#### Filter Results:

- Full text PDF available (26)

#### Publication Year

1951

2017

- This year (1)
- Last 5 years (6)
- Last 10 years (18)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Wai-Kei Mak, David P. Morton, R. Kevin Wood
- Oper. Res. Lett.
- 1999

A stochastic program SP with solution value z∗ can be approximately solved by sampling n realizations of the program’s stochastic parameters, and by solving the resulting “approximating problem” for… (More)

- Eitan Israeli, R. Kevin Wood
- Networks
- 2002

We study the problem of interdicting the arcs in a network in order to maximize the shortest s–t path length. “Interdiction” is an attack on an arc that destroys the arc or increases its effective… (More)

- Gerald G. Brown, W. Matthew Carlyle, Javier Salmerón, R. Kevin Wood
- Interfaces
- 2006

We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender… (More)

- W. Matthew Carlyle, Johannes O. Royset, R. Kevin Wood
- Networks
- 2008

The constrained shortest-path problem (CSPP) generalizes the standard shortest-path problem by adding one or more path-weight side constraints. We present a new algorithm for CSPP that Lagrangianizes… (More)

- Appajosyula Satyanarayana, R. Kevin Wood
- SIAM J. Comput.
- 1985

Let G (V, E) be a graph whose edges may fail with known probabilities and let K _ V be specified. The K-terminal reliability of G, denoted R(GK), is the probability that all vertices in K are… (More)

- Kelly J. Cormican, David P. Morton, R. Kevin Wood
- Operations Research
- 1998

Using limited assets, an interdictor attempts to destroy parts of a capacitated network through which an adversary will subsequently maximize flow. We formulate and solve a stochastic version of the… (More)

- Johannes O. Royset, R. Kevin Wood
- INFORMS Journal on Computing
- 2007

W describe a new algorithm for computing the efficient frontier of the “bi-objective maximum-flow network-interdiction problem.” In this problem, an “interdictor” seeks to interdict (destroy) a set… (More)

- William Avery, Gerald G. Brown, John A. Rosenkranz, R. Kevin Wood
- Operations Research
- 1992

- Gerald G. Brown, W. Matthew Carlyle, Douglas Diehl, Jeffrey E. Kline, R. Kevin Wood
- Operations Research
- 2005

We describe JOINT DEFENDER, a new two-sided optimization model for planning the pre-positioning of defensive missile interceptors to counter an attack threat. In our basic model, a defender… (More)

- Gerald G. Brown, W. Matthew Carlyle, Robert C. Harney, Eric M. Skroch, R. Kevin Wood
- Operations Research
- 2009

A “proliferator” seeks to complete a first small batch of fission weapons as quickly as possible, whereas an “interdictor” wishes to delay that completion for as long as possible. We develop and… (More)