{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T15:26:08Z","timestamp":1774625168877,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,5,16]],"date-time":"2012-05-16T00:00:00Z","timestamp":1337126400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1007\/s10479-012-1146-x","type":"journal-article","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T16:54:28Z","timestamp":1337100868000},"page":"125-163","source":"Crossref","is-referenced-by-count":108,"title":["Strategies for protecting supply chain networks against facility and transportation disruptions: an improved Benders decomposition approach"],"prefix":"10.1007","volume":"210","author":[{"given":"Nader","family":"Azad","sequence":"first","affiliation":[]},{"given":"Georgios K. D.","family":"Saharidis","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Davoudpour","sequence":"additional","affiliation":[]},{"given":"Hooman","family":"Malekly","sequence":"additional","affiliation":[]},{"given":"Seyed Alireza","family":"Yektamaram","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,5,16]]},"reference":[{"issue":"1","key":"1146_CR1","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.orl.2009.09.013","volume":"38","author":"D. S. Altner","year":"2010","unstructured":"Altner, D. S., Ergun, O., & Uhan, N. A. (2010). The maximum flow network interdiction problem: valid inequalities, integrality gaps, and approximability. Operations Research Letters, 38(1), 33\u201338.","journal-title":"Operations Research Letters"},{"issue":"2","key":"1146_CR2","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1002\/net.20278","volume":"53","author":"A. K. Andreas","year":"2009","unstructured":"Andreas, A. K., & Smith, J. C. (2009). Decomposition algorithms for the design of a non simultaneous capacitated evacuation tree network. Networks, 53(2), 91\u2013103.","journal-title":"Networks"},{"issue":"1","key":"1146_CR3","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/BF01386316","volume":"4","author":"J. F. Benders","year":"1962","unstructured":"Benders, J. F. (1962). Partitioning procedures for solving mixed-variables programming problems. Numerische Mathematik, 4(1), 238\u2013252.","journal-title":"Numerische Mathematik"},{"issue":"2","key":"1146_CR4","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1287\/opre.1060.0348","volume":"55","author":"O. Berman","year":"2007","unstructured":"Berman, O., Krass, D., & Menezes, M. (2007). Facility reliability issues in network p-median problems: strategic centralization and co-location effects. Operations Research, 55(2), 332\u2013350.","journal-title":"Operations Research"},{"issue":"4","key":"1146_CR5","doi-asserted-by":"crossref","first-page":"845","DOI":"10.1111\/j.1540-5915.2009.00253.x","volume":"40","author":"O. Berman","year":"2009","unstructured":"Berman, O., Krass, D., & Menezes, M. (2009). Locating facilities in the presence of disruptions and incomplete information. Decision Sciences, 40(4), 845\u2013868.","journal-title":"Decision Sciences"},{"issue":"1","key":"1146_CR6","first-page":"53","volume":"46","author":"S. Chopra","year":"2004","unstructured":"Chopra, S., & Sodhi, M. S. (2004). Managing risk to avoid supply-chain breakdown. MIT Sloan Management Review, 46(1), 53\u201361.","journal-title":"MIT Sloan Management Review"},{"issue":"5","key":"1146_CR7","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1002\/nav.20228","volume":"54","author":"S. Chopra","year":"2007","unstructured":"Chopra, S., Reinhardt, G., & Mohan, U. (2007). The importance of decoupling recurrent and disruption risks in a supply chain. Naval Research Logistics, 54(5), 544\u2013555.","journal-title":"Naval Research Logistics"},{"issue":"2","key":"1146_CR8","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1111\/j.1538-4632.2007.00698.x","volume":"39","author":"R. L. Church","year":"2006","unstructured":"Church, R. L., & Scaparra, M. P. (2006). Protecting critical assets: the R-interdiction median problem with fortification. Geographical Analysis, 39(2), 129\u2013146.","journal-title":"Geographical Analysis"},{"issue":"3","key":"1146_CR9","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1111\/j.1467-8306.2004.00410.x","volume":"94","author":"R. L. Church","year":"2004","unstructured":"Church, R. L., Scaparra, M. P., & Middleton, R. S. (2004). Identifying critical infrastructure: the median and covering facility interdiction problem. Annals of the Association of American Geographers, 94(3), 491\u2013502.","journal-title":"Annals of the Association of American Geographers"},{"key":"1146_CR10","volume-title":"The combinatorics of network reliability","author":"C. Colbourn","year":"1987","unstructured":"Colbourn, C. (1987). The combinatorics of network reliability. New York: Oxford University Press."