Late acceptance-based heuristic algorithms for identifying critical nodes of weighted graphs
Identifying critical nodes is an efficient way to analyze and apprehend the properties, structures, and functions of complex networks, which is a challenging NP-hard problem. This paper studies a node-weighted version of the critical node problem (NWCNP) that involves minimization of pairwise connec...
Saved in:
| Published in | Knowledge-based systems Vol. 211; p. 106562 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
Amsterdam
Elsevier B.V
09.01.2021
Elsevier Science Ltd |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0950-7051 1872-7409 |
| DOI | 10.1016/j.knosys.2020.106562 |
Cover
| Abstract | Identifying critical nodes is an efficient way to analyze and apprehend the properties, structures, and functions of complex networks, which is a challenging NP-hard problem. This paper studies a node-weighted version of the critical node problem (NWCNP) that involves minimization of pairwise connectivity measure of a given node-weighted graph via the removal of a subset of nodes (i.e., critical nodes), subject to a budgetary constraint. In this paper, we present two effective iterated local search algorithms for NWCNP. Our proposed algorithms iterate through two complementary search procedures. A local search procedure adopting a constrained neighborhood and late acceptance strategy is employed to find a local optimum from a given starting solution. Then, a destructive–constructive perturbation procedure is used to escape from a local optimum. We conduct extensive computational experiments with two categories of 32 benchmark instances that reveal our proposed algorithms can achieve the best upper bounds for 28 instances and are highly competitive compared to baseline algorithm. In particular, our algorithms achieved better performance on the first category of instances with random weighting than that on the second category of instances with logarithmic weighting. We also investigate the influence of history length and perturbation coefficient on the performance of the proposed algorithms. |
|---|---|
| AbstractList | Identifying critical nodes is an efficient way to analyze and apprehend the properties, structures, and functions of complex networks, which is a challenging NP-hard problem. This paper studies a node-weighted version of the critical node problem (NWCNP) that involves minimization of pairwise connectivity measure of a given node-weighted graph via the removal of a subset of nodes (i.e., critical nodes), subject to a budgetary constraint. In this paper, we present two effective iterated local search algorithms for NWCNP. Our proposed algorithms iterate through two complementary search procedures. A local search procedure adopting a constrained neighborhood and late acceptance strategy is employed to find a local optimum from a given starting solution. Then, a destructive–constructive perturbation procedure is used to escape from a local optimum. We conduct extensive computational experiments with two categories of 32 benchmark instances that reveal our proposed algorithms can achieve the best upper bounds for 28 instances and are highly competitive compared to baseline algorithm. In particular, our algorithms achieved better performance on the first category of instances with random weighting than that on the second category of instances with logarithmic weighting. We also investigate the influence of history length and perturbation coefficient on the performance of the proposed algorithms. |
| ArticleNumber | 106562 |
| Author | Wang, Zhe Zhou, Yangming Jin, Yan Fu, Zhang-Hua |
| Author_xml | – sequence: 1 givenname: Yangming surname: Zhou fullname: Zhou, Yangming organization: Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, 200237 Shanghai, China – sequence: 2 givenname: Zhe surname: Wang fullname: Wang, Zhe organization: Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, 200237 Shanghai, China – sequence: 3 givenname: Yan surname: Jin fullname: Jin, Yan organization: School of Computer Science and Technology, Huazhong University of Science and Technology, 430074 Wuhan, China – sequence: 4 givenname: Zhang-Hua surname: Fu fullname: Fu, Zhang-Hua email: fuzhanghua@cuhk.edu.cn organization: Shenzhen Institute of Artificial Intelligence and Robotics for Society, 518172 Shenzhen, China |
