A hierarchy of relaxation between the continuous and convex hull representations
SIAM Journal on Discrete Mathematics
The mixed integer linear bilevel programming problem
Operations Research
Hashing vectors for tabu search
Annals of Operations Research - Special issue on Tabu search
Reliability Models for Facility Location: The Expected Failure Cost Case
Transportation Science
A bilevel mixed-integer program for critical infrastructure protection planning
Computers and Operations Research
Solution method for the location planning problem of logistics park with variable capacity
Computers and Operations Research
Protection issues for supply systems involving random attacks
Computers and Operations Research
Computers and Industrial Engineering
Hi-index | 0.01 |
We investigate a bilevel fixed charge facility location problem for a system planner (the defender) who has to provide public service to customers. The defender cannot dictate customer-facility assignments since the customers pick their facility of choice according to its proximity. Thus, each facility must have sufficient capacity installed to accommodate all customers for whom it is the closest one. Facilities can be opened either in the protected or unprotected mode. Protection immunizes against an attacker who is capable of destroying at most r unprotected facilities in the worst-case scenario. Partial protection or interdiction is not possible. The defender selects facility sites from m candidate locations which have different costs. The attacker is assumed to know the unprotected facilities with certainty. He makes his interdiction plan so as to maximize the total post-attack cost incurred by the defender. If a facility has been interdicted, its customers are reallocated to the closest available facilities making capacity expansion necessary. The problem is formulated as a static Stackelberg game between the defender (leader) and the attacker (follower). Two solution methods are proposed. The first is a tabu search heuristic where a hash function calculates and records the hash values of all visited solutions for the purpose of avoiding cycling. The second is a sequential method in which the location and protection decisions are separated. Both methods are tested on 60 randomly generated instances in which m ranges from 10 to 30, and r varies between 1 and 3. The solutions are further validated by means of an exhaustive search algorithm. Test results show that the defender's facility opening plan is sensitive to the protection and distance costs.