},{"key":"1146_CR11","volume-title":"Engineering and science applications","author":"A. J. Conejo","year":"2006","unstructured":"Conejo, A. J., Castillo, E., Minguez, R., & Garcia-Bertrand, R. (2006). Decomposition techniques in mathematical programming. In Engineering and science applications. Berlin: Springer."},{"issue":"2","key":"1146_CR12","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1287\/trsc.34.2.133.12308","volume":"34","author":"J. F. Cordeau","year":"2000","unstructured":"Cordeau, J. F., Soumis, F., & Desrosiers, J. (2000). A Benders decomposition approach for the locomotive and car assignment problem. Transportation Science, 34(2), 133\u2013149.","journal-title":"Transportation Science"},{"issue":"1","key":"1146_CR13","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s10479-006-0001-3","volume":"144","author":"J. F. Cordeau","year":"2006","unstructured":"Cordeau, J. F., Pasin, F., & Solomon, M. M. (2006). An integrated model for logistics network design. Annals of Operations Research, 144(1), 59\u201382.","journal-title":"Annals of Operations Research"},{"key":"1146_CR14","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1016\/0377-2217(84)90287-X","volume":"16","author":"G. Cote","year":"1984","unstructured":"Cote, G., & Laughton, M. (1984). Large-scale mixed integer programming: Benders-type heuristics. European Journal of Operational Research, 16, 327\u2013333.","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"1146_CR15","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1111\/j.1540-5915.2007.00151.x","volume":"38","author":"C. W. Craighead","year":"2007","unstructured":"Craighead, C. W., Blackhurst, J., Rungtusanatham, M. J., & Handfield, R. B. (2007). The severity of supply chain disruptions: Design characteristics and mitigation capabilities. Decision Sciences, 38(1), 131\u2013156.","journal-title":"Decision Sciences"},{"issue":"4","key":"1146_CR16","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1287\/opre.1090.0801","volume":"58","author":"T. Cui","year":"2010","unstructured":"Cui, T., Ouyang, Y., & Shen, Z.-J. (2010). Reliable facility location design under the risk of disruptions. Operations Research, 58(4), 998\u20131011.","journal-title":"Operations Research"},{"issue":"6","key":"1146_CR17","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1057\/jors.1987.88","volume":"38","author":"Z. Drezner","year":"1987","unstructured":"Drezner, Z. (1987). Heuristic solution methods for two location problems with unreliable facilities. Journal of Operations Research Society, 38(6), 509\u2013514.","journal-title":"Journal of Operations Research Society"},{"issue":"1","key":"1146_CR18","first-page":"46","volume":"9","author":"D. Elkins","year":"2005","unstructured":"Elkins, D., Handfield, R. B., Blackhurst, J., & Craighead, C. W. (2005). 18 ways to guard against disruption. Supply Chain Management Review, 9(1), 46\u201353.","journal-title":"Supply Chain Management Review"},{"issue":"1","key":"1146_CR19","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1111\/j.1937-5956.2005.tb00009.x","volume":"14","author":"P. R. Kleindorfer","year":"2005","unstructured":"Kleindorfer, P. R., & Saad, G. (2005). Managing disruption risks in supply chains. Production and Operations Management, 14(1), 53\u201368.","journal-title":"Production and Operations Management"},{"issue":"2","key":"1146_CR20","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.ejor.2009.06.011","volume":"203","author":"W. Klibi","year":"2010","unstructured":"Klibi, W., Martel, A., & Guitouni, A. (2010). The design of robust value-creating supply chain networks: a\u00a0critical review. European Journal of Operational Research, 203(2), 283\u2013293.","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"1146_CR21","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1111\/j.1937-5956.2004.tb00144.x","volume":"13","author":"S. Kraiselburd","year":"2004","unstructured":"Kraiselburd, S., Narayanan, V. G., & Raman, A. (2004). Contracting in a supply chain with stochastic demand and substitute products. Production and Operations Management, 13(1), 46\u201362.","journal-title":"Production