and the sum-of-squares partition problem. In: Proceedings of the 16th annual ACM-SIAM symposium on discrete algorithms, pp 43–52 Aspnes J, Chang K, Yampolskiy A (2005) Inoculation strategies for victims of viruses and the sum-of-squares partition problem. In: Proceedings of the 16th annual ACM-SIAM symposium on discrete algorithms, pp 43–52
Zurück zum Zitat Atputharajah A, Saha TK (2009) Power system blackouts—literature review. In: Proceedings of the international conference on industrial and information systems, pp 460–465 Atputharajah A, Saha TK (2009) Power system blackouts—literature review. In: Proceedings of the international conference on industrial and information systems, pp 460–465
Zurück zum Zitat Ben-Ameur W, Mohamed-Sidi M-A, Neto J (2015) The \(k\)-separator problem: polyhedra, complexity and approximation results. J Comb Optim 29(1):276–307CrossRefMathSciNetMATH Ben-Ameur W, Mohamed-Sidi M-A, Neto J (2015) The \(k\)-separator problem: polyhedra, complexity and approximation results. J Comb Optim 29(1):276–307CrossRefMathSciNetMATH
Zurück zum Zitat Borgatti SP (2006) Identifying sets of key players in a social network. Comput Math Organ Theory 12(1):21–34MATHCrossRef Borgatti SP (2006) Identifying sets of key players in a social network. Comput Math Organ Theory 12(1):21–34MATHCrossRef
Zurück zum Zitat Chen P-A, David M, Kempe D (2010) Better vaccination strategies for better people. In: Proceedings of the ACM conference on electronic commerce, pp 179–188 Chen P-A, David M, Kempe D (2010) Better vaccination strategies for better people. In: Proceedings of the ACM conference on electronic commerce, pp 179–188
Zurück zum Zitat Chen J, Li J, Xin B (2017) DMOEA-\(\varepsilon \)C: decomposition-based multi-objective evolutionary algorithm with the \(\varepsilon \)-constraint framework. IEEE Trans Evolut Comput 21(5):714–730CrossRef Chen J, Li J, Xin B (2017) DMOEA-\(\varepsilon \)C: decomposition-based multi-objective evolutionary algorithm with the \(\varepsilon \)-constraint framework. IEEE Trans Evolut Comput 21(5):714–730CrossRef
Zurück zum Zitat Deb K, Agrawal S, Pratap A, Meyarivan T (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evolut Comput 6(2):182–197CrossRef Deb K, Agrawal S, Pratap A, Meyarivan T (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evolut Comput 6(2):182–197CrossRef
Zurück zum Zitat Di Summa M, Grosso A, Locatelli M (2011) Complexity of the critical node problem over trees. Comput Oper Res 38(12):1766–1774MathSciNetMATHCrossRef Di Summa M, Grosso A, Locatelli M (2011) Complexity of the critical node problem over trees. Comput Oper Res 38(12):1766–1774MathSciNetMATHCrossRef
Zurück zum Zitat Di Summa M, Grosso A, Locatelli M (2012) Branch and cut algorithms for detecting critical nodes in undirected graphs. Comput Optim Appl 53(3):649–680MathSciNetMATHCrossRef Di Summa M, Grosso A, Locatelli M (2012) Branch and cut algorithms for detecting critical nodes in undirected graphs. Comput Optim Appl 53(3):649–680MathSciNetMATHCrossRef
Zurück zum Zitat Dinh TN, Thai MT (2013) Precise structural vulnerability assessment via mathematical programming. In: Proceedings of the military communications conference, pp 1351–1356 Dinh TN, Thai MT (2013) Precise structural vulnerability assessment via mathematical programming. In: Proceedings of the military communications conference, pp 1351–1356
Zurück zum Zitat Dinh TN, Xuan Y, Thai MT, Park EK, Znati T (2010) On approximation of new optimization methods for assessing network vulnerability. In: Proceedings of the conference on information communications, pp 2678–2686 Dinh TN, Xuan Y, Thai MT, Park EK, Znati T (2010) On approximation of new optimization methods for assessing network vulnerability. In: Proceedings of the conference on information communications, pp 2678–2686
Zurück zum Zitat Fan N, Pardalos PM (2010) Robust optimization of graph partitioning and critical node detection in analyzing networks. Springer, BerlinMATHCrossRef Fan N, Pardalos PM (2010) Robust optimization of graph partitioning and critical node detection in analyzing networks. Springer, BerlinMATHCrossRef
