Networks最新文献

筛选
英文 中文
Issue Information 问题信息
IF 2.1 4区 计算机科学
Networks Pub Date : 2023-05-01 DOI: 10.1002/net.22105
{"title":"Issue Information","authors":"","doi":"10.1002/net.22105","DOIUrl":"https://doi.org/10.1002/net.22105","url":null,"abstract":"","PeriodicalId":54734,"journal":{"name":"Networks","volume":" ","pages":""},"PeriodicalIF":2.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43767859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The probabilistic uncapacitated open vehicle routing location problem 概率无能力开放车辆路径定位问题
IF 2.1 4区 计算机科学
Networks Pub Date : 2023-04-06 DOI: 10.1002/net.22147
I. Averbakh, Wei Yu
{"title":"The probabilistic uncapacitated open vehicle routing location problem","authors":"I. Averbakh, Wei Yu","doi":"10.1002/net.22147","DOIUrl":"https://doi.org/10.1002/net.22147","url":null,"abstract":"Suppose that m$$ m $$ mobile service units are located at a base station (depot) in a transportation network with n$$ n $$ nodes. On any day, the nodes of the network may generate calls for service independently with known probabilities. The calls are centrally allocated to the service units who then visit the allocated customers on shortest open tours, that is, for each service unit, the way back to the depot from the last served customer is not counted towards the length of the tour. It is required to find an optimal location for the depot to minimize the expected travel distance. We obtain bounds on the approximation ratios for two simple and fast heuristics for the problem on a general network. For the problem on a tree, we present an O(nm+1)$$ Oleft({n}^{m+1}right) $$ exact algorithm.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"82 1","pages":"68 - 83"},"PeriodicalIF":2.1,"publicationDate":"2023-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45603209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A compact formulation for the base station deployment problem in wireless networks 无线网络中基站部署问题的一个紧凑公式
IF 2.1 4区 计算机科学
Networks Pub Date : 2023-04-03 DOI: 10.1002/net.22146
P. Avella, Alice Calamita, L. Palagi
{"title":"A compact formulation for the base station deployment problem in wireless networks","authors":"P. Avella, Alice Calamita, L. Palagi","doi":"10.1002/net.22146","DOIUrl":"https://doi.org/10.1002/net.22146","url":null,"abstract":"This article considers the base station deployment problem in a wireless network. The natural formulation of this problem usually leads to numerical and memory issues, preventing users from dealing with real‐world cases. We provide a compact reformulation that allows us to get beyond the drawbacks of the natural formulation. Tests are done on ten instances derived from realistic LTE scenarios. The computational results show that the proposed reformulation enables mixed‐integer programming solvers to provide an optimal solution in a short amount of time.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"82 1","pages":"52 - 67"},"PeriodicalIF":2.1,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47074339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Two extended formulations for the virtual network function placement and routing problem 虚拟网络功能布局和路由问题的两个扩展公式
IF 2.1 4区 计算机科学
Networks Pub Date : 2023-03-07 DOI: 10.1002/net.22144
Ahlam Mouaci, É. Gourdin, Ivana Ljubic, N. Perrot
{"title":"Two extended formulations for the virtual network function placement and routing problem","authors":"Ahlam Mouaci, É. Gourdin, Ivana Ljubic, N. Perrot","doi":"10.1002/net.22144","DOIUrl":"https://doi.org/10.1002/net.22144","url":null,"abstract":"Given a bi‐directed graph modeling a telecommunication network, and a set of origin‐destination pairs representing traffic requests (commodities) along with their associated Service Function Chains (SFCs), the Virtual Network Function Placement and Routing Problem (VNFPRP) aims to find, for each commodity, one latency‐constrained routing path that visits the required Virtual Network Functions in a specific order. The function installation costs together with the node activation costs have to be minimized. In this paper, we present two extended Mixed Integer Programming (MIP) formulations to model the VNFPRP. For each formulation we define the master problem, the pricing problem, the associated Lagrangian bound and a specific branching scheme, in order to derive an efficient Branch‐and‐Price algorithm. We also provide several families of valid inequalities to strengthen the LP‐relaxation bounds. Computational results are reported comparing the performance of the two Branch‐and‐Price algorithms with a compact MIP formulation and its Branch‐and‐Benders‐cut implementation on a set of SNDlib instances representing telecommunication networks.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"82 1","pages":"32 - 51"},"PeriodicalIF":2.1,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46153470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust capacitated Steiner trees and networks with uniform demands 具有一致需求的鲁棒有能力Steiner树和网络
