Show simple item record

dc.contributor.authorRamamoorthy, Prasanna
dc.contributor.authorJayaswal, Sachin
dc.contributor.authorSinha, Ankur
dc.contributor.authorVidyarthi, Navneet
dc.date.accessioned2018-06-09T11:54:52Z
dc.date.available2018-06-09T11:54:52Z
dc.date.issued2018-03-29
dc.identifier.urihttp://hdl.handle.net/11718/20801
dc.descriptionEuropean Journal of Operational Research, Volume 270, Issue 1, 1 October 2018, Pages 230-245en_US
dc.description.abstractIn this paper, we present computationally efficient formulations for the multiple allocation hub interdiction and hub protection problems, which are bilevel and trilevel mixed integer linear programs, respectively. In the hub interdiction problem, the aim is to identify a subset of r critical hubs from an existing set of p hubs that when interdicted results in the maximum post-interdiction cost of routing flows. We present two alternate ways of reducing the bilevel hub interdiction model to a single level optimization problem. The first approach uses the dual formulation of the lower level problem. The second approach exploits the structure of the lower level problem to replace it by a set of closest assignment constraints (CACs). We present alternate sets of CACs, study their dominance relationships, and report their computational performances. Further, we propose refinements to CACs that offer computational advantages of an order-of-magnitude compared to the one existing in the literature. Further, our proposed modifications offer structural advantages for Benders decomposition, which lead to substantial computational savings, particularly for large problem instances. Finally, we study and solve large scale instances of the trilevel hub protection problem exactly by utilizing the ideas developed for the hub interdiction problem.en_US
dc.publisherElsevieren_US
dc.subjectLocationen_US
dc.subjectHub-and-spoke networken_US
dc.subjectInterdictionen_US
dc.subjectProtectionen_US
dc.subjectBenders decompositionen_US
dc.titleMultiple allocation hub interdiction and protection problems: model formulations and solution approachesen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record