{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T16:00:04Z","timestamp":1770480004111,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540281276","type":"print"},{"value":"9783540319047","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11535331_17","type":"book-chapter","created":{"date-parts":[[2010,7,21]],"date-time":"2010-07-21T20:51:20Z","timestamp":1279745480000},"page":"291-307","source":"Crossref","is-referenced-by-count":149,"title":["Capacity Constrained Routing Algorithms for Evacuation Planning: A Summary of Results"],"prefix":"10.1007","author":[{"given":"Qingsong","family":"Lu","sequence":"first","affiliation":[]},{"given":"Betsy","family":"George","sequence":"additional","affiliation":[]},{"given":"Shashi","family":"Shekhar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Hurricane Evacuation web page (2002), http:\/\/i49south.com\/hurricane.htm"},{"key":"17_CR2","unstructured":"Minnesota basemap web site. Minnesota Department of Transportation (2004), http:\/\/www.dot.state.mn.us\/tda\/basemap\/"},{"key":"17_CR3","unstructured":"Monticello evacuation planning web site. Minnesota Homeland Security and Emergency Management (2004), http:\/\/www.hsem.state.mn.us\/"},{"key":"17_CR4","volume-title":"Network Flows: Theory, Algorithms, and Applications","author":"R.K. Ahuja","year":"1993","unstructured":"Ahuja, R.K., Magnanti, T.L., Orlin, J.B.: Network Flows: Theory, Algorithms, and Applications. Prentice-Hall, Englewood Cliffs (1993)"},{"key":"17_CR5","unstructured":"Ben-Akiva, M., et al.: Development of a Deployable Real-Time Dynamic Traffic Assignment System: DynaMIT and DynaMIT-P User\u2019s Guide. Intelligent Transportation Systems Program, Massachusetts Institute of Technology (2002)"},{"key":"17_CR6","volume-title":"Introduction to Linear Optimization","author":"D. Bertsimas","year":"1997","unstructured":"Bertsimas, D., Tsitsiklis, J.N.: Introduction to Linear Optimization. Athena Scientific, Belmont (1997)"},{"key":"17_CR7","unstructured":"Brown, S.: Building America\u2019s Anti-Terror Machine: How Infotech Can Combat Homeland Insecurity. Fortune, 99\u2013104 (July 2002)"},{"key":"17_CR8","unstructured":"The Volpe National Transportation\u00a0Systems Center. Improving Regional Transportation Planning for Catastrophic Events(FHWA). Volpe Center Highlights, pp. 1\u20133 (July\/August 2002)"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1287\/mnsc.28.1.86","volume":"28","author":"L. Chalmet","year":"1982","unstructured":"Chalmet, L., Francis, R., Saunders, P.: Network Model for Building Evacuation. Management Science\u00a028, 86\u2013105 (1982)","journal-title":"Management Science"},{"key":"17_CR10","first-page":"129","volume":"73","author":"B.V. Cherkassky","year":"1996","unstructured":"Cherkassky, B.V., Goldberg, A.V., Radzik, T.: Shortest Paths Algorithms: Theory and Experimental Evaluation. Mathematical Programming\u00a073, 129\u2013174 (1996)","journal-title":"Mathematical Programming"},{"key":"17_CR11","volume-title":"Introduction to Algorithms","author":"T. Cormen","year":"2001","unstructured":"Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press, Cambridge (2001)","edition":"2"},{"key":"17_CR12","unstructured":"The Homeland\u00a0Security Council. Planning Scenarios, Executive Summaries, Created for Use in National, Federal, State, and Local Homeland Security Preparedness Activities (July 2004)"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"E.W. Dijkstra","year":"1959","unstructured":"Dijkstra, E.W.: A Note on Two Problems in Connexion with Graphs. Numerische Mathematik\u00a01, 269\u2013271 (1959)","journal-title":"Numerische Mathematik"},{"key":"17_CR14","unstructured":"ESRI. GIS for Homeland Security, An ESRI white paper (November 2001)"},{"key":"17_CR15","volume-title":"Flows in Network","author":"L.R. Ford","year":"1962","unstructured":"Ford, L.R., Fulkerson, D.R.: Flows in Network. Princeton University Press, Princeton (1962)"},{"key":"17_CR16","unstructured":"Francis, R., Chalmet, L.: A Negative Exponential Solution To An Evacuation Problem. Research Report No.84-86, National Bureau of Standards, Center for Fire Research (October 1984)"},{"key":"17_CR17","unstructured":"Hamacher, H.W., Tjandra, S.A.: Mathematical Modeling of Evacuation Problems: A state of the art. Pedestrian and Evacuation Dynamics, 227\u2013266 (2002)"},{"key":"17_CR18","unstructured":"Hoppe, B., Tardos, E.: Polynomial Time Algorithms For Some Evacuation Problems. In: Proceedings of the 