Zurück zum Zitat Faramondi L, Oliva G, Panzieri S, Pascucci F, Schlueter M, Munetomo M, Setola R (2018) Network structural vulnerability: a multiobjective attacker perspective. IEEE Trans Syst Man Cybern Syst PP(99):1–14 Faramondi L, Oliva G, Panzieri S, Pascucci F, Schlueter M, Munetomo M, Setola R (2018) Network structural vulnerability: a multiobjective attacker perspective. IEEE Trans Syst Man Cybern Syst PP(99):1–14
Zurück zum Zitat Granata D, Steeger G, Rebennack S (2013) Network interdiction via a critical disruption path: branch-and-price algorithms. Comput Oper Res 40(11):2689–2702MathSciNetMATHCrossRef Granata D, Steeger G, Rebennack S (2013) Network interdiction via a critical disruption path: branch-and-price algorithms. Comput Oper Res 40(11):2689–2702MathSciNetMATHCrossRef
Zurück zum Zitat Jenelius E, Petersen T, Mattsson L-G (2006) Importance and exposure in road network vulnerability analysis. Transp Res Part A Policy Pract 40(7):537–560CrossRef Jenelius E, Petersen T, Mattsson L-G (2006) Importance and exposure in road network vulnerability analysis. Transp Res Part A Policy Pract 40(7):537–560CrossRef
Zurück zum Zitat Kempe D, Kleinberg J, Tardos E (2010) Maximizing the spread of influence in a social network. Progressive research, pp 137–146 Kempe D, Kleinberg J, Tardos E (2010) Maximizing the spread of influence in a social network. Progressive research, pp 137–146
Zurück zum Zitat Kuhlman CJ, Kumar VSA, Marathe MV, Ravi SS, Rosenkrantz DJ (2010) Finding critical nodes for inhibiting diffusion of complex contagions in social networks. In: Proceedings of the European conference on machine learning and knowledge discovery in databases, pp 111–127 Kuhlman CJ, Kumar VSA, Marathe MV, Ravi SS, Rosenkrantz DJ (2010) Finding critical nodes for inhibiting diffusion of complex contagions in social networks. In: Proceedings of the European conference on machine learning and knowledge discovery in databases, pp 111–127
Zurück zum Zitat Kumar VSA, Rajaraman R, Sun Z, Sundaram R (2010) Existence theorems and approximation algorithms for generalized network security games. In: Proceedings of the IEEE international conference on distributed computing systems, pp 348–357 Kumar VSA, Rajaraman R, Sun Z, Sundaram R (2010) Existence theorems and approximation algorithms for generalized network security games. In: Proceedings of the IEEE international conference on distributed computing systems, pp 348–357
Zurück zum Zitat Lalou M, Tahraoui MA, Kheddouci H (2016) Component-cardinality-constrained critical node problem in graphs. Discrete Appl Math 210:150–163MathSciNetMATHCrossRef Lalou M, Tahraoui MA, Kheddouci H (2016) Component-cardinality-constrained critical node problem in graphs. Discrete Appl Math 210:150–163MathSciNetMATHCrossRef
Zurück zum Zitat Lalou M, Tahraoui MA, Kheddouci H (2018) The critical node detection problem in networks: a survey. Comput Sci Rev 28:92–117MathSciNetMATHCrossRef Lalou M, Tahraoui MA, Kheddouci H (2018) The critical node detection problem in networks: a survey. Comput Sci Rev 28:92–117MathSciNetMATHCrossRef
Zurück zum Zitat Leskovec J, Krause A, Guestrin C, Faloutsos C, Vanbriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: ACM SIGKDD international conference on knowledge discovery and data mining, pp 420–429 Leskovec J, Krause A, Guestrin C, Faloutsos C, Vanbriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: ACM SIGKDD international conference on knowledge discovery and data mining, pp 420–429
Zurück zum Zitat Liang G, Weller SR, Zhao J, Luo F, Dong ZY (2017) The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans Power Syst 32:3317–3318CrossRef Liang G, Weller SR, Zhao J, Luo F, Dong ZY (2017) The 2015 Ukraine blackout: implications for false data injection attacks. IEEE Trans Power Syst 32:3317–3318CrossRef
