Late acceptance-based heuristic algorithms for identifying critical nodes of weighted graphs

Identifying critical nodes is an efficient way to analyze and apprehend the properties, structures, and functions of complex networks, which is a challenging NP-hard problem. This paper studies a node-weighted version of the critical node problem (NWCNP) that involves minimization of pairwise connec...

Full description

Saved in:
Bibliographic Details
Published inKnowledge-based systems Vol. 211; p. 106562
Main Authors Zhou, Yangming, Wang, Zhe, Jin, Yan, Fu, Zhang-Hua
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier B.V 09.01.2021
Elsevier Science Ltd
Subjects
Online AccessGet full text
ISSN0950-7051
1872-7409
DOI10.1016/j.knosys.2020.106562

Cover

Abstract Identifying critical nodes is an efficient way to analyze and apprehend the properties, structures, and functions of complex networks, which is a challenging NP-hard problem. This paper studies a node-weighted version of the critical node problem (NWCNP) that involves minimization of pairwise connectivity measure of a given node-weighted graph via the removal of a subset of nodes (i.e., critical nodes), subject to a budgetary constraint. In this paper, we present two effective iterated local search algorithms for NWCNP. Our proposed algorithms iterate through two complementary search procedures. A local search procedure adopting a constrained neighborhood and late acceptance strategy is employed to find a local optimum from a given starting solution. Then, a destructive–constructive perturbation procedure is used to escape from a local optimum. We conduct extensive computational experiments with two categories of 32 benchmark instances that reveal our proposed algorithms can achieve the best upper bounds for 28 instances and are highly competitive compared to baseline algorithm. In particular, our algorithms achieved better performance on the first category of instances with random weighting than that on the second category of instances with logarithmic weighting. We also investigate the influence of history length and perturbation coefficient on the performance of the proposed algorithms.
AbstractList Identifying critical nodes is an efficient way to analyze and apprehend the properties, structures, and functions of complex networks, which is a challenging NP-hard problem. This paper studies a node-weighted version of the critical node problem (NWCNP) that involves minimization of pairwise connectivity measure of a given node-weighted graph via the removal of a subset of nodes (i.e., critical nodes), subject to a budgetary constraint. In this paper, we present two effective iterated local search algorithms for NWCNP. Our proposed algorithms iterate through two complementary search procedures. A local search procedure adopting a constrained neighborhood and late acceptance strategy is employed to find a local optimum from a given starting solution. Then, a destructive–constructive perturbation procedure is used to escape from a local optimum. We conduct extensive computational experiments with two categories of 32 benchmark instances that reveal our proposed algorithms can achieve the best upper bounds for 28 instances and are highly competitive compared to baseline algorithm. In particular, our algorithms achieved better performance on the first category of instances with random weighting than that on the second category of instances with logarithmic weighting. We also investigate the influence of history length and perturbation coefficient on the performance of the proposed algorithms.
ArticleNumber 106562
Author Wang, Zhe
Zhou, Yangming
Jin, Yan
Fu, Zhang-Hua
Author_xml – sequence: 1
  givenname: Yangming
  surname: Zhou
  fullname: Zhou, Yangming
  organization: Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, 200237 Shanghai, China
– sequence: 2
  givenname: Zhe
  surname: Wang
  fullname: Wang, Zhe
  organization: Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, 200237 Shanghai, China
– sequence: 3
  givenname: Yan
  surname: Jin
  fullname: Jin, Yan
  organization: School of Computer Science and Technology, Huazhong University of Science and Technology, 430074 Wuhan, China
– sequence: 4
  givenname: Zhang-Hua
  surname: Fu
  fullname: Fu, Zhang-Hua
  email: fuzhanghua@cuhk.edu.cn
  organization: Shenzhen Institute of Artificial Intelligence and Robotics for Society, 518172 Shenzhen, China