5th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 433\u2013441 (1994)"},{"key":"17_CR19","unstructured":"Hoppe, B., Tardos, E.: The Quickest Transshipment Problem. In: Proceedings of the 6th annual ACM-SIAM Symposium on Discrete Algorithms, January 1995, pp. 512\u2013521 (1995)"},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1287\/mnsc.28.1.106","volume":"28","author":"J.J. Jarvis","year":"1982","unstructured":"Jarvis, J.J., Ratliff, H.D.: Some Equivalent Objectives for Dynamic Network Flow Problems. Management Science\u00a028, 106\u2013108 (1982)","journal-title":"Management Science"},{"key":"17_CR21","volume-title":"Algorithm for Network Programming","author":"J.L. Kennington","year":"1980","unstructured":"Kennington, J.L., Helgason, R.V.: Algorithm for Network Programming. Wiley and Sons, Chichester (1980)"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/0379-7112(85)90009-8","volume":"9","author":"T. Kisko","year":"1985","unstructured":"Kisko, T., Francis, R.: Evacnet+: A Computer Program to Determine Optimal Building Evacuation Plans. Fire Safety Journal\u00a09, 211\u2013222 (1985)","journal-title":"Fire Safety Journal"},{"key":"17_CR23","unstructured":"Kisko, T., Francis, R., Nobel, C.: EVACNET4 User\u2019s Guide. University of Florida (1998)"},{"key":"17_CR24","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1287\/mnsc.20.5.814","volume":"20","author":"D. Klingman","year":"1974","unstructured":"Klingman, D., Napier, A., Stutz, J.: NETGEN: A Program for Generating Large Scale Capacitated Assignment, Transportation, and Minimum Cost Flow Network Problems. Management Science\u00a020, 814\u2013821 (1974)","journal-title":"Management Science"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Lu, Q., George, B., Shekhar, S.: Capacity Constrained Routing Algotithm for Evacuation Planning: A Summary of Results. Technical Report, Department of Computer Science and Engineering, University of Minnesota (05-023) (2005)","DOI":"10.1007\/11535331_17"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Lu, Q., Huang, Y., Shekhar, S.: Evacuation Planning: A Capacity Constrained Routing Approach. In: Proceedings of the First NSF\/NIJ Symposium on Intelligence and Security Informatics, June 2003, pp. 111\u2013125 (2003)","DOI":"10.1007\/3-540-44853-5_9"},{"key":"17_CR27","unstructured":"Mahmassani, H.S., Sbayti, H., Zhou, X.: DYNASMART-P Version 1.0 User\u2019s Guide. Maryland Transportation Initiative, University of Maryland (September 2004)"},{"key":"17_CR28","unstructured":"Nilsson, N.J.: Principles of Artificial Intelligence. Tioga Publishing Co. (1980)"},{"key":"17_CR29","volume-title":"Heuristics: Intelligent Search Strategies for Computer Problem Solving","author":"J. Pearl","year":"1984","unstructured":"Pearl, J.: Heuristics: Intelligent Search Strategies for Computer Problem Solving. Addison-Wesley, Reading (1984)"},{"key":"17_CR30","unstructured":"Shekhar, S.: Evacuation Planning: Presentation at UCGIS Congressional Breakfast Program on Homeland Security (February 2004), http:\/\/www.ucgis.org\/winter2004\/program.htm"},{"key":"17_CR31","unstructured":"Shekhar, S., Lu, Q.: Evacuation Planning for Homeland Security. Minnesota Homeland Security and Emergency Management newsletter (October 2004)"},{"key":"17_CR32","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1287\/trsc.32.1.65","volume":"32","author":"F.B. Zhan","year":"1998","unstructured":"Zhan, F.B., Noon, C.E.: Shortest Paths Algorithms: An Evaluation Using Real Road Networks. Transportation Science\u00a032, 65\u201373 (1998)","journal-title":"Transportation Science"},{"issue":"5","key":"17_CR33","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0191-2615(96)00001-X","volume":"30","author":"A.K. Ziliaskopoulos","year":"1996","unstructured":"Ziliaskopoulos, A.K., Mahmassani, H.S.: A Note on Least Time Path Computation Considering Delays and Prohibitations for Intersection Movements. Transportation Research B\u00a030(5), 359\u2013367 (1996)","journal-title":"Transportation Research B"}],"container-title":["Lecture Notes in Computer Science","Advances in Spatial and Temporal Databases"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11535331_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:11:11Z","timestamp":1605643871000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11535331_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540281276","9783540319047"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/11535331_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}