Zurück zum Zitat Miettinen K (1999) Nonlinear multiobjective optimization. Kluwer Academic Publishers, BostonMATH Miettinen K (1999) Nonlinear multiobjective optimization. Kluwer Academic Publishers, BostonMATH
Zurück zum Zitat Papadimitriou CH, Yannakakis M (2000) On the approximability of trade-offs and optimal access of web sources. In: Proceedings of the symposium on foundations of computer science, pp 86–92 Papadimitriou CH, Yannakakis M (2000) On the approximability of trade-offs and optimal access of web sources. In: Proceedings of the symposium on foundations of computer science, pp 86–92
Zurück zum Zitat Purevsuren D, Cui G, Qu M, Win NNH (2017) hybridization of GRASP with exterior path relinking for identifying critical nodes in graphs. Int J Comput Sci 44(2):157–165 Purevsuren D, Cui G, Qu M, Win NNH (2017) hybridization of GRASP with exterior path relinking for identifying critical nodes in graphs. Int J Comput Sci 44(2):157–165
Zurück zum Zitat Qi Y, Ma X, Liu F (2014) MOEA/D with adaptive weight adjustment. Evolut Comput 22(2):231–264CrossRef Qi Y, Ma X, Liu F (2014) MOEA/D with adaptive weight adjustment. Evolut Comput 22(2):231–264CrossRef
Zurück zum Zitat Salmeron J, Wood K, Baldick R (2015) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2):905–912CrossRef Salmeron J, Wood K, Baldick R (2015) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2):905–912CrossRef
Zurück zum Zitat Shen S, Smith JC (2012) Polynomial-time algorithms for solving a class of critical node problems on trees and series-parallel graphs. Networks 60(2):103–119MathSciNetMATH Shen S, Smith JC (2012) Polynomial-time algorithms for solving a class of critical node problems on trees and series-parallel graphs. Networks 60(2):103–119MathSciNetMATH
Zurück zum Zitat Shen Y, Nguyen NP, Xuan Y, Thai MT (2013a) On the discovery of critical links and nodes for assessing network vulnerability. IEEE/ACM Trans Netw 21(3):963–973CrossRef Shen Y, Nguyen NP, Xuan Y, Thai MT (2013a) On the discovery of critical links and nodes for assessing network vulnerability. IEEE/ACM Trans Netw 21(3):963–973CrossRef
Zurück zum Zitat Shen Y, Dinh TN, Thai MT (2013b) Adaptive algorithms for detecting critical links and nodes in dynamic networks. In: Proceedings of the IEEE military communications conference, pp 1–6 Shen Y, Dinh TN, Thai MT (2013b) Adaptive algorithms for detecting critical links and nodes in dynamic networks. In: Proceedings of the IEEE military communications conference, pp 1–6
Zurück zum Zitat Spears WM, Jong KAD (1991) On the virtues of parameterized uniform crossover. In: Proceedings of the 4th international conference on genetic algorithms, pp 230–236 Spears WM, Jong KAD (1991) On the virtues of parameterized uniform crossover. In: Proceedings of the 4th international conference on genetic algorithms, pp 230–236
Zurück zum Zitat Tomaino V, Arulselvan A, Veltri P, Pardalos PM (2012) Studying connectivity properties in human protein–protein interaction network in cancer pathway. Springer, New YorkCrossRef Tomaino V, Arulselvan A, Veltri P, Pardalos PM (2012) Studying connectivity properties in human protein–protein interaction network in cancer pathway. Springer, New YorkCrossRef
Zurück zum Zitat Ventresca M (2012) Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem. Comput Oper Res 39(11):2763–2775MathSciNetMATHCrossRef Ventresca M (2012) Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem. Comput Oper Res 39(11):2763–2775MathSciNetMATHCrossRef
Zurück zum Zitat Ventresca M, Aleman D (2014) A randomized algorithm with local search for containment of pandemic disease spread. Comput Oper Res 48(7):11–19MathSciNetMATHCrossRef Ventresca M, Aleman D (2014) A randomized algorithm with local search for containment of pandemic disease spread. Comput Oper Res 48(7):11–19MathSciNetMATHCrossRef
Zurück zum Zitat Ventresca M, Aleman D (2015) Efficiently identifying critical nodes in large complex networks. Comput Soc Netw 2(1):6CrossRef Ventresca M, Aleman D (2015) Efficiently identifying critical nodes in large complex networks. Comput Soc Netw 2(1):6CrossRef