BookMark eNqFkMtqIzEQRcWQgdiZ-YMsBFm3U1K_1FkEgskLDNlkdgNCLlXb8jiSI8kJ_vtp01llkawKLnVuUWfKTnzwxNi5gJkA0VxuZv98SIc0kyCPUVM38gebCNXKoq2gO2ET6GooWqjFKZumtAEAKYWasL8Lk4kbRNpl45GKpUlk-Zr20aXskJvtKkSX1y-J9yFyZ8ln1x-cX3Eccodmy32wlHjo-Tu51ToP_Cqa3Tr9Yj97s030-2OesT93t8_zh2LxdP84v1kUWAHkQlqiUtlSKRLt0qAQfSeqCkl2pHCpjILOlFYilB0ag-USmp4AlaoV2kaUZ-xi7N3F8LqnlPUm7KMfTmpZtZ0SdSfksHU1bmEMKUXqNbpssgs-R-O2WoA-2tQbPdrUR5t6tDnA1Sd4F92LiYfvsOsRo-H9N0dRJ3Q0eLYuEmZtg_u64D-QaJT_
CitedBy_id crossref_primary_10_1287_ijoc_2022_0130
crossref_primary_10_1587_transinf_2021EDP7150
crossref_primary_10_1007_s11227_023_05429_3
crossref_primary_10_1038_s41598_023_30308_5
crossref_primary_10_1109_TCSS_2023_3238042
crossref_primary_10_1016_j_chaos_2024_114485
crossref_primary_10_1109_TASE_2024_3399322
crossref_primary_10_1016_j_ejor_2022_11_039
Cites_doi 10.1016/j.cor.2012.02.008
10.1007/s10479-016-2110-y
10.1016/j.physa.2019.122862
10.1145/3067695.3075993
10.1007/978-3-030-05983-5_14
10.1002/net.21671
10.1016/j.knosys.2018.01.017
10.1007/978-3-319-77538-8_52
10.1007/978-3-319-17665-9_3
10.1007/s10845-013-0770-x
10.1016/j.ejor.2016.07.012
10.1016/j.knosys.2017.03.028
10.1016/j.cor.2015.11.001
10.1007/s11042-019-07811-x
10.1007/s10589-013-9589-9
10.3390/a13060138
10.1016/j.engappai.2016.06.010
10.1007/s10732-015-9290-5
10.1016/j.cor.2016.08.004
10.1007/978-3-030-41964-6_22
10.1109/TCYB.2018.2848116
10.1007/s10951-016-0469-x
10.1016/j.cor.2011.02.016
10.1145/362248.362272
10.1109/UKCI.2014.6930167
10.1007/s10589-012-9458-y
10.1007/s10951-013-0352-y
10.1016/j.cor.2008.08.016
10.1016/j.ejor.2017.08.053
10.1016/j.cosrev.2018.02.002
10.1007/978-3-030-03991-2_29
10.1007/978-3-319-50127-7_13
ContentType Journal Article
Copyright 2020 Elsevier B.V.
Copyright Elsevier Science Ltd. Jan 9, 2021
Copyright_xml – notice: 2020 Elsevier B.V.
– notice: Copyright Elsevier Science Ltd. Jan 9, 2021
DBID AAYXX
CITATION
7SC
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
DOI 10.1016/j.knosys.2020.106562
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Library and Information Science Abstracts (LISA)
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-7409
ExternalDocumentID 10_1016_j_knosys_2020_106562
S0950705120306912
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5VS
7-5
71M
77K
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABAOU
ABBOA
ABIVO
ABJNI
ABMAC
ABYKQ
ACAZW
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADGUI
ADTZH
AEBSH
AECPX
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ARUGR
AXJTR
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EO8
EO9
EP2
EP3
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
IHE
J1W
JJJVA
KOM
LG9
LY7
M41
MHUIS
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
ROL
RPZ
SDF
SDG
SDP
SES
SPC
SPCBC
SST
SSV
SSW
SSZ
T5K
WH7
XPP
ZMT
~02
~G-
29L
77I
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ABXDB
ACLOT
ACNNM
ACRPL
ACVFH
ADCNI
ADJOM
ADMUD
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
CITATION
EFKBS
EJD
FEDTE
FGOYB
G-2
HLZ
HVGLF
HZ~
R2-
SBC
SET
SEW
UHS
WUQ
~HD
7SC
8FD
E3H
F2A
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c400t-2dee38d388e17bac11f9144ce29e8cb8a809a3d2c039caac3b06fe0c8858cd613
IEDL.DBID .~1
ISSN 0950-7051
IngestDate Sun Oct 05 00:14:48 EDT 2025
Sat Oct 25 05:45:09 EDT 2025
Thu Apr 24 23:08:39 EDT 2025
Fri Feb 23 02:47:19 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Node-weighted graph
Critical node problem
Combinatorial optimization
Metaheuristics
Late acceptance strategy
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c400t-2dee38d388e17bac11f9144ce29e8cb8a809a3d2c039caac3b06fe0c8858cd613
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2479815912
PQPubID 2035257
ParticipantIDs proquest_journals_2479815912
crossref_citationtrail_10_1016_j_knosys_2020_106562
crossref_primary_10_1016_j_knosys_2020_106562
elsevier_sciencedirect_doi_10_1016_j_knosys_2020_106562
PublicationCentury 2000
PublicationDate 2021-01-09
PublicationDateYYYYMMDD 2021-01-09
PublicationDate_xml – month: 01
  year: 2021
  text: 2021-01-09
  day: 09
PublicationDecade 2020
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Knowledge-based systems
PublicationYear 2021
Publisher Elsevier B.V
Elsevier Science Ltd
Publisher_xml – name: Elsevier B.V
– name: Elsevier Science Ltd
References Y. Zhou, J.-K. Hao, A fast heuristic algorithm for the critical node problem, in: Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2017, pp. 121–122.