IF 2.1 4区 计算机科学
Networks Pub Date : 2023-03-03 DOI: 10.1002/net.22143
C. Bentz, Marie-Christine Costa, Pierre-Louis Poirion, Thomas Ridremont
{"title":"Robust capacitated Steiner trees and networks with uniform demands","authors":"C. Bentz, Marie-Christine Costa, Pierre-Louis Poirion, Thomas Ridremont","doi":"10.1002/net.22143","DOIUrl":"https://doi.org/10.1002/net.22143","url":null,"abstract":"We are interested in the design of robust (or resilient) capacitated rooted Steiner networks in the case of terminals with uniform demands. Formally, we are given a graph, capacity, and cost functions on the edges, a root, a subset of vertices called terminals, and a bound k$$ k $$ on the number of possible edge failures. We first study the problem where k=1$$ k=1 $$ and the network that we want to design must be a tree covering the root and the terminals: we give complexity results and propose models to optimize both the cost of the tree and the number of terminals disconnected from the root in the worst case of an edge failure, while respecting the capacity constraints on the edges. Secondly, we consider the problem of computing a minimum‐cost survivable network, that is, a network that covers the root and terminals even after the removal of any k$$ k $$ edges, while still respecting the capacity constraints on the edges. We also consider the possibility of protecting a given number of edges. We propose three different formulations: a bilevel formulation (with an attacker and a defender), a cutset‐based formulation and a flow‐based one. We compare the formulations from a theoretical point of view, and we propose algorithms to solve them and compare their efficiency in practice.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"82 1","pages":"3 - 31"},"PeriodicalIF":2.1,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44569732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On optimally solving sub‐tree scheduling for wireless sensor networks with partial coverage: A branch‐and‐cut algorithm 关于部分覆盖无线传感器网络子树调度的优化求解:一种分支割算法
IF 2.1 4区 计算机科学
Networks Pub Date : 2023-03-03 DOI: 10.1002/net.22145
Nicola Bianchessi
{"title":"On optimally solving sub‐tree scheduling for wireless sensor networks with partial coverage: A branch‐and‐cut algorithm","authors":"Nicola Bianchessi","doi":"10.1002/net.22145","DOIUrl":"https://doi.org/10.1002/net.22145","url":null,"abstract":"Given a wireless sensor network, we consider the problem to minimize its total energy consumption over consecutive time slots with respect to communication activities. Nonempty and disjoint subsets of nodes are required to be active and connected under a tree topology configuration in the different time slots, and each network node must be active in a unique time slot. Moreover, the power required by the same pair of network nodes to communicate on the associated direct channel may vary in the different time slots. The problem has been recently introduced in the literature under the name Sub‐Tree Scheduling for Wireless Sensor Networks with Partial Coverage. We focus on the exact solution of the problem. We present a branch‐and‐cut (BC) algorithm based on a novel integer linear programming formulation which allows avoiding the introduction of symmetries in the solution space. In particular, the algorithm relies on an efficient and nontypical separation algorithm for known valid inequalities, and on an easy‐to‐implement primal bound heuristic. The effectiveness of the BC algorithm is empirically shown through an extensive experimental analysis involving 300 newly generated benchmark instances with up to 200 network nodes and 8 time slots. Additionally, the experimental results show that the BC algorithm represents a valid computational tool to benchmark the performance of heuristics addressing the problem, and can be used in practice, as an heuristic solver, to tackle problem instances that are not too large.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"499 - 513"},"PeriodicalIF":2.1,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47919336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The hazardous orienteering problem 危险的定向运动问题
IF 2.1 4区 计算机科学
Networks Pub Date : 2023-03-01 DOI: 10.1002/net.22129
Alberto Santini, C. Archetti