| BookMark | eNqFkMtqIzEQRcWQgdiZ-YMsBFm3U1K_1FkEgskLDNlkdgNCLlXb8jiSI8kJ_vtp01llkawKLnVuUWfKTnzwxNi5gJkA0VxuZv98SIc0kyCPUVM38gebCNXKoq2gO2ET6GooWqjFKZumtAEAKYWasL8Lk4kbRNpl45GKpUlk-Zr20aXskJvtKkSX1y-J9yFyZ8ln1x-cX3Eccodmy32wlHjo-Tu51ToP_Cqa3Tr9Yj97s030-2OesT93t8_zh2LxdP84v1kUWAHkQlqiUtlSKRLt0qAQfSeqCkl2pHCpjILOlFYilB0ag-USmp4AlaoV2kaUZ-xi7N3F8LqnlPUm7KMfTmpZtZ0SdSfksHU1bmEMKUXqNbpssgs-R-O2WoA-2tQbPdrUR5t6tDnA1Sd4F92LiYfvsOsRo-H9N0dRJ3Q0eLYuEmZtg_u64D-QaJT_ |
| CitedBy_id | crossref_primary_10_1287_ijoc_2022_0130 crossref_primary_10_1587_transinf_2021EDP7150 crossref_primary_10_1007_s11227_023_05429_3 crossref_primary_10_1038_s41598_023_30308_5 crossref_primary_10_1109_TCSS_2023_3238042 crossref_primary_10_1016_j_chaos_2024_114485 crossref_primary_10_1109_TASE_2024_3399322 crossref_primary_10_1016_j_ejor_2022_11_039 |
| Cites_doi | 10.1016/j.cor.2012.02.008 10.1007/s10479-016-2110-y 10.1016/j.physa.2019.122862 10.1145/3067695.3075993 10.1007/978-3-030-05983-5_14 10.1002/net.21671 10.1016/j.knosys.2018.01.017 10.1007/978-3-319-77538-8_52 10.1007/978-3-319-17665-9_3 10.1007/s10845-013-0770-x 10.1016/j.ejor.2016.07.012 10.1016/j.knosys.2017.03.028 10.1016/j.cor.2015.11.001 10.1007/s11042-019-07811-x 10.1007/s10589-013-9589-9 10.3390/a13060138 10.1016/j.engappai.2016.06.010 10.1007/s10732-015-9290-5 10.1016/j.cor.2016.08.004 10.1007/978-3-030-41964-6_22 10.1109/TCYB.2018.2848116 10.1007/s10951-016-0469-x 10.1016/j.cor.2011.02.016 10.1145/362248.362272 10.1109/UKCI.2014.6930167 10.1007/s10589-012-9458-y 10.1007/s10951-013-0352-y 10.1016/j.cor.2008.08.016 10.1016/j.ejor.2017.08.053 10.1016/j.cosrev.2018.02.002 10.1007/978-3-030-03991-2_29 10.1007/978-3-319-50127-7_13 |
| ContentType | Journal Article |
| Copyright | 2020 Elsevier B.V. Copyright Elsevier Science Ltd. Jan 9, 2021 |
| Copyright_xml | – notice: 2020 Elsevier B.V. – notice: Copyright Elsevier Science Ltd. Jan 9, 2021 |
| DBID | AAYXX CITATION 7SC 8FD E3H F2A JQ2 L7M L~C L~D |
| DOI | 10.1016/j.knosys.2020.106562 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Library and Information Science Abstracts (LISA) ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-7409 |
| ExternalDocumentID | 10_1016_j_knosys_2020_106562 S0950705120306912 |
| GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5VS 7-5 71M 77K 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABAOU ABBOA ABIVO ABJNI ABMAC ABYKQ ACAZW ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADGUI ADTZH AEBSH AECPX AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ARUGR AXJTR BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EO8 EO9 EP2 EP3 FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ IHE J1W JJJVA KOM LG9 LY7 M41 MHUIS MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 ROL RPZ SDF SDG SDP SES SPC SPCBC SST SSV SSW SSZ T5K WH7 XPP ZMT ~02 ~G- 29L 77I AAQXK AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ABXDB ACLOT ACNNM ACRPL ACVFH ADCNI ADJOM ADMUD ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP ASPBG AVWKF AZFZN CITATION EFKBS EJD FEDTE FGOYB G-2 HLZ HVGLF HZ~ R2- SBC SET SEW UHS WUQ ~HD 7SC 8FD E3H F2A JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c400t-2dee38d388e17bac11f9144ce29e8cb8a809a3d2c039caac3b06fe0c8858cd613 |
| IEDL.DBID | .~1 |
| ISSN | 0950-7051 |
| IngestDate | Sun Oct 05 00:14:48 EDT 2025 Sat Oct 25 05:45:09 EDT 2025 Thu Apr 24 23:08:39 EDT 2025 Fri Feb 23 02:47:19 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Node-weighted graph Critical node problem Combinatorial optimization Metaheuristics Late acceptance strategy |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c400t-2dee38d388e17bac11f9144ce29e8cb8a809a3d2c039caac3b06fe0c8858cd613 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2479815912 |
| PQPubID | 2035257 |
| ParticipantIDs | proquest_journals_2479815912 crossref_citationtrail_10_1016_j_knosys_2020_106562 crossref_primary_10_1016_j_knosys_2020_106562 elsevier_sciencedirect_doi_10_1016_j_knosys_2020_106562 |
| PublicationCentury | 2000 |
| PublicationDate | 2021-01-09 |
| PublicationDateYYYYMMDD | 2021-01-09 |
| PublicationDate_xml | – month: 01 year: 2021 text: 2021-01-09 day: 09 |