Özcan, Bykov, Birben, Eurke (b19) 2009
Verstichel, Berghe (b24) 2009
Summa, Grosso, Locatelli (b6) 2012; 53
Chen, Jiang, Jiang, Zhang (b15) 2020; 538
Abuhamdah (b20) 2010; 10
W.G. Jackson, E. Özcan, R.I. John, Fuzzy adaptive parameter control of a late acceptance hyper-heuristic, in: 14th UK Workshop on Computational Intelligence, UKCI 2014, Bradford, UK, September 8-10, 2014, pp. 1–8.
Demšar (b40) 2006; 7
Burke, Bykov (b16) 2008
Zhou, Hao, Duval (b42) 2020
Bengio, Lodi, Prouvost (b41) 2020
Nandi, Medal (b2) 2016; 69
Bykov, Petrovic (b22) 2016; 19
Yuan, Zhang, Shao (b31) 2015; 26
Pullan (b10) 2015; 21
Addis, Aringhieri, Grosso, Hosteins (b9) 2016; 238
Ghosh, Kundu, Ghosh, Sarkar (b35) 2019; 78
Goerler, Lalla-Ruiz, Voss (b27) 2020; 13
Ventresca (b13) 2012; 39
M. Namazi, C. Sanderson, M.A.H. Newton, M.M.A. Polash, A. Sattar, Diversified late acceptance search, in: AI 2018: Advances in Artificial Intelligence - 31st Australasian Joint Conference, Wellington, New Zealand, December 11-14, 2018, Proceedings, pp. 299–311.
Ventresca, Aleman (b8) 2014
Alzaqebah, Abdullah (b21) 2014; 17
K. Tierney, Late acceptance hill climbing for the liner shipping fleet repositioning problem, in: Proceedings of the 14th EU/ME Workshop, 2013, pp. 21–27.
Hopcroft, Tarjan (b36) 1973; 16
Aringhieri, Grosso, Hosteins, Scatamacchia (b11) 2016; 67
Lourenço, Martin, Stützle (b37) 2019
A. Turky, N.R. Sabar, A. Sattar, A. Song, Parallel late acceptance hill-climbing algorithm for the google machine reassignment problem, in: AI 2016: Advances in Artificial Intelligence - 29th Australasian Joint Conference, Hobart, TAS, Australia, December 5-8, 2016, Proceedings, pp. 163–174.
Ventresca, Harrison, Ombuki-Berman (b39) 2018; 265
Bolaji, Bamigbola, Shola (b25) 2018; 145
Hemmati, Smith, Thai (b1) 2014; 57
Zhou, Hao, Glover (b4) 2019; 49
Aringhieri, Grosso, Hosteins, Scatamacchia (b14) 2016; 55
A.L. Bolaji, I. Michael, P.B. Shola, Adaptation of late acceptance hill climbing algorithm for optimizing the office-space allocation problem, in: Hybrid Metaheuristics - 11th International Workshop, HM 2019, Concepción, Chile, January 16-18, 2019, Proceedings, pp. 180–190.
M. Bazargani, J.H. Drake, E.K. Burke, Late acceptance hill climbing for constrained covering arrays, in: Applications of Evolutionary Computation - 21st International Conference, EvoApplications 2018, Parma, Italy, April 4-6, 2018, Proceedings, pp. 778–793.
