Operations Research and Cyber-Infrastructure is the companion volume to the Eleventh INFORMS Computing Society Conference (ICS 2009), held in Charleston, South Carolina, from January 11 to 13, 2009. It includes 24 high-quality refereed research papers. As always, the focus of interest for ICS is the interface between Operations Research and Computer Science, and the papers in this volume reflect that interest. This is naturally an evolving area as computational power increases rapidly while decreasing in cost even more quickly, and the papers included here illustrate the wide range of topics at this interface.
From the Foreword by Marshall Fisher, The Wharton School, University of Pennsylvania: As generation of academics and practitioners follows generation, it is worthwhile to compile long views of the research and practice in the past to shed light on research and practice going forward. This collection of peer-reviewed articles is intended to provide such a long view. This book contains a collection of chapters written by leading scholars/practitioners who have continued their efforts in developing and/or implementing innovative OR/MS tools for solving real world problems. In this book, the contributors share their perspectives about the past, present and future of OR/MS theoretical development, solution tools, modeling approaches, and applications. Specifically, this book collects chapters that offer insights about the following topics: • Survey articles taking a long view over the past two or more decades to arrive at the present state of the art while outlining ideas for future research. Surveys focus on use of a particular OR/MS approach, e.g., mathematical programming (LP, MILP, etc.) and solution methods for particular family of application, e.g., distribution system design, distribution planning system, health care. • Autobiographical or biographical accounts of how particular inventions (e.g., Structured Modeling) were made. These could include personal experiences in early development of OR/MS and an overview of what has happened since. • Development of OR/MS mathematical tools (e.g., stochastic programming, optimization theory). • Development of OR/MS in a particular industry sector such as global supply chain management. • Modeling systems for OR/MS and their development over time as well as speculation on future development (e.g., LINDO, LINGO, and What’sBest!) • New applications of OR/MS models (e.g., happiness) The target audience of this book is young researchers, graduate/advanced undergraduate students from OR/MS and related fields like computer science, engineering, and management as well as practitioners who want to understand how OR/MS modeling came about over the past few decades and what research topics or modeling approaches they could pursue in research or application.
This book is published in conjunction with the 12th Computing Society Conference, held January 9, 2011, in Monterey, California. The themes of the conference and this book are operations research, computing, and homeland defense. The papers cover topics on the theory of computing, mathematical programming, game theory, statistics and more; over half have applications to homeland defense.
This book presents the XXII Congress of APDIO – IO 2022 which is the 22nd edition of the regular meeting of the Portuguese Association of Operational Research (APDIO). The APDIO regular meetings aim to gather Portuguese and international researchers, scholars and practitioners, as well as M.Sc. and Ph.D. students, working in the field of Operations Research to present and discuss their latest research works. The main theme of the XXII Congress of APDIO is OR in Turbulent Times: Adaptation and Resilience. Readers find interesting results and applications of Operational Research cutting-edge methods and techniques in the wide variety of the addressed problems. Of particular interest are the applications of, among others, linear, nonlinear and mixed-integer programing, multiobjective optimization, metaheuristics and hybrid heuristics, multicriteria decision analysis, data envelopment analysis, simulation, clustering techniques and decision support systems, in different areas such as, supply chain management, scheduling problems, production management, logistics, energy, telecommunications, finance and health.
The study of operations research arose during World War II to enhance the effectiveness of weapons and equipment used on the battlefield. Since then, operations research techniques have also been used to solve several sophisticated and complex defense-related problems. Operations Research for Military Organizations is a critical scholarly resource that examines the issues that have an impact on aspects of contemporary quantitative applications of operations research methods in the military. It also addresses innovative applications, techniques, and methodologies to assist in solving defense and military-related problems. Featuring coverage on a broad range of topics such as combat planning, tactical decision aids, and weapon system simulations, this book is geared towards defense contractors, military consultants, military personnel, policy makers, and government departments seeking current research on defense methodologies.