| PublicationDecade | 2020 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Knowledge-based systems |
| PublicationYear | 2021 |
| Publisher | Elsevier B.V Elsevier Science Ltd |
| Publisher_xml | – name: Elsevier B.V – name: Elsevier Science Ltd |
| References | Y. Zhou, J.-K. Hao, A fast heuristic algorithm for the critical node problem, in: Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2017, pp. 121–122. Özcan, Bykov, Birben, Eurke (b19) 2009 Verstichel, Berghe (b24) 2009 Summa, Grosso, Locatelli (b6) 2012; 53 Chen, Jiang, Jiang, Zhang (b15) 2020; 538 Abuhamdah (b20) 2010; 10 W.G. Jackson, E. Özcan, R.I. John, Fuzzy adaptive parameter control of a late acceptance hyper-heuristic, in: 14th UK Workshop on Computational Intelligence, UKCI 2014, Bradford, UK, September 8-10, 2014, pp. 1–8. Demšar (b40) 2006; 7 Burke, Bykov (b16) 2008 Zhou, Hao, Duval (b42) 2020 Bengio, Lodi, Prouvost (b41) 2020 Nandi, Medal (b2) 2016; 69 Bykov, Petrovic (b22) 2016; 19 Yuan, Zhang, Shao (b31) 2015; 26 Pullan (b10) 2015; 21 Addis, Aringhieri, Grosso, Hosteins (b9) 2016; 238 Ghosh, Kundu, Ghosh, Sarkar (b35) 2019; 78 Goerler, Lalla-Ruiz, Voss (b27) 2020; 13 Ventresca (b13) 2012; 39 M. Namazi, C. Sanderson, M.A.H. Newton, M.M.A. Polash, A. Sattar, Diversified late acceptance search, in: AI 2018: Advances in Artificial Intelligence - 31st Australasian Joint Conference, Wellington, New Zealand, December 11-14, 2018, Proceedings, pp. 299–311. Ventresca, Aleman (b8) 2014 Alzaqebah, Abdullah (b21) 2014; 17 K. Tierney, Late acceptance hill climbing for the liner shipping fleet repositioning problem, in: Proceedings of the 14th EU/ME Workshop, 2013, pp. 21–27. Hopcroft, Tarjan (b36) 1973; 16 Aringhieri, Grosso, Hosteins, Scatamacchia (b11) 2016; 67 Lourenço, Martin, Stützle (b37) 2019 A. Turky, N.R. Sabar, A. Sattar, A. Song, Parallel late acceptance hill-climbing algorithm for the google machine reassignment problem, in: AI 2016: Advances in Artificial Intelligence - 29th Australasian Joint Conference, Hobart, TAS, Australia, December 5-8, 2016, Proceedings, pp. 163–174. Ventresca, Harrison, Ombuki-Berman (b39) 2018; 265 Bolaji, Bamigbola, Shola (b25) 2018; 145 Hemmati, Smith, Thai (b1) 2014; 57 Zhou, Hao, Glover (b4) 2019; 49 Aringhieri, Grosso, Hosteins, Scatamacchia (b14) 2016; 55 A.L. Bolaji, I. Michael, P.B. Shola, Adaptation of late acceptance hill climbing algorithm for optimizing the office-space allocation problem, in: Hybrid Metaheuristics - 11th International Workshop, HM 2019, Concepción, Chile, January 16-18, 2019, Proceedings, pp. 180–190. M. Bazargani, J.H. Drake, E.K. Burke, Late acceptance hill climbing for constrained covering arrays, in: Applications of Evolutionary Computation - 21st International Conference, EvoApplications 2018, Parma, Italy, April 4-6, 2018, Proceedings, pp. 778–793. M. Terzi, T. Arbaoui, F. Yalaoui, K. Benatchba, Solving the unrelated parallel machine scheduling problem with setups using late acceptance hill climbing, in: Intelligent Information and Database Systems - 12th Asian Conference, ACIIDS 2020, Phuket, Thailand, March 23-26, 2020, Proceedings, Part I, pp. 249–258. Summa, Grosso, Locatelli (b5) 2011; 38 Demirović, Musliu (b23) 2017; 78 Goerler, Schulte, Voß (b28) 2013 Burke, Bykov (b17) 2017; 258 Arulselvan, Commander, Elefteriadou, Pardalos (b7) 2009; 36 Lalou, Tahraoui, Kheddouci (b3) 2018; 28 Zhou, Hao (b38) 2017; 125 10.1016/j.knosys.2020.106562_b29 Summa (10.1016/j.knosys.2020.106562_b5) 2011; 38 Arulselvan (10.1016/j.knosys.2020.106562_b7) 2009; 36 Addis (10.1016/j.knosys.2020.106562_b9) 2016; 238 Burke (10.1016/j.knosys.2020.106562_b16) 2008 Aringhieri (10.1016/j.knosys.2020.106562_b11) 2016; 67 Verstichel (10.1016/j.knosys.2020.106562_b24) 2009 Ventresca (10.1016/j.knosys.2020.106562_b13) 2012; 39 10.1016/j.knosys.2020.106562_b26 Demšar (10.1016/j.knosys.2020.106562_b40) 2006; 7 Goerler (10.1016/j.knosys.2020.106562_b27) 2020; 13 10.1016/j.knosys.2020.106562_b30 Alzaqebah (10.1016/j.knosys.2020.106562_b21) 2014; 17 Lalou (10.1016/j.knosys.2020.106562_b3) 2018; 28 Bolaji (10.1016/j.knosys.2020.106562_b25) 2018; 145 Hemmati (10.1016/j.knosys.2020.106562_b1) 2014; 57 Nandi (10.1016/j.knosys.2020.106562_b2) 2016; 69 Goerler (10.1016/j.knosys.2020.106562_b28) 2013 