Zurück zum Zitat Ventresca M, Harrison KR, Ombuki-Berman BM (2018) The bi-objective critical node detection problem. Eur J Oper Res 265(3):895–908MathSciNetMATHCrossRef Ventresca M, Harrison KR, Ombuki-Berman BM (2018) The bi-objective critical node detection problem. Eur J Oper Res 265(3):895–908MathSciNetMATHCrossRef
Zurück zum Zitat Veremyev A, Prokopyev OA, Pasiliao EL (2014a) An integer programming framework for critical elements detection in graphs. J Comb Optim 28(1):233–273MathSciNetMATHCrossRef Veremyev A, Prokopyev OA, Pasiliao EL (2014a) An integer programming framework for critical elements detection in graphs. J Comb Optim 28(1):233–273MathSciNetMATHCrossRef
Zurück zum Zitat Veremyev A, Boginski V, Pasiliao EL (2014b) Exact identification of critical nodes in sparse networks via new compact formulations. Optim Lett 8(4):1245–1259MathSciNetMATHCrossRef Veremyev A, Boginski V, Pasiliao EL (2014b) Exact identification of critical nodes in sparse networks via new compact formulations. Optim Lett 8(4):1245–1259MathSciNetMATHCrossRef
Zurück zum Zitat Walteros JL, Veremyev A, Pardalos PM, Pasiliao EL (2019) Detecting critical node structures on graphs: a mathematical programming approach. Networks 73:48–88MathSciNetMATHCrossRef Walteros JL, Veremyev A, Pardalos PM, Pasiliao EL (2019) Detecting critical node structures on graphs: a mathematical programming approach. Networks 73:48–88MathSciNetMATHCrossRef
Zurück zum Zitat Walteros JL, Pardalos PM (2012) Selected topics in critical element detection. In: Daras N (ed) Applications of mathematics and informatics in military science, vol 71. Springer optimization and its applications. Springer, New York, pp 9–26MATHCrossRef Walteros JL, Pardalos PM (2012) Selected topics in critical element detection. In: Daras N (ed) Applications of mathematics and informatics in military science, vol 71. Springer optimization and its applications. Springer, New York, pp 9–26MATHCrossRef
Zurück zum Zitat Zhang Q, Li H (2007) MOEA/D: a multiobjective evolutionary algorithm based on decomposition. IEEE Trans Evolut Comput 11(6):712–731CrossRef Zhang Q, Li H (2007) MOEA/D: a multiobjective evolutionary algorithm based on decomposition. IEEE Trans Evolut Comput 11(6):712–731CrossRef
Zurück zum Zitat Zhang Q, Liu W, Li H (2009) The performance of a new version of MOEA/D on CEC09 unconstrained MOP test instances. Technical Report CES-491, The School of Computer Science and Electronic Engineering, University of Essex Zhang Q, Liu W, Li H (2009) The performance of a new version of MOEA/D on CEC09 unconstrained MOP test instances. Technical Report CES-491, The School of Computer Science and Electronic Engineering, University of Essex
Zurück zum Zitat Zhou A, Zhang Q, Jin Y, Tsang E, Okabe T (2005) A model-based evolutionary algorithm for bi-objective optimization. In: Proceedings of the IEEE congress on evolutionary computation, pp 2568–2575 Zhou A, Zhang Q, Jin Y, Tsang E, Okabe T (2005) A model-based evolutionary algorithm for bi-objective optimization. In: Proceedings of the IEEE congress on evolutionary computation, pp 2568–2575
Zurück zum Zitat Zitzler E, Thiele L (1999) Multiobjective evolutionary algorithm: a comparative case study and strength pareto approach. IEEE Trans Evolut Comput 3(4):257–271CrossRef Zitzler E, Thiele L (1999) Multiobjective evolutionary algorithm: a comparative case study and strength pareto approach. IEEE Trans Evolut Comput 3(4):257–271CrossRef
Metadaten
Titel
The bi-objective critical node detection problem with minimum pairwise connectivity and cost: theory and algorithms
verfasst von
Juan Li
Panos M. Pardalos
Bin Xin
Jie Chen
Publikationsdatum
14.02.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 23/2019
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-03824-8

Weitere Artikel der Ausgabe 23/2019

Soft Computing 23/2019 Zur Ausgabe