{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:57:43Z","timestamp":1757311063423},"reference-count":6,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T00:00:00Z","timestamp":1160524800000},"content-version":"vor","delay-in-days":6614,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Networks"],"published-print":{"date-parts":[[1988,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The tolerance approach to sensitivity analysis, in contrast to classical sensitivity analysis, allows for simultaneous and independent perturbations of objective function coefficients and of right\u2010hand\u2010side terms from their original values. Here we specialize this approach to network problems. The specialization yields streamlined results in that the computations can be performed directly on a network.<\/jats:p>","DOI":"10.1002\/net.3230180303","type":"journal-article","created":{"date-parts":[[2007,5,11]],"date-time":"2007-05-11T23:23:35Z","timestamp":1178925815000},"page":"159-171","source":"Crossref","is-referenced-by-count":11,"title":["The tolerance approach to sensitivity analysis in network linear programming"],"prefix":"10.1002","volume":"18","author":[{"given":"N.","family":"Ravi","sequence":"first","affiliation":[]},{"given":"Richard E.","family":"Wendell","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,11]]},"reference":[{"key":"e_1_2_1_2_2","volume-title":"Algorithms for Network Programming","author":"Kennington J. L.","year":"1980"},{"key":"e_1_2_1_3_2","volume-title":"Optimization by Vector Space Methods","author":"Luenberger D. G.","year":"1969"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1287\/opre.33.5.1074"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(82)90178-9"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.31.5.564"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02591999"}],"container-title":["Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fnet.3230180303","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/net.3230180303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T20:04:22Z","timestamp":1697918662000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/net.3230180303"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,9]]},"references-count":6,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1988,9]]}},"alternative-id":["10.1002\/net.3230180303"],"URL":"https:\/\/doi.org\/10.1002\/net.3230180303","archive":["Portico"],"relation":{},"ISSN":["0028-3045","1097-0037"],"issn-type":[{"value":"0028-3045","type":"print"},{"value":"1097-0037","type":"electronic"}],"subject":[],"published":{"date-parts":[[1988,9]]}}}