M. Terzi, T. Arbaoui, F. Yalaoui, K. Benatchba, Solving the unrelated parallel machine scheduling problem with setups using late acceptance hill climbing, in: Intelligent Information and Database Systems - 12th Asian Conference, ACIIDS 2020, Phuket, Thailand, March 23-26, 2020, Proceedings, Part I, pp. 249–258.
Summa, Grosso, Locatelli (b5) 2011; 38
Demirović, Musliu (b23) 2017; 78
Goerler, Schulte, Voß (b28) 2013
Burke, Bykov (b17) 2017; 258
Arulselvan, Commander, Elefteriadou, Pardalos (b7) 2009; 36
Lalou, Tahraoui, Kheddouci (b3) 2018; 28
Zhou, Hao (b38) 2017; 125
10.1016/j.knosys.2020.106562_b29
Summa (10.1016/j.knosys.2020.106562_b5) 2011; 38
Arulselvan (10.1016/j.knosys.2020.106562_b7) 2009; 36
Addis (10.1016/j.knosys.2020.106562_b9) 2016; 238
Burke (10.1016/j.knosys.2020.106562_b16) 2008
Aringhieri (10.1016/j.knosys.2020.106562_b11) 2016; 67
Verstichel (10.1016/j.knosys.2020.106562_b24) 2009
Ventresca (10.1016/j.knosys.2020.106562_b13) 2012; 39
10.1016/j.knosys.2020.106562_b26
Demšar (10.1016/j.knosys.2020.106562_b40) 2006; 7
Goerler (10.1016/j.knosys.2020.106562_b27) 2020; 13
10.1016/j.knosys.2020.106562_b30
Alzaqebah (10.1016/j.knosys.2020.106562_b21) 2014; 17
Lalou (10.1016/j.knosys.2020.106562_b3) 2018; 28
Bolaji (10.1016/j.knosys.2020.106562_b25) 2018; 145
Hemmati (10.1016/j.knosys.2020.106562_b1) 2014; 57
Nandi (10.1016/j.knosys.2020.106562_b2) 2016; 69
Goerler (10.1016/j.knosys.2020.106562_b28) 2013
10.1016/j.knosys.2020.106562_b18
Hopcroft (10.1016/j.knosys.2020.106562_b36) 1973; 16
Bykov (10.1016/j.knosys.2020.106562_b22) 2016; 19
Zhou (10.1016/j.knosys.2020.106562_b38) 2017; 125
Chen (10.1016/j.knosys.2020.106562_b15) 2020; 538
Özcan (10.1016/j.knosys.2020.106562_b19) 2009
Ventresca (10.1016/j.knosys.2020.106562_b8) 2014
Demirović (10.1016/j.knosys.2020.106562_b23) 2017; 78
Yuan (10.1016/j.knosys.2020.106562_b31) 2015; 26
Ventresca (10.1016/j.knosys.2020.106562_b39) 2018; 265
10.1016/j.knosys.2020.106562_b32
Pullan (10.1016/j.knosys.2020.106562_b10) 2015; 21
10.1016/j.knosys.2020.106562_b12
10.1016/j.knosys.2020.106562_b34
Abuhamdah (10.1016/j.knosys.2020.106562_b20) 2010; 10
10.1016/j.knosys.2020.106562_b33
Burke (10.1016/j.knosys.2020.106562_b17) 2017; 258
Aringhieri (10.1016/j.knosys.2020.106562_b14) 2016; 55
Lourenço (10.1016/j.knosys.2020.106562_b37) 2019
Zhou (10.1016/j.knosys.2020.106562_b4) 2019; 49
Summa (10.1016/j.knosys.2020.106562_b6) 2012; 53
Ghosh (10.1016/j.knosys.2020.106562_b35) 2019; 78
Zhou (10.1016/j.knosys.2020.106562_b42) 2020
Bengio (10.1016/j.knosys.2020.106562_b41) 2020
References_xml – reference: M. Namazi, C. Sanderson, M.A.H. Newton, M.M.A. Polash, A. Sattar, Diversified late acceptance search, in: AI 2018: Advances in Artificial Intelligence - 31st Australasian Joint Conference, Wellington, New Zealand, December 11-14, 2018, Proceedings, pp. 299–311.