10.1016/j.knosys.2020.106562_b18 Hopcroft (10.1016/j.knosys.2020.106562_b36) 1973; 16 Bykov (10.1016/j.knosys.2020.106562_b22) 2016; 19 Zhou (10.1016/j.knosys.2020.106562_b38) 2017; 125 Chen (10.1016/j.knosys.2020.106562_b15) 2020; 538 Özcan (10.1016/j.knosys.2020.106562_b19) 2009 Ventresca (10.1016/j.knosys.2020.106562_b8) 2014 Demirović (10.1016/j.knosys.2020.106562_b23) 2017; 78 Yuan (10.1016/j.knosys.2020.106562_b31) 2015; 26 Ventresca (10.1016/j.knosys.2020.106562_b39) 2018; 265 10.1016/j.knosys.2020.106562_b32 Pullan (10.1016/j.knosys.2020.106562_b10) 2015; 21 10.1016/j.knosys.2020.106562_b12 10.1016/j.knosys.2020.106562_b34 Abuhamdah (10.1016/j.knosys.2020.106562_b20) 2010; 10 10.1016/j.knosys.2020.106562_b33 Burke (10.1016/j.knosys.2020.106562_b17) 2017; 258 Aringhieri (10.1016/j.knosys.2020.106562_b14) 2016; 55 Lourenço (10.1016/j.knosys.2020.106562_b37) 2019 Zhou (10.1016/j.knosys.2020.106562_b4) 2019; 49 Summa (10.1016/j.knosys.2020.106562_b6) 2012; 53 Ghosh (10.1016/j.knosys.2020.106562_b35) 2019; 78 Zhou (10.1016/j.knosys.2020.106562_b42) 2020 Bengio (10.1016/j.knosys.2020.106562_b41) 2020 |
| References_xml | – reference: M. Namazi, C. Sanderson, M.A.H. Newton, M.M.A. Polash, A. Sattar, Diversified late acceptance search, in: AI 2018: Advances in Artificial Intelligence - 31st Australasian Joint Conference, Wellington, New Zealand, December 11-14, 2018, Proceedings, pp. 299–311. – reference: W.G. Jackson, E. Özcan, R.I. John, Fuzzy adaptive parameter control of a late acceptance hyper-heuristic, in: 14th UK Workshop on Computational Intelligence, UKCI 2014, Bradford, UK, September 8-10, 2014, pp. 1–8. – volume: 10 start-page: 192 year: 2010 end-page: 200 ident: b20 article-title: Experimental result of late acceptance randomized descent algorithm for solving course timetabling problems publication-title: Int. J. Comput. Sci. Netw. Secur. – year: 2020 ident: b41 article-title: Machine learning for combinatorial optimization: a methodological tour d’horizon publication-title: European J. Oper. Res. – reference: K. Tierney, Late acceptance hill climbing for the liner shipping fleet repositioning problem, in: Proceedings of the 14th EU/ME Workshop, 2013, pp. 21–27. – reference: A. Turky, N.R. Sabar, A. Sattar, A. Song, Parallel late acceptance hill-climbing algorithm for the google machine reassignment problem, in: AI 2016: Advances in Artificial Intelligence - 29th Australasian Joint Conference, Hobart, TAS, Australia, December 5-8, 2016, Proceedings, pp. 163–174. – volume: 17 start-page: 249 year: 2014 end-page: 262 ident: b21 article-title: An adaptive artificial bee colony and late-acceptance hill-climbing algorithm for examination timetabling publication-title: J. Sched. – volume: 258 start-page: 70 year: 2017 end-page: 78 ident: b17 article-title: The late acceptance hill-climbing heuristic publication-title: European J. Oper. Res. – start-page: 603 year: 2014 end-page: 612 ident: b8 article-title: A fast greedy algorithm for the critical node detection problem publication-title: International Conference on Combinatorial Optimization and Applications – year: 2020 ident: b42 article-title: Frequent pattern based search: A case study on the quadratic assignment problem publication-title: IEEE Trans. Syst., Man, Cybernet.: Syst. – volume: 49 start-page: 3699 year: 2019 end-page: 3712 ident: b4 article-title: Memetic search for identifying critical nodes in sparse graphs publication-title: IEEE Trans. Cybernet. – volume: 57 start-page: 71 year: 2014 end-page: 104 ident: b1 article-title: A cutting-plane algorithm for solving a weighted influence interdiction problem publication-title: Comput. Optim. Appl. – volume: 238 start-page: 637 year: 2016 end-page: 649 ident: b9 article-title: Hybrid constructive heuristics for the critical node problem publication-title: Ann. Oper. Res. – volume: 26 start-page: 159 year: 2015 end-page: 168 ident: b31 article-title: A late acceptance hill-climbing algorithm for balancing two-sided assembly lines with multiple constraints publication-title: J. Intell. Manuf. – reference: A.L. Bolaji, I. Michael, P.B. Shola, Adaptation of late acceptance hill climbing algorithm for optimizing the office-space allocation problem, in: Hybrid Metaheuristics - 11th International