and Operations Management"},{"issue":"4","key":"1146_CR22","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1080\/14697680701483222","volume":"7","author":"M. Kaut","year":"2007","unstructured":"Kaut, M., Wallace, S. W., Vladimirou, H., & Zenios, S. (2007). Stability analysis of portfolio management with conditional value-at-risk. Quantitative Finance, 7(4), 397\u2013409.","journal-title":"Quantitative Finance"},{"issue":"2","key":"1146_CR23","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1111\/j.1937-5956.2004.tb00154.x","volume":"13","author":"S. S. Kulkarni","year":"2004","unstructured":"Kulkarni, S. S., Magazine, M. J., & Raturi, A. S. (2004). Risk pooling advantages of manufacturing network configuration. Production and Operations Management, 13(2), 186\u2013199.","journal-title":"Production and Operations Management"},{"issue":"4","key":"1146_CR24","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/S0305-0548(99)00120-3","volume":"28","author":"S. D. Lee","year":"2001","unstructured":"Lee, S. D. (2001). On solving unreliable planar location problems. Computers & Operations Research, 28(4), 329\u2013344.","journal-title":"Computers & Operations Research"},{"issue":"4","key":"1146_CR25","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1016\/j.trb.2009.09.004","volume":"44","author":"X. Li","year":"2010","unstructured":"Li, X., & Ouyang, Y. (2010). A continuum approximation approach to reliable facility location design under correlated probabilistic disruptions. Transportation Research. Part B, 44(4), 535\u2013548.","journal-title":"Transportation Research. Part B"},{"issue":"1","key":"1146_CR26","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.cor.2010.06.002","volume":"38","author":"F. Liberatore","year":"2011","unstructured":"Liberatore, F., Scaparra, M. P., & Daskin, M. S. (2011). Analysis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification. Computers & Operations Research, 38(1), 357\u2013366.","journal-title":"Computers & Operations Research"},{"key":"1146_CR27","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.omega.2011.03.003","volume":"40","author":"F. Liberatore","year":"2012","unstructured":"Liberatore, F., Scaparra, M. P., & Daskin, M. S. (2012). Hedging against disruptions with ripple effects in location analysis. Omega, 40, 21\u201330.","journal-title":"Omega"},{"issue":"1","key":"1146_CR28","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1002\/nav.20385","volume":"57","author":"M. Lim","year":"2010","unstructured":"Lim, M., Daskin, M., Bassamboo, A., & Chopra, S. (2010). A facility reliability problem: formulation, properties and algorithm. Naval Research Logistics, 57(1), 58\u201370.","journal-title":"Naval Research Logistics"},{"key":"1146_CR29","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1287\/opre.29.3.464","volume":"29","author":"T. Magnanti","year":"1981","unstructured":"Magnanti, T., & Wong, R. (1981). Accelerating Benders decomposition algorithmic enhancement and model selection criteria. Operations Research, 29, 464\u2013484.","journal-title":"Operations Research"},{"issue":"1","key":"1146_CR30","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1111\/j.1937-5956.2005.tb00012.x","volume":"14","author":"V. Martinez-de-Albeniz","year":"2005","unstructured":"Martinez-de-Albeniz, V., & Simchi-Levi, D. (2005). A portfolio approach to procurement contracts. Production and Operations Management, 14(1), 90\u2013114.","journal-title":"Production and Operations Management"},{"key":"1146_CR31","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1287\/mnsc.24.3.312","volume":"24","author":"D. McDaniel","year":"1977","unstructured":"McDaniel, D., & Devine, M. (1977). A modified Benders partitioning algorithm for mixed integer programming. Management Science, 24, 312\u2013319.","journal-title":"Management Science"},{"key":"1146_CR32","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/S0925-5273(03)00098-7","volume":"87","author":"E. Mohebbi","year":"2004","unstructured":"Mohebbi, E. (2004). A replenishment model for the supply-uncertainty problem. International Journal of Production Economics, 87, 25\u201337.","journal-title":"International Journal of Production Economics"},{"key":"1146_CR33","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.ijpe.2008.08.045","volume":"181","author":"A. Oke","year":"2009","unstructured":"Oke, A., & Gopalakrishnan, M. (2009). Managing disruptions in supply chains: