Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
126 tokens/sec
GPT-4o
47 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Protection of flows under targeted attacks (1601.03603v1)

Published 14 Jan 2016 in cs.DM and cs.DS

Abstract: Due to the importance of robustness in many real-world optimization problems, the field of robust optimization has gained a lot of attention over the past decade. We concentrate on maximum flow problems and introduce a novel robust optimization model which, compared to known models from the literature, features several advantageous properties: (i) We consider a general class of path-based flow problems which can be used to model a large variety of network routing problems (and other packing problems). (ii) We aim at solutions that are robust against targeted attacks by a potent adversary who may attack any flow path of his choice on any edge of the network. (iii) In contrast to previous robust maximum flow models, for which no efficient algorithms are known, optimal robust flows for the most important basic variants of our model can be found in polynomial time. We also consider generalizations where the flow player can spend a budget to protect the network against the interdictor. Here, we show that the problem can be solved efficiently when the interdiction costs are determined by the flow player from scratch. However, the problem becomes hard to approximate when the flow player has to improve an initial protection infrastructure.

Citations (16)

Summary

We haven't generated a summary for this paper yet.