This book constitutes the proceedings of the 15th International Conference on Integration of Artificial Intelligence and Operations Research Techniques in Constraint Programming for Combinatorial Optimization Problems, CPAIOR 2018, held in Delft, The Netherlands, in June 2018. The 47 full papers presented together with 3 abstracts of invited talks and 3 abstracts of fast-track journal papers were carefully reviewed and selected from 111 submissions. The conference brings together interested researchers from constraint programming, artificial intelligence, and operations research to present new techniques or applications in the intersection of these fields and provides an opportunity for researchers in one area to learn about techniques in the others, and to show how the integration of techniques from different fields can lead to interesting results on large and complex problems.
This book presents the latest research findings in the field of maintenance and safety of aging infrastructure. The invited contributions provide an overview of the use of advanced computational and/or experimental techniques in damage and vulnerability assessment as well as maintenance and retrofitting of aging structures and infrastructures such as buildings, bridges, lifelines and ships. Cost-efficient maintenance and management of civil infrastructure requires balanced consideration of both structural performance and the total cost accrued over the entire life-cycle considering uncertainties. In this context, major topics treated in this book include aging structures, climate adaptation, climate change, corrosion, cost, damage assessment, decision making, extreme events, fatigue life, hazards, hazard mitigation, inspection, life-cycle performance, maintenance, management, NDT methods, optimization, redundancy, reliability, repair, retrofit, risk, robustness, resilience, safety, stochastic control, structural health monitoring, sustainability, uncertainties and vulnerability. Applications include bridges, buildings, dams, marine structures, pavements, power distribution poles, offshore platforms, stadiums and transportation networks. This up-to-date overview of the field of maintenance and safety of aging infrastructure makes this book a must-have reference work for those involved with structures and infrastructures, including students, researchers and practitioners.
This book analyzes the security of critical infrastructures such as road, rail, water, health, and electricity networks that are vital for a nation’s society and economy, and assesses the resilience of these networks to intentional attacks. The book combines the analytical capabilities of experts in operations research and management, economics, risk analysis, and defense management, and presents graph theoretical analysis, advanced statistics, and applied modeling methods. In many chapters, the authors provide reproducible code that is available from the publisher’s website. Lastly, the book identifies and discusses implications for risk assessment, policy, and insurability. The insights it offers are globally applicable, and not limited to particular locations, countries or contexts. Researchers, intelligence analysts, homeland security staff, and professionals who operate critical infrastructures will greatly benefit from the methods, models and findings presented. While each of the twelve chapters is self-contained, taken together they provide a sound basis for informed decision-making and more effective operations, policy, and defense.
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation's cyber infrastructure. The cyber infrastructure encompasses a number of sectors including: the nation's mass transit and other transportation systems; banking and financial systems; factories; energy systems and the electric power grid; and telecommunications, which increasingly rely on a complex array of computer networks, including the public Internet. However, many of these systems and networks were not built and designed with security in mind. Therefore, our cyber infrastructure contains many holes, risks, and vulnerabilities that may enable an attacker to cause damage or disrupt cyber infrastructure operations. Threats to cyber infrastructure safety and security come from hackers, terrorists, criminal groups, and sophisticated organized crime groups; even nation-states and foreign intelligence services conduct cyber warfare. Cyber attackers can introduce new viruses, worms, and bots capable of defeating many of our efforts. Costs to the economy from these threats are huge and increasing. Government, business, and academia must therefore work together to understand the threat and develop various modes of fighting cyber attacks, and to establish and enhance a framework to assess the vulnerability of our cyber infrastructure and provide strategic policy directions for the protection of such an infrastructure. This book addresses such questions as: How serious is the cyber threat? What technical and policy-based approaches are best suited to securing telecommunications networks and information systems infrastructure security? What role will government and the private sector play in homeland defense against cyber attacks on critical civilian infrastructure, financial, and logistical systems? What legal impediments exist concerning efforts to defend the nation against cyber attacks, especially in preventive, preemptive, and retaliatory actions?