a case study of a retail supply chain. International Journal of Production Economics, 181, 168\u2013174.","journal-title":"International Journal of Production Economics"},{"issue":"4","key":"1146_CR34","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1016\/j.orl.2008.01.005","volume":"36","author":"N. Papadakos","year":"2008","unstructured":"Papadakos, N. (2008). Practical enhancements to the Magnanti-Wong method. Operations Research Letters, 36(4), 444\u2013449.","journal-title":"Operations Research Letters"},{"key":"1146_CR35","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1016\/S0377-2217(96)00165-8","volume":"99","author":"M. Parlar","year":"1997","unstructured":"Parlar, M. (1997). Continuous review inventory problem with random supply interruptions. European Journal of Operational Research, 99, 366\u2013385.","journal-title":"European Journal of Operational Research"},{"key":"1146_CR36","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1002\/1520-6750(199102)38:1<107::AID-NAV3220380110>3.0.CO;2-4","volume":"38","author":"M. Parlar","year":"1991","unstructured":"Parlar, M., & Berkin, D. (1991). Future supply uncertainty in EOQ models. Naval Research Logistics, 38, 107\u2013121.","journal-title":"Naval Research Logistics"},{"key":"1146_CR37","author":"P. Peng","year":"2011","unstructured":"Peng, P., Snyder, L. V., Lim, A., & Liu, Z. (2011). Reliable logistics networks design with facility disruptions. Transportation Research. Part B. doi: 10.1016\/j.trb.2011.05.022 .","journal-title":"Transportation Research. Part B"},{"issue":"2","key":"1146_CR38","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1287\/trsc.1100.0320","volume":"44","author":"L. Qi","year":"2010","unstructured":"Qi, L., Shen, Z.-J., & Snyder, L. V. (2010). The effect of supply disruptions on supply chain design decisions. Transportation Science, 44(2), 274\u2013289.","journal-title":"Transportation Science"},{"key":"1146_CR39","volume-title":"Hybrid methods and branching rules in combinatorial optimization","author":"W. Rei","year":"2006","unstructured":"Rei, W., Gendreau, M., Cordeau, J. F., & Soriano, P. (2006). Accelerating Benders decomposition by local branching. In: Hybrid methods and branching rules in combinatorial optimization, Montreal, 2006."},{"issue":"34","key":"1146_CR40","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1016\/j.compchemeng.2009.10.002","volume":"8","author":"G. K. D. Saharidis","year":"2010","unstructured":"Saharidis, G. K. D., & Ierapetritou, M. G. (2010). Improving Benders decomposition using maximum feasible subsystem (MFS) cut generation strategy. Computers & Chemical Engineering, 8(34), 1237\u20131245.","journal-title":"Computers & Chemical Engineering"},{"issue":"8","key":"1146_CR41","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1016\/j.compchemeng.2009.02.005","volume":"33","author":"G. K. D. Saharidis","year":"2009","unstructured":"Saharidis, G. K. D., Minoux, M., & Dallery, Y. (2009). Scheduling of loading and unloading of crude oil in a refinery using event-based discrete time formulation. Computers & Chemical Engineering, 33(8), 1413\u20131426.","journal-title":"Computers & Chemical Engineering"},{"issue":"2","key":"1146_CR42","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1111\/j.1475-3995.2009.00706.x","volume":"17","author":"G. K. D. Saharidis","year":"2010","unstructured":"Saharidis, G. K. D., Minoux, M., & Ierapetritou, M. G. (2010). Accelerating Benders method using covering cut bundle generation. International Transactions in Operational Research, 17(2), 221\u2013237.","journal-title":"International Transactions in Operational Research"},{"key":"1146_CR43","author":"G. K. D. Saharidis","year":"2011","unstructured":"Saharidis, G. K. D., Boile, M., & Theofanis, S. (2011). Initialization of the Benders master problem using valid inequalities applied to fixed-charge network problems. Expert Systems with Applications. doi: 10.1016\/j.eswa.2010.11.075 .","journal-title":"Expert Systems with Applications"},{"issue":"6","key":"1146_CR44","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1016\/j.cor.2006.09.019","volume":"35","author":"M. P. Scaparra","year":"2008","unstructured":"Scaparra, M. P., & Church, R. L. (2008). A bi level mixed-integer program for critical infrastructure protection planning. Computers & Operations Research, 35(6), 1905\u20131923.","journal-title":"Computers & Operations Research"},{"key":"1146_CR45","author":"H. F. Sherali","year":"2011","unstructured":"Sherali, H. F., & Lunday, B. J. (2011). On generating maximal non dominated Benders cuts. Annals of Operations Research. doi: 10.1007\/s10479-011-0883-6 .","journal-title":"Annals of Operations Research"},{"key":"1146_CR46","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198533863.001.0001","volume-title":"Network reliability and algebraic structures","author":"D. R. Shier","year":"1991","unstructured":"Shier, D. R. (1991). Network reliability and algebraic structures. Oxford: Clarendon Press."