– reference: W.G. Jackson, E. Özcan, R.I. John, Fuzzy adaptive parameter control of a late acceptance hyper-heuristic, in: 14th UK Workshop on Computational Intelligence, UKCI 2014, Bradford, UK, September 8-10, 2014, pp. 1–8.
– volume: 10
  start-page: 192
  year: 2010
  end-page: 200
  ident: b20
  article-title: Experimental result of late acceptance randomized descent algorithm for solving course timetabling problems
  publication-title: Int. J. Comput. Sci. Netw. Secur.
– year: 2020
  ident: b41
  article-title: Machine learning for combinatorial optimization: a methodological tour d’horizon
  publication-title: European J. Oper. Res.
– reference: K. Tierney, Late acceptance hill climbing for the liner shipping fleet repositioning problem, in: Proceedings of the 14th EU/ME Workshop, 2013, pp. 21–27.
– reference: A. Turky, N.R. Sabar, A. Sattar, A. Song, Parallel late acceptance hill-climbing algorithm for the google machine reassignment problem, in: AI 2016: Advances in Artificial Intelligence - 29th Australasian Joint Conference, Hobart, TAS, Australia, December 5-8, 2016, Proceedings, pp. 163–174.
– volume: 17
  start-page: 249
  year: 2014
  end-page: 262
  ident: b21
  article-title: An adaptive artificial bee colony and late-acceptance hill-climbing algorithm for examination timetabling
  publication-title: J. Sched.
– volume: 258
  start-page: 70
  year: 2017
  end-page: 78
  ident: b17
  article-title: The late acceptance hill-climbing heuristic
  publication-title: European J. Oper. Res.
– start-page: 603
  year: 2014
  end-page: 612
  ident: b8
  article-title: A fast greedy algorithm for the critical node detection problem
  publication-title: International Conference on Combinatorial Optimization and Applications
– year: 2020
  ident: b42
  article-title: Frequent pattern based search: A case study on the quadratic assignment problem
  publication-title: IEEE Trans. Syst., Man, Cybernet.: Syst.
– volume: 49
  start-page: 3699
  year: 2019
  end-page: 3712
  ident: b4
  article-title: Memetic search for identifying critical nodes in sparse graphs
  publication-title: IEEE Trans. Cybernet.
– volume: 57
  start-page: 71
  year: 2014
  end-page: 104
  ident: b1
  article-title: A cutting-plane algorithm for solving a weighted influence interdiction problem
  publication-title: Comput. Optim. Appl.
– volume: 238
  start-page: 637
  year: 2016
  end-page: 649
  ident: b9
  article-title: Hybrid constructive heuristics for the critical node problem
  publication-title: Ann. Oper. Res.
– volume: 26
  start-page: 159
  year: 2015
  end-page: 168
  ident: b31
  article-title: A late acceptance hill-climbing algorithm for balancing two-sided assembly lines with multiple constraints
  publication-title: J. Intell. Manuf.
– reference: A.L. Bolaji, I. Michael, P.B. Shola, Adaptation of late acceptance hill climbing algorithm for optimizing the office-space allocation problem, in: Hybrid Metaheuristics - 11th International Workshop, HM 2019, Concepción, Chile, January 16-18, 2019, Proceedings, pp. 180–190.
– start-page: 457
  year: 2009
  end-page: 478
  ident: b24
  article-title: A late acceptance algorithm for the lock scheduling problem
  publication-title: Logistik Management
– volume: 38
  start-page: 1766
  year: 2011
  end-page: 1774
  ident: b5
  article-title: Complexity of the critical node problem over trees
  publication-title: Comput. Oper. Res.
– volume: 67
  start-page: 209
  year: 2016
  end-page: 221
  ident: b11
  article-title: Local search metaheuristics for the critical node problem
  publication-title: Networks
– volume: 145
  start-page: 197
  year: 2018
  end-page: 206
  ident: b25
  article-title: Late acceptance hill climbing algorithm for solving patient admission scheduling problem
  publication-title: Knowl.-Based Syst.
– reference: Y. Zhou, J.-K. Hao, A fast heuristic algorithm for the critical node problem, in: Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2017, pp. 121–122.