Workshop, HM 2019, Concepción, Chile, January 16-18, 2019, Proceedings, pp. 180–190. – start-page: 457 year: 2009 end-page: 478 ident: b24 article-title: A late acceptance algorithm for the lock scheduling problem publication-title: Logistik Management – volume: 38 start-page: 1766 year: 2011 end-page: 1774 ident: b5 article-title: Complexity of the critical node problem over trees publication-title: Comput. Oper. Res. – volume: 67 start-page: 209 year: 2016 end-page: 221 ident: b11 article-title: Local search metaheuristics for the critical node problem publication-title: Networks – volume: 145 start-page: 197 year: 2018 end-page: 206 ident: b25 article-title: Late acceptance hill climbing algorithm for solving patient admission scheduling problem publication-title: Knowl.-Based Syst. – reference: Y. Zhou, J.-K. Hao, A fast heuristic algorithm for the critical node problem, in: Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2017, pp. 121–122. – volume: 538 year: 2020 ident: b15 article-title: Critical node detection problem for complex network in undirected weighted networks publication-title: Physica A – reference: M. Bazargani, J.H. Drake, E.K. Burke, Late acceptance hill climbing for constrained covering arrays, in: Applications of Evolutionary Computation - 21st International Conference, EvoApplications 2018, Parma, Italy, April 4-6, 2018, Proceedings, pp. 778–793. – volume: 16 start-page: 372 year: 1973 end-page: 378 ident: b36 article-title: Algorithm 447: efficient algorithms for graph manipulation publication-title: Commun. ACM – volume: 125 start-page: 26 year: 2017 end-page: 38 ident: b38 article-title: An iterated local search algorithm for the minimum differential dispersion problem publication-title: Knowl.-Based Syst. – volume: 265 start-page: 895 year: 2018 end-page: 908 ident: b39 article-title: The bi-objective critical node detection problem publication-title: European J. Oper. Res. – start-page: 1 year: 2008 end-page: 7 ident: b16 article-title: A late acceptance strategy in hill-climbing for examination timetabling problems publication-title: Conference on the Practice and Theory of Automated Timetabling – volume: 13 start-page: 138 year: 2020 ident: b27 article-title: Late acceptance hill-climbing matheuristic for the general lot sizing and scheduling problem with rich constraints publication-title: Algorithms – volume: 28 start-page: 92 year: 2018 end-page: 117 ident: b3 article-title: The critical node detection problem in networks: A survey publication-title: Comp. Sci. Rev. – volume: 69 start-page: 10 year: 2016 end-page: 24 ident: b2 article-title: Methods for removing links in a network to minimize the spread of infections publication-title: Comput. Oper. Res. – volume: 39 start-page: 2763 year: 2012 end-page: 2775 ident: b13 article-title: Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem publication-title: Comput. Oper. Res. – volume: 53 start-page: 649 year: 2012 end-page: 680 ident: b6 article-title: Branch and cut algorithms for detecting critical nodes in undirected graphs publication-title: Comput. Optim. Appl. – reference: M. Terzi, T. Arbaoui, F. Yalaoui, K. Benatchba, Solving the unrelated parallel machine scheduling problem with setups using late acceptance hill climbing, in: Intelligent Information and Database Systems - 12th Asian Conference, ACIIDS 2020, Phuket, Thailand, March 23-26, 2020, Proceedings, Part I, pp. 249–258. – volume: 36 start-page: 2193 year: 2009 end-page: 2200 ident: b7 article-title: Detecting critical nodes in sparse graphs publication-title: Comput. Oper. Res. – start-page: 997 year: 2009 end-page: 1004 ident: b19 article-title: Examination timetabling using late acceptance hyper-heuristics publication-title: 2009 IEEE Congress on Evolutionary Computation – volume: 19 start-page: 479 year: 2016 end-page: 492 ident: b22 article-title: A step counting hill climbing algorithm applied to university examination timetabling publication-title: J. Sched. – volume: 78 start-page: 25753 year: 2019 end-page: 25779 ident: b35 article-title: Feature selection for facial emotion recognition using late hill-climbing based memetic algorithm publication-title: Multimedia Tools Appl. – volume: 78 start-page: 172 year: 2017 end-page: 180 ident: b23 article-title: Maxsat-based large neighborhood search for high school timetabling publication-title: Comput. Oper. Res. – start-page: 173 year: 2013 end-page: 183 ident: b28 article-title: An application of late acceptance hill-climbing to the traveling purchaser problem publication-title: International Conference on Computational Logistics – start-page: 129 year: 2019 end-page: 168 ident: b37 article-title: Iterated local search: Framework and applications publication-title: Handbook of Metaheuristics – volume: 21 start-page: 577 year: 2015 end-page: 598 ident: b10 article-title: Heuristic identification of critical nodes in sparse real-world graphs publication-title: J. Heuristics – volume: 55 start-page: 128 year: 2016 end-page: 145 ident: b14 article-title: A general evolutionary framework for different classes of critical node problems publication-title: Eng. Appl. Artif. Intell. – volume: 7 start-page: 1 year: 2006 end-page: 30 ident: b40 article-title: Statistical comparisons of classifiers over multiple data sets publication-title: J. Mach. Learn. Res. – volume: 39 start-page: 2763 issue: 11 year: 2012 ident: 10.1016/j.knosys.2020.106562_b13 article-title: Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem publication-title: Comput. Oper. Res. doi: 10.1016/j.cor.2012.02.008 – volume: 238 start-page: 637 issue: 1–2 year: 2016 ident: 10.1016/j.knosys.2020.106562_b9 article-title: Hybrid constructive heuristics for the critical node problem publication-title: Ann. Oper. Res. doi: 10.1007/s10479-016-2110-y – volume: 538 year: 2020 ident: 10.1016/j.knosys.2020.106562_b15 article-title: Critical node detection problem for complex network in undirected weighted networks publication-title: Physica A doi: 10.1016/j.physa.2019.122862 – start-page: 1 year: 2008 ident: 10.1016/j.knosys.2020.106562_b16 article-title: A late acceptance strategy in hill-climbing for examination timetabling problems – ident: 10.1016/j.knosys.2020.106562_b12 doi: 10.1145/3067695.3075993 – ident: 10.1016/j.knosys.2020.106562_b34 doi: 10.1007/978-3-030-05983-5_14 – volume: 67 start-page: 209 issue: 3 year: 2016 ident: 10.1016/j.knosys.2020.106562_b11 article-title: Local search metaheuristics for the critical node problem publication-title: Networks doi: 10.1002/net.21671 – start-page: 997 year: 2009 ident: 10.1016/j.knosys.2020.106562_b19 article-title: Examination timetabling using late acceptance hyper-heuristics – volume: 145 start-page: 197 year: 2018 ident: 10.1016/j.knosys.2020.106562_b25 article-title: Late acceptance hill climbing algorithm for solving patient admission scheduling problem publication-title: Knowl.-Based Syst. doi: 10.1016/j.knosys.2018.01.017 – ident: 10.1016/j.knosys.2020.106562_b33 doi: 10.1007/978-3-319-77538-8_52 – ident: 10.1016/j.knosys.2020.106562_b29 doi: 10.1007/978-3-319-17665-9_3 – volume: 26 start-page: 159 issue: 1 year: 2015 ident: 10.1016/j.knosys.2020.106562_b31 article-title: A late acceptance hill-climbing algorithm for balancing two-sided assembly lines with multiple constraints publication-title: J. Intell. Manuf. doi: 10.1007/s10845-013-0770-x – year: 2020 ident: 10.1016/j.knosys.2020.106562_b42 article-title: Frequent pattern based search: A case study on the quadratic assignment problem publication-title: IEEE Trans. Syst., Man, Cybernet.: Syst. – volume: 258 start-page: 70 issue: 1 year: 2017 ident: 10.1016/j.knosys.2020.106562_b17 article-title: The late acceptance hill-climbing heuristic publication-title: European J. Oper. Res. doi: 10.1016/j.ejor.2016.07.012 – volume: 125 start-page: 26 year: 2017 ident: 10.1016/j.knosys.2020.106562_b38 article-title: An iterated local search algorithm for the minimum differential dispersion problem publication-title: Knowl.