{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T02:52:15Z","timestamp":1725418335793},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/rndm.2015.7325237","type":"proceedings-article","created":{"date-parts":[[2015,11,12]],"date-time":"2015-11-12T23:12:08Z","timestamp":1447369928000},"page":"251-258","source":"Crossref","is-referenced-by-count":0,"title":["Algorithms for finding robust and sustainable network flows against multilink-attack"],"prefix":"10.1109","author":[{"given":"Jean-Francois","family":"Baffier","sequence":"first","affiliation":[]},{"given":"Vorapong","family":"Suppakitpaisarn","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316229"},{"key":"ref33","first-page":"1","article-title":"Applications of parametric maxflow in computer vision","author":"kolmogorov","year":"2007","journal-title":"ICCV'07"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/321978.321982"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-48109-X_3"},{"journal-title":"Hardness results for multilink attack flow problems","year":"2015","author":"dai","key":"ref30"},{"journal-title":"The Principles of Quantum Mechanics","year":"1958","author":"dirac","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(02)00496-1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2007.05.001"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0037(199607)27:4<279::AID-NET3>3.0.CO;2-D"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0895-7177(93)90236-R"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167286"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11590-009-0116-y"},{"journal-title":"Reducing the maximum flow","year":"2012","author":"gonshorovitz","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.orl.2009.09.013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0010-4825(87)90060-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2013.1200"},{"key":"ref17","article-title":"Robust network flow against attackers with knowledge of routing method","author":"suppakitpaisarn","year":"2015","journal-title":"HSPR'15"},{"key":"ref18","first-page":"26","article-title":"Parametric multiroute flow and its application to robust network with k edge failures","author":"baffier","year":"2014","journal-title":"ISC'14"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/net.10008"},{"key":"ref28","article-title":"An approximation algorithm for multiroute flow decomposition","author":"suppakitpaisarn","year":"2015","journal-title":"INOC&#x2019; 15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/ecjc.4430760604"},{"key":"ref27","first-page":"80","article-title":"Speeding up algorithm for maximizing barrier coverage using parametric multiroute flow","author":"suppakitpaisarn","year":"2014","journal-title":"TJIA'14"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488705"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230100105"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08783-2_15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/ecjc.4430770501"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(01)00110-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(00)00039-3"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4153\/CJM-1956-045-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04657-0_9"},{"key":"ref1","article-title":"Fundamentals of a method for evaluating rail net capacities","author":"harris","year":"1955","journal-title":"DTIC Document Tech Rep"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.11.002"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.10.026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848100"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.897956"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.804825"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883314"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.78"}],"event":{"name":"2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)","start":{"date-parts":[[2015,10,5]]},"location":"Munich, Germany","end":{"date-parts":[[2015,10,7]]}},"container-title":["2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7311668\/7324297\/07325237.pdf?arnumber=7325237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T04:37:56Z","timestamp":1490416676000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7325237\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/rndm.2015.7325237","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}