},{"key":"1146_CR47","doi-asserted-by":"crossref","DOI":"10.1002\/047122460X","volume-title":"Reliability of computer systems and networks: fault tolerance, analysis, and design","author":"M. L. Shooman","year":"2002","unstructured":"Shooman, M. L. (2002). Reliability of computer systems and networks: fault tolerance, analysis, and design. New York: Wiley."},{"issue":"3","key":"1146_CR48","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1287\/trsc.1040.0107","volume":"39","author":"L. V. Snyder","year":"2005","unstructured":"Snyder, L. V., & Daskin, M. S. (2005). Reliability models for facility location: the expected failure cost case. Transportation Science, 39(3), 400\u2013416.","journal-title":"Transportation Science"},{"issue":"11","key":"1146_CR49","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1080\/07408170500469113","volume":"38","author":"L. V. Snyder","year":"2006","unstructured":"Snyder, L. V., & Daskin, M. S. (2006). Stochastic p-robust location problems. IIE Transactions, 38(11), 971\u2013985.","journal-title":"IIE Transactions"},{"key":"1146_CR50","first-page":"234","volume-title":"Tutorials in operations research INFORMS 2006","author":"L. V. Snyder","year":"2006","unstructured":"Snyder, L. V., Scaparra, M. P., Daskin, M. S., & Church, R. L. (2006). Planning for disruptions in supply chain networks. In: Tutorials in operations research INFORMS 2006 (pp. 234\u2013257)."},{"key":"1146_CR51","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1016\/j.ijpe.2005.12.006","volume":"103","author":"C. S. Tang","year":"2006","unstructured":"Tang, C. S. (2006). Perspectives in supply chain risk management. International Journal of Production Economics, 103, 451\u2013488.","journal-title":"International Journal of Production Economics"},{"issue":"5","key":"1146_CR52","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1287\/mnsc.1060.0515","volume":"52","author":"B. Tomlin","year":"2006","unstructured":"Tomlin, B. (2006). On the value of mitigation and contingency strategies for managing supply chain disruption risks. Management Science, 52(5), 639\u2013657.","journal-title":"Management Science"},{"issue":"1","key":"1146_CR53","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1287\/msom.1040.0063","volume":"7","author":"B. Tomlin","year":"2005","unstructured":"Tomlin, B., & Wang, Y. (2005). On the value of mix flexibility and dual sourcing in unreliable newsvendor networks. Manufacturing & Service Operations Management, 7(1), 37\u201357.","journal-title":"Manufacturing & Service Operations Management"},{"issue":"6","key":"1146_CR54","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/j.pursup.2007.01.004","volume":"12","author":"S. M. Wagner","year":"2006","unstructured":"Wagner, S. M., & Bode, C. (2006). An empirical investigation into supply chain vulnerability. Journal of Purchasing and Supply Management, 12(6), 301\u2013312.","journal-title":"Journal of Purchasing and Supply Management"},{"issue":"3","key":"1146_CR55","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1137\/S1052623497318700","volume":"10","author":"G. Zakeri","year":"1998","unstructured":"Zakeri, G., Philpott, A. B., & Ryan, D. M. (1998). Inexact cuts in benders decomposition. SIAM Journal on Optimization, 10(3), 643\u2013657.","journal-title":"SIAM Journal on Optimization"}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-012-1146-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10479-012-1146-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-012-1146-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T16:07:43Z","timestamp":1713974863000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10479-012-1146-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,16]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["1146"],"URL":"https:\/\/doi.org\/10.1007\/s10479-012-1146-x","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,5,16]]}}}