Introduction to algorithms
Maximum independent set and related problems, with applications
Maximum independent set and related problems, with applications
Identifying sets of key players in a social network
Computational & Mathematical Organization Theory
Introduction to Operations Research and Revised CD-ROM 8
Introduction to Operations Research and Revised CD-ROM 8
Introduction to Global Optimization (Nonconvex Optimization and Its Applications)
Introduction to Global Optimization (Nonconvex Optimization and Its Applications)
Computers and Operations Research
Key figure impact in trust-enhanced recommender systems
AI Communications - Recommender Systems
On approximation of new optimization methods for assessing network vulnerability
INFOCOM'10 Proceedings of the 29th conference on Information communications
Finding critical nodes for inhibiting diffusion of complex contagions in social networks
ECML PKDD'10 Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part II
Robust optimization of graph partitioning and critical node detection in analyzing networks
COCOA'10 Proceedings of the 4th international conference on Combinatorial optimization and applications - Volume Part I
A multi-criteria optimization model for humanitarian aid distribution
Journal of Global Optimization
Controlling infection by blocking nodes and links simultaneously
WINE'11 Proceedings of the 7th international conference on Internet and Network Economics
Computers and Operations Research
On new approaches of assessing network vulnerability: hardness and approximation
IEEE/ACM Transactions on Networking (TON)
A decomposition approach for solving critical clique detection problems
SEA'12 Proceedings of the 11th international conference on Experimental Algorithms
Branch and cut algorithms for detecting critical nodes in undirected graphs
Computational Optimization and Applications
Network interdiction via a Critical Disruption Path: Branch-and-Price algorithms
Computers and Operations Research
On the discovery of critical links and nodes for assessing network vulnerability
IEEE/ACM Transactions on Networking (TON)
A derandomized approximation algorithm for the critical node detection problem
Computers and Operations Research
Hi-index | 0.01 |
Identifying critical nodes in a graph is important to understand the structural characteristics and the connectivity properties of the network. In this paper, we focus on detecting critical nodes, or nodes whose deletion results in the minimum pair-wise connectivity among the remaining nodes. This problem, known as the critical node problem has applications in several fields including biomedicine, telecommunications, and military strategic planning. We show that the recognition version of the problem is NP-complete and derive a mathematical formulation based on integer linear programming. In addition, we propose a heuristic for the problem which exploits the combinatorial structure of the graph. The heuristic is then enhanced by the application of a local improvement method. A computational study is presented in which we apply the integer programming formulation and the heuristic to real and randomly generated data sets. For all instances tested, the heuristic is able to efficiently provide optimal solutions in a fraction of the time required by a commercial software package.