-Based Syst. doi: 10.1016/j.knosys.2017.03.028 – volume: 69 start-page: 10 year: 2016 ident: 10.1016/j.knosys.2020.106562_b2 article-title: Methods for removing links in a network to minimize the spread of infections publication-title: Comput. Oper. Res. doi: 10.1016/j.cor.2015.11.001 – volume: 78 start-page: 25753 issue: 18 year: 2019 ident: 10.1016/j.knosys.2020.106562_b35 article-title: Feature selection for facial emotion recognition using late hill-climbing based memetic algorithm publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-019-07811-x – volume: 57 start-page: 71 issue: 1 year: 2014 ident: 10.1016/j.knosys.2020.106562_b1 article-title: A cutting-plane algorithm for solving a weighted influence interdiction problem publication-title: Comput. Optim. Appl. doi: 10.1007/s10589-013-9589-9 – start-page: 173 year: 2013 ident: 10.1016/j.knosys.2020.106562_b28 article-title: An application of late acceptance hill-climbing to the traveling purchaser problem – volume: 13 start-page: 138 issue: 6 year: 2020 ident: 10.1016/j.knosys.2020.106562_b27 article-title: Late acceptance hill-climbing matheuristic for the general lot sizing and scheduling problem with rich constraints publication-title: Algorithms doi: 10.3390/a13060138 – volume: 55 start-page: 128 year: 2016 ident: 10.1016/j.knosys.2020.106562_b14 article-title: A general evolutionary framework for different classes of critical node problems publication-title: Eng. Appl. Artif. Intell. doi: 10.1016/j.engappai.2016.06.010 – start-page: 603 year: 2014 ident: 10.1016/j.knosys.2020.106562_b8 article-title: A fast greedy algorithm for the critical node detection problem – volume: 21 start-page: 577 issue: 5 year: 2015 ident: 10.1016/j.knosys.2020.106562_b10 article-title: Heuristic identification of critical nodes in sparse real-world graphs publication-title: J. Heuristics doi: 10.1007/s10732-015-9290-5 – volume: 78 start-page: 172 year: 2017 ident: 10.1016/j.knosys.2020.106562_b23 article-title: Maxsat-based large neighborhood search for high school timetabling publication-title: Comput. Oper. Res. doi: 10.1016/j.cor.2016.08.004 – volume: 10 start-page: 192 issue: 1 year: 2010 ident: 10.1016/j.knosys.2020.106562_b20 article-title: Experimental result of late acceptance randomized descent algorithm for solving course timetabling problems publication-title: Int. J. Comput. Sci. Netw. Secur. – start-page: 457 year: 2009 ident: 10.1016/j.knosys.2020.106562_b24 article-title: A late acceptance algorithm for the lock scheduling problem – ident: 10.1016/j.knosys.2020.106562_b26 doi: 10.1007/978-3-030-41964-6_22 – volume: 49 start-page: 3699 issue: 10 year: 2019 ident: 10.1016/j.knosys.2020.106562_b4 article-title: Memetic search for identifying critical nodes in sparse graphs publication-title: IEEE Trans. Cybernet. doi: 10.1109/TCYB.2018.2848116 – volume: 19 start-page: 479 issue: 4 year: 2016 ident: 10.1016/j.knosys.2020.106562_b22 article-title: A step counting hill climbing algorithm applied to university examination timetabling publication-title: J. Sched. doi: 10.1007/s10951-016-0469-x – volume: 38 start-page: 1766 issue: 12 year: 2011 ident: 10.1016/j.knosys.2020.106562_b5 article-title: Complexity of the critical node problem over trees publication-title: Comput. Oper. Res. doi: 10.1016/j.cor.2011.02.016 – volume: 16 start-page: 372 issue: 6 year: 1973 ident: 10.1016/j.knosys.2020.106562_b36 article-title: Algorithm 447: efficient algorithms for graph manipulation publication-title: Commun. ACM doi: 10.1145/362248.362272 – ident: 10.1016/j.knosys.2020.106562_b30 doi: 10.1109/UKCI.2014.6930167 – volume: 53 start-page: 649 issue: 3 year: 2012 ident: 10.1016/j.knosys.2020.106562_b6 article-title: Branch and cut algorithms for detecting critical nodes in undirected graphs publication-title: Comput. Optim. Appl. doi: 10.1007/s10589-012-9458-y – year: 2020 ident: 10.1016/j.knosys.2020.106562_b41 article-title: Machine learning for combinatorial optimization: a methodological tour d’horizon publication-title: European J. Oper. Res. – volume: 17 start-page: 249 issue: 3 year: 2014 ident: 10.1016/j.knosys.2020.106562_b21 article-title: An adaptive artificial bee colony and late-acceptance hill-climbing algorithm for examination timetabling publication-title: J. Sched. doi: 10.1007/s10951-013-0352-y – volume: 36 start-page: 2193 issue: 7 year: 2009 ident: 10.1016/j.knosys.2020.106562_b7 article-title: Detecting critical nodes in sparse graphs publication-title: Comput. Oper. Res. doi: 10.1016/j.cor.2008.08.016 – volume: 265 start-page: 895 issue: 3 year: 2018 ident: 10.1016/j.knosys.2020.106562_b39 article-title: The bi-objective critical node detection problem publication-title: European J. Oper. Res. doi: 10.1016/j.ejor.2017.08.053 – volume: 7 start-page: 