Robustness of solutions to critical node detection problems with imperfect data: a computational study

被引:4
|
作者
Gillen, Colin P. [1 ]
Veremyev, Alexander [2 ]
Prokopyev, Oleg A. [1 ]
Pasiliao, Eduardo L. [3 ]
机构
[1] Univ Pittsburgh, Ind Engn, 1048 Benedum Hall, Pittsburgh, PA 15261 USA
[2] Univ Florida, Ind & Syst Engn, 303 Weil Hall, Gainesville, FL 32611 USA
[3] US Air Force, Munit Directorate, Res Lab, Bldg 13, Eglin AFB, FL 32542 USA
来源
OPTIMIZATION METHODS & SOFTWARE | 2017年 / 32卷 / 02期
关键词
critical node detection; distance-based metrics; graph efficiency; network interdiction; mixed integer programming; robustness; sensitivity; CENTRALITY MEASURES; NETWORK DATA; ALGORITHMS; ERROR;
D O I
10.1080/10556788.2016.1214958
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A class of critical node detection problems based upon the metric of communication efficiency is considered. While both exact integer programming and heuristic centrality-based methods exist for the solution of these problems, previous work has been mostly focused on the case where perfect information about the network is available. In this paper we suppose that some level of misinformation about nodes or edges has been inflicted on the observer's perception of the network, that is, there are hidden elements or fake additional elements. An extensive computational study is conducted to ascertain whether the exact integer-programming-based solutions perform better under imperfect information than heuristic methods. For large networks, exact methods cannot produce a solution in a reasonable amount of time, hence an approximation of the exact method is also considered for such instances. The obtained approximate solutions are again compared to centrality-based heuristics under the presence of imperfect data.
引用
收藏
页码:250 / 273
页数:24
相关论文
共 35 条
  • [1] Critical node/edge detection problems on trees
    Marco Di Summa
    Syed Md Omar Faruk
    4OR, 2023, 21 : 439 - 455
  • [2] Critical node/edge detection problems on trees
    Di Summa, Marco
    Faruk, Syed Md Omar
    4OR-A QUARTERLY JOURNAL OF OPERATIONS RESEARCH, 2023, 21 (03): : 439 - 455
  • [3] Applications, challenges, and solutions to single- and multi-objective critical node detection problems: a survey
    Megzari, Abdelmoujib
    Raj, P. V. Pravija
    Osamy, Walid
    Khedr, Ahmed M.
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (17): : 19770 - 19808
  • [4] Applications, challenges, and solutions to single- and multi-objective critical node detection problems: a survey
    Abdelmoujib Megzari
    P. V. Pravija Raj
    Walid Osamy
    Ahmed M. Khedr
    The Journal of Supercomputing, 2023, 79 : 19770 - 19808
  • [5] Nonexistence of radial node solutions for elliptic problems with critical Sobolev exponents
    Deng, Yinbin
    Wang, Jixiu
    NONLINEAR ANALYSIS-THEORY METHODS & APPLICATIONS, 2009, 71 (1-2) : 172 - 178
  • [6] Simulation system design for critical-node detection and robustness analysis of supply chains
    Wang, Lixing
    Yao, Fushang
    Wu, Zhenning
    Gao, Runqi
    ENTERPRISE INFORMATION SYSTEMS, 2024, 18 (05)
  • [7] DETECTION AND DESCRIPTION OF PERIODICITIES IN SPARSE DATA - SUGGESTED SOLUTIONS TO SOME BASIC PROBLEMS
    BUCCHERI, R
    DEJAGER, OC
    TIMING NEUTRON STARS, 1989, 262 : 95 - 111
  • [8] AN EMPIRICAL-STUDY OF THE ROBUSTNESS OF ANALYSIS OF VARIANCE PROCEDURES IN THE PRESENCE OF COMMONLY ENCOUNTERED DATA PROBLEMS
    GENG, S
    SCHNEEMAN, P
    WANG, WJ
    AMERICAN JOURNAL OF ENOLOGY AND VITICULTURE, 1982, 33 (03): : 131 - 134
  • [9] Solutions for data integration in functional genomics: a critical assessment and case study
    Smedley, Damian
    Swertz, Morris A.
    Wolstencroft, Katy
    Proctor, Glenn
    Zouberakis, Michael
    Bard, Jonathan
    Hancock, John M.
    Schofield, Paul
    BRIEFINGS IN BIOINFORMATICS, 2008, 9 (06) : 532 - 544
  • [10] Minimax Prediction Estimation of Solutions of Initial-Boundary-Value Problems for Parabolic Equations with Discontinuous Coefficients Based on Imperfect Data
    A. G. Nakonechnyi
    Yu. K. Podlipenko
    Yu. A. Zaitsev
    Cybernetics and Systems Analysis, 2000, 36 : 845 - 854