4.7 Article

Designing networks with resiliency to edge failures using two-stage robust optimization

期刊

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH
卷 279, 期 3, 页码 704-720

出版社

ELSEVIER
DOI: 10.1016/j.ejor.2019.06.021

关键词

Networks; Network design; Network resiliency; Two-stage robust optimization; Column and constraint generation

资金

  1. DoD
  2. Air Force Office of Scientific Research, National Defense Science and Engineering Graduate (NDSEG) Fellowship [32 CFR 168a]
  3. National Institutes of Health (NBIB) [1U01EB021956-01]
  4. DARPA (Lagrange Program) [N66001-18-C-4031]

向作者/读者索取更多资源

We study the design of resilient single-commodity flow networks that can remain robust against multiple concurrent edge failures. We model these failures as binary random variables, allowing us to formally formulate the network design problem as a two-stage robust optimization problem. With an objective of minimizing the overall cost of building and operating the network, the capacities of the edges are decided in the first stage, while the optimal flows are determined in the second stage once the uncertainty has been realized. We first examine the standard affine decision rules approach and show that it is not a viable approach when two or more edges are allowed to fail at the same time. We then propose a column and constraint generation algorithm that we tailor to this application. Since the problem does not satisfy the relatively complete recourse assumption, we employ an oracle with two subproblems: one to determine edge failure scenarios that render the required demand satisfaction infeasible, and if no such scenario exists, a second one to determine the flow rerouting plan of highest cost. Our column and constraint generation algorithm is applied to networks adapted from the Survivable Network Design Library. For each instance, we determine sequences of fully adaptive, robust optimal solutions for various levels of resiliency, identifying also the maximum number of concurrent edge failures that can be sustained by these networks. Finally, we demonstrate how our algorithm can be applied to a defender versus attacker context, via the use of a decision-dependent uncertainty set. (C) 2019 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据