{"title":"The hazardous orienteering problem","authors":"Alberto Santini, C. Archetti","doi":"10.1002/net.22129","DOIUrl":"https://doi.org/10.1002/net.22129","url":null,"abstract":"This article studies the Hazardous Orienteering Problem (HOP), a variant of the more famous Orienteering Problem (OP). In the OP, a vehicle earns a profit for each customer it visits (e.g., to pick up a parcel) subject to an upper bound on the tour time. In the HOP, the parcels picked up at some customers have a probability of triggering a catastrophic event. The probability depends on how long the parcels travel on the vehicle. If any catastrophic event triggers, the entire collected profit is lost. The goal is to determine the tour that maximizes the expected profit. The problem has interesting applications in routing of hazardous material, cash‐in‐transit, and law enforcement. We propose a mixed‐integer nonlinear formulation and techniques both to obtain dual bounds and to produce primal solutions. Computational tests investigate the efficacy of the methods proposed and allow to gain insights into solution features.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"235 - 252"},"PeriodicalIF":2.1,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43021607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Issue Information 问题信息
IF 2.1 4区 计算机科学
Networks Pub Date : 2023-02-12 DOI: 10.1002/net.22103
{"title":"Issue Information","authors":"","doi":"10.1002/net.22103","DOIUrl":"https://doi.org/10.1002/net.22103","url":null,"abstract":"","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":""},"PeriodicalIF":2.1,"publicationDate":"2023-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42260349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A genetic approach for the 2‐edge‐connected minimum branch vertices problem 二边连通最小分支顶点问题的遗传方法
IF 2.1 4区 计算机科学
Networks Pub Date : 2023-02-01 DOI: 10.1002/net.22142
F. Carrabs, R. Cerulli, Federica Laureana, Domenico Serra, Carmine Sorgente
{"title":"A genetic approach for the 2‐edge‐connected minimum branch vertices problem","authors":"F. Carrabs, R. Cerulli, Federica Laureana, Domenico Serra, Carmine Sorgente","doi":"10.1002/net.22142","DOIUrl":"https://doi.org/10.1002/net.22142","url":null,"abstract":"This article addresses the 2‐edge‐connected minimum branch vertices problem, a variant of the minimum branch vertices problem in which the spanning subgraph is required to be 2‐edge‐connected for survivability reasons. The problem has been recently introduced and finds application in optical networks design scenarios, where branch vertices are associated to switch devices that allow to split the entering light signals and send them to several adjacent vertices. An exact approach to the problem has been proposed in the literature. In this paper, we formally prove its NP‐completeness and propose a genetic algorithm, which exploits some literature‐provided procedures for efficiently checking and restoring solutions feasibility, and makes use of novel ad‐hoc designed operators aiming to improve their values, reducing the number of branch vertices. The computational tests show that, on the benchmark instances, the genetic algorithm very often finds the optimal solution. Moreover, in order to further investigate the effectiveness and the performance of our algorithm, we generated a new set of random instances where the optimal solution is known a priori.","PeriodicalId":54734,"journal":{"name":"Networks","volume":" ","pages":""},"PeriodicalIF":2.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42303704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributionally risk‐receptive and risk‐averse network interdiction problems with general ambiguity set 具有一般模糊集的分布式风险接受性和风险厌恶性网络拦截问题
IF 2.1 4区 计算机科学
Networks Pub Date : 2023-01-01 DOI: 10.1002/net.22114
Sumin Kang, M. Bansal
{"title":"Distributionally risk‐receptive and risk‐averse network interdiction problems with general ambiguity set","authors":"Sumin Kang, M. Bansal","doi":"10.1002/net.22114","DOIUrl":"https://doi.org/10.1002/net.22114","url":null,"abstract":"We introduce generalizations of stochastic network interdiction problem with distributional ambiguity. Specifically, we consider a distributionally risk‐averse (or robust) network interdiction problem (DRA‐NIP) and a distributionally risk‐receptive network interdiction problem (DRR‐NIP) where a leader maximizes a follower's minimal expected objective value for either the worst‐case or the best‐case, respectively, probability distribution belonging to ambiguity set (a set of distributions). The DRA‐NIP arises in applications where a risk‐averse leader interdicts a follower to cause delays in their supply convoy. In contrast, the DRR‐NIP provides network vulnerability analysis where a network‐user seeks to identify vulnerabilities in the network against potential disruptions by an adversary (or leader) who is receptive to risk for improving the expected objective values. We present finitely convergent algorithms for solving DRA‐NIP and DRR‐NIP with a general ambiguity set. To evaluate their performance, we provide results of our extensive computational experiments performed on instances known for (risk‐neutral) stochastic NIP.","PeriodicalId":54734,"journal":{"name":"Networks","volume":"81 1","pages":"22 - 3"},"PeriodicalIF":2.1,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42795363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信