The Nested Event Tree Model with Application to Combating Terrorism
dc.contributor | Virginia Tech | en |
dc.contributor.author | Lunday, B. J. | en |
dc.contributor.author | Sherali, Hanif D. | en |
dc.contributor.author | Glickman, T. S. | en |
dc.contributor.department | Industrial and Systems Engineering | en |
dc.date.accessed | 2014-02-05 | en |
dc.date.accessioned | 2014-03-05T14:00:23Z | en |
dc.date.available | 2014-03-05T14:00:23Z | en |
dc.date.issued | 2010 | en |
dc.description.abstract | In this paper, we model and solve the strategic problem of minimizing the expected loss inflicted by a hostile terrorist organization. An appropriate allocation of certain capability-related, intent-related, vulnerability-related, and consequence-related resources is used to reduce the probabilities of success in the respective attack-related actions and to ameliorate losses in case of a successful attack. We adopt a nested event tree optimization framework and formulate the problem as a specially structured nonconvex factorable program. We develop two branch-and-bound schemes based, respectively, on utilizing a convex nonlinear relaxation and a linear outer approximation, both of which are proven to converge to a global optimal solution. We also design an alternative direct mixed-integer programming model representation for this case, and we investigate a fundamental special-case variant for this scheme that provides a relaxation and affords an optimality gap measure. Several range reduction, partitioning, and branching strategies are proposed, and extensive computational results are presented to study the efficacy of different compositions of these algorithmic ingredients, including comparisons with the commercial software BARON. A sensitivity analysis is also conducted to explore the effect of certain key model parameters. | en |
dc.description.sponsorship | NSF CMMI-0969169 | en |
dc.format.mimetype | application/pdf | en |
dc.identifier.citation | Lunday, Brian J.; Sherali, Hanif D.; Glickman, Theodore S. The Nested Event Tree Model with Application to Combating Terrorism. INFORMS Journal on Computing 2010 22:4, 620-634. doi: 10.1287/ijoc.1100.0377 | en |
dc.identifier.doi | https://doi.org/10.1287/ijoc.1100.0377 | en |
dc.identifier.issn | 1091-9856 | en |
dc.identifier.uri | http://hdl.handle.net/10919/25831 | en |
dc.identifier.url | http://pubsonline.informs.org/doi/pdf/10.1287/ijoc.1100.0377 | en |
dc.language.iso | en | en |
dc.publisher | INFORMS | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.subject | Combating terrorism | en |
dc.subject | Outer approximation | en |
dc.subject | Branch and bound | en |
dc.subject | Global | en |
dc.subject | Optimization | en |
dc.subject | Factorable programs | en |
dc.subject | Mixed-integer models | en |
dc.subject | Computer programming | en |
dc.subject | Global optimization | en |
dc.subject | Resources | en |
dc.subject | Allocation | en |
dc.subject | Risks | en |
dc.title | The Nested Event Tree Model with Application to Combating Terrorism | en |
dc.title.serial | Informs Journal on Computing | en |
dc.type | Article - Refereed | en |
dc.type.dcmitype | Text | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- ijoc%2E1100%2E0377.pdf
- Size:
- 339.39 KB
- Format:
- Adobe Portable Document Format
- Description:
- Main article