The rising disruptions of interdictors force supply chains’ designers to embody the protection decisions when locating the facilities. In the presence of variability in the intensity of disruptions, a risk measure is incorporated into the decision-making. The designer-interdictor bi-level problem, therefore, optimizes the joint location and protection decisions with respect to the conditional value-at-risk. This configuration has been absent from the literature. An accelerated modified Benders decomposition algorithm is developed and enhanced by being hybridized with a sample average approximation-based genetic algorithm. We examine how this new configuration influences the optimal solutions and assess the effectiveness of the proposed meth...
This project describes a lexicographic network interdiction model for identifying optimal locations ...
Facility systems may be vulnerable to a disaster, whether caused by intention, an accident, or by an...
This research considers the problem of an intruder attempting to traverse a defender\u27s territory ...
In the classic models of facility location, it is assumed that the selected facilities always work b...
This paper presents an algorithm to solve the multilevel location–allocation problem when sabo...
Facility disruptions or failures may occur due to natural disasters or a deliberate man-made attack....
The design of resilient supply chains under the risk of disruptions at candidate locations for distr...
Supply chains are vulnerable to disruptions at any stage of the distribution system. These disruptio...
Multi-echelon facility location models are commonly employed to design transportation systems. While...
The classical location models implicitly assume that the facilities, once built, will always operate...
Vulnerability to sudden service disruptions due to deliberate sabotage and terrorist attacks is one ...
Today’s business environment is complex, dynamic, and uncertain which makes a supply chain facility ...
International audienceThis paper develops a new mathematical model to study a location-routing probl...
Inefficient facility location decisions result in extra cost throughout the lifetime of the faciliti...
The objective of many location problems, such as the Maximal Covering Problem (MCLP), is to maximize...
This project describes a lexicographic network interdiction model for identifying optimal locations ...
Facility systems may be vulnerable to a disaster, whether caused by intention, an accident, or by an...
This research considers the problem of an intruder attempting to traverse a defender\u27s territory ...
In the classic models of facility location, it is assumed that the selected facilities always work b...
This paper presents an algorithm to solve the multilevel location–allocation problem when sabo...
Facility disruptions or failures may occur due to natural disasters or a deliberate man-made attack....
The design of resilient supply chains under the risk of disruptions at candidate locations for distr...
Supply chains are vulnerable to disruptions at any stage of the distribution system. These disruptio...
Multi-echelon facility location models are commonly employed to design transportation systems. While...
The classical location models implicitly assume that the facilities, once built, will always operate...
Vulnerability to sudden service disruptions due to deliberate sabotage and terrorist attacks is one ...
Today’s business environment is complex, dynamic, and uncertain which makes a supply chain facility ...
International audienceThis paper develops a new mathematical model to study a location-routing probl...
Inefficient facility location decisions result in extra cost throughout the lifetime of the faciliti...
The objective of many location problems, such as the Maximal Covering Problem (MCLP), is to maximize...
This project describes a lexicographic network interdiction model for identifying optimal locations ...
Facility systems may be vulnerable to a disaster, whether caused by intention, an accident, or by an...
This research considers the problem of an intruder attempting to traverse a defender\u27s territory ...