1 issue: Jan year: 2006 ident: 10.1016/j.knosys.2020.106562_b40 article-title: Statistical comparisons of classifiers over multiple data sets publication-title: J. Mach. Learn. Res. – volume: 28 start-page: 92 year: 2018 ident: 10.1016/j.knosys.2020.106562_b3 article-title: The critical node detection problem in networks: A survey publication-title: Comp. Sci. Rev. doi: 10.1016/j.cosrev.2018.02.002 – ident: 10.1016/j.knosys.2020.106562_b18 doi: 10.1007/978-3-030-03991-2_29 – ident: 10.1016/j.knosys.2020.106562_b32 doi: 10.1007/978-3-319-50127-7_13 – start-page: 129 year: 2019 ident: 10.1016/j.knosys.2020.106562_b37 article-title: Iterated local search: Framework and applications |
| SSID | ssj0002218 |
| Score | 2.371292 |
| Snippet | Identifying critical nodes is an efficient way to analyze and apprehend the properties, structures, and functions of complex networks, which is a challenging... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 106562 |
| SubjectTerms | Algorithms Combinatorial optimization Constraints Critical node problem Graph theory Late acceptance strategy Metaheuristics Node-weighted graph Nodes Optimization Perturbation Search algorithms Upper bounds Weighting |
| Title | Late acceptance-based heuristic algorithms for identifying critical nodes of weighted graphs |
| URI | https://dx.doi.org/10.1016/j.knosys.2020.106562 https://www.proquest.com/docview/2479815912 |
| Volume | 211 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1872-7409 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002218 issn: 0950-7051 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] customDbUrl: eissn: 1872-7409 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002218 issn: 0950-7051 databaseCode: ACRLP dateStart: 19950201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals [SCFCJ] customDbUrl: eissn: 1872-7409 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002218 issn: 0950-7051 databaseCode: AIKHN dateStart: 19950201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Science Direct customDbUrl: eissn: 1872-7409 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002218 issn: 0950-7051 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1872-7409 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002218 issn: 0950-7051 databaseCode: AKRWK dateStart: 19871201 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA6lXrz4Fqu15OA1tptsu8mxFEt90IsWehCWbJK11bpb-kC8-NudZLOKghS8ZpOwzGTm-xLmgdCFhHu0MGGHGNNJSKiVJJJqCnaVslRIGTLtqn0OO4NReDNujyuoV-bC2LBK7_sLn-68tR9pemk259Np8x7IAZxXACxLe4XrNByGke1icPnxHeZBqXvjs5OJnV2mz7kYr5csX77bot3UDgG1oX_B0y9H7dCnv4d2PG3E3eLP9lHFZAdot2zJgL2FHqLHO-COWCobrGL1SSxKaTwx66IiM5azp3wxXU1elxjoKp66PF2X64SV73qAs1ybJc5T_ObeTWG9K2u9PEKj_tVDb0B8AwWiwDRXhGpjGNeMcxNEiVRBkAq4QClDheEq4ZK3hGSaqhYTSkrFklYnNS3FeZsrDUB_jKpZnpkThFlbw80oUloaEfJEy1SrVLaZBXmRJkENsVJusfLVxW2Ti1lchpE9x4W0YyvtuJB2DZGvVfOiusaG-VGpkvjHKYkBADasrJcajL2VwvcwEhz4XEBP_73xGdqmNszFvsqIOqquFmtzDjxllTTcQWygre717WD4Cdo-6uA |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA-iB734LU6n5uA1bk3aNTnKUKbOXZzgQQhpkup0tsNNxIt_uy9pqiiI4DVNQnnJe7_fC-8DoUMFfrSwcYdY28lIbLQiihoKepWzXCgVM-OrfQ46vev4_Ca5mUPdOhfGhVUG21_ZdG-tw0grSLM1GY1aV0AO4L4CYDnaK1yn4YU4oanzwI7ev-I8KPWPfG42cdPr_Dkf5PVYlNM3V7WbuiHgNvQ3fPphqT38nK6i5cAb8XH1a2tozhbraKXuyYCDim6g2z6QR6y0i1ZxB0ocTBl8b1-qksxYje_K59Hs_mmKga_ikU_U9clOWIe2B7gojZ3iMsev_uEU1vu61tNNdH16Muz2SOigQDTo5oxQYy3jhnFuozRTOopyAR6UtlRYrjOueFsoZqhuM6GV0ixrd3Lb1pwnXBtA-i00X5SF3UaYJQZco1QbZUXMM6Nyo3OVMIfyIs-iBmK13KQO5cVdl4uxrOPIHmQlbemkLStpNxD5XDWpymv8MT-tj0R-uyYSEOCPlc36BGVQU_gep4IDoYvozr83PkCLveFlX_bPBhe7aIm6mBf3RCOaaH72_GL3gLTMsn1_KT8AVLDsdQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Late+acceptance-based+heuristic+algorithms+for+identifying+critical+nodes+of+weighted+graphs&rft.jtitle=Knowledge-based+systems&rft.au=Zhou%2C+Yangming&rft.au=Wang%2C+Zhe&rft.au=Jin%2C+Yan&rft.au=Fu%2C+Zhang-Hua&rft.date=2021-01-09&rft.issn=0950-7051&rft.volume=211&rft.spage=106562&rft_id=info:doi/10.1016%2Fj.knosys.2020.106562&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_knosys_2020_106562 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0950-7051&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0950-7051&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0950-7051&client=summon |