D Huygens, M Labbé, AR Mahjoub… - Networks: An …, 2007 - Wiley Online Library
This article deals with the Two‐edge connected Hop‐constrained Network Design Problem (or THNDP for short). Given a weighted graph G=(N, E), an integer L≥ 2, and a subset of …
In this paper we study Integer Linear Programming models and develop branch-and-cut algorithms to solve the Black-and-White Traveling Salesman Problem (BWTSP)(Bourgeois …
I Diarrassouba, AR Mahjoub, IM Almudahka - Soft Computing, 2024 - Springer
In this paper, we study the k edge-connected L-hop-constrained network design problem. Given a weighted graph G=(V, E), a set D of pairs of nodes, two integers L≥ 2 and k≥ 2, the …
I Almudahka, I Diarrassouba, AR Mahjoub… - Computers & Industrial …, 2023 - Elsevier
In this paper we consider the two-edge-connected subgraph problem with disjunctive constraints. We investigate the convex hull of the solutions to this problem. We describe …
I Diarrassouba, V Gabrel, AR Mahjoub, L Gouveia… - …, 2016 - Wiley Online Library
In this article, we study the k‐edge‐connected L‐hop‐constrained network design problem. Given a weighted graph, a set D of pairs of nodes, two integers and, the problem consists in …
F Bendali, I Diarrassouba, AR Mahjoub, J Mailfert - Discrete Optimization, 2010 - Elsevier
Given a graph G with two distinguished nodes s and t, a cost on each edge of G and two fixed integers k≥ 2, L≥ 2, the k edge-disjoint L-hop-constrained paths problem is to find a …
The hop‐constrained survivable network design problem consists of finding a minimum cost subgraph containing K edge‐disjoint paths with length at most H joining each pair of vertices …
D Huygens, A Ridha Mahjoub - Networks: An International …, 2007 - Wiley Online Library
In this article, we consider the two 4‐hop‐constrained paths problem, which consists, given a graph G=(N, E) and two nodes s, t∈ N, of finding a minimum cost subgraph in G …
A Veremyev, V Boginski - Dynamics of information systems: Mathematical …, 2012 - Springer
This chapter analyzes optimal attack-tolerant network design and augmentation strategies for bounded-diameter networks. In the definitions of attack tolerance used in this chapter, we …