– volume: 538
  year: 2020
  ident: b15
  article-title: Critical node detection problem for complex network in undirected weighted networks
  publication-title: Physica A
– reference: M. Bazargani, J.H. Drake, E.K. Burke, Late acceptance hill climbing for constrained covering arrays, in: Applications of Evolutionary Computation - 21st International Conference, EvoApplications 2018, Parma, Italy, April 4-6, 2018, Proceedings, pp. 778–793.
– volume: 16
  start-page: 372
  year: 1973
  end-page: 378
  ident: b36
  article-title: Algorithm 447: efficient algorithms for graph manipulation
  publication-title: Commun. ACM
– volume: 125
  start-page: 26
  year: 2017
  end-page: 38
  ident: b38
  article-title: An iterated local search algorithm for the minimum differential dispersion problem
  publication-title: Knowl.-Based Syst.
– volume: 265
  start-page: 895
  year: 2018
  end-page: 908
  ident: b39
  article-title: The bi-objective critical node detection problem
  publication-title: European J. Oper. Res.
– start-page: 1
  year: 2008
  end-page: 7
  ident: b16
  article-title: A late acceptance strategy in hill-climbing for examination timetabling problems
  publication-title: Conference on the Practice and Theory of Automated Timetabling
– volume: 13
  start-page: 138
  year: 2020
  ident: b27
  article-title: Late acceptance hill-climbing matheuristic for the general lot sizing and scheduling problem with rich constraints
  publication-title: Algorithms
– volume: 28
  start-page: 92
  year: 2018
  end-page: 117
  ident: b3
  article-title: The critical node detection problem in networks: A survey
  publication-title: Comp. Sci. Rev.
– volume: 69
  start-page: 10
  year: 2016
  end-page: 24
  ident: b2
  article-title: Methods for removing links in a network to minimize the spread of infections
  publication-title: Comput. Oper. Res.
– volume: 39
  start-page: 2763
  year: 2012
  end-page: 2775
  ident: b13
  article-title: Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem
  publication-title: Comput. Oper. Res.
– volume: 53
  start-page: 649
  year: 2012
  end-page: 680
  ident: b6
  article-title: Branch and cut algorithms for detecting critical nodes in undirected graphs
  publication-title: Comput. Optim. Appl.
– reference: M. Terzi, T. Arbaoui, F. Yalaoui, K. Benatchba, Solving the unrelated parallel machine scheduling problem with setups using late acceptance hill climbing, in: Intelligent Information and Database Systems - 12th Asian Conference, ACIIDS 2020, Phuket, Thailand, March 23-26, 2020, Proceedings, Part I, pp. 249–258.
– volume: 36
  start-page: 2193
  year: 2009
  end-page: 2200
  ident: b7
  article-title: Detecting critical nodes in sparse graphs
  publication-title: Comput. Oper. Res.
– start-page: 997
  year: 2009
  end-page: 1004
  ident: b19
  article-title: Examination timetabling using late acceptance hyper-heuristics
  publication-title: 2009 IEEE Congress on Evolutionary Computation
– volume: 19
  start-page: 479
  year: 2016
  end-page: 492
  ident: b22
  article-title: A step counting hill climbing algorithm applied to university examination timetabling
  publication-title: J. Sched.
– volume: 78
  start-page: 25753
  year: 2019
  end-page: 25779
  ident: b35
  article-title: Feature selection for facial emotion recognition using late hill-climbing based memetic algorithm
  publication-title: Multimedia Tools Appl.
– volume: 78
  start-page: 172
  year: 2017
  end-page: 180
  ident: b23
  article-title: Maxsat-based large neighborhood search for high school timetabling
  publication-title: Comput. Oper. Res.
– start-page: 173
  year: 2013
  end-page: 183
  ident: b28
  article-title: An application of late acceptance hill-climbing to the traveling purchaser problem
  publication-title: International Conference on Computational Logistics
– start-page: 129
  year: 2019
  end-page: 168
  ident: b37
  article-title: Iterated local search: Framework and applications
  publication-title: Handbook of Metaheuristics
– volume: 21
  start-page: 577
  year: 2015
  end-page: 598
  ident: b10
  article-title: Heuristic identification of critical nodes in sparse real-world graphs
  publication-title: J. Heuristics
– volume: 55
  start-page: 128
  year: 2016
  end-page: 145
  ident: b14
  article-title: A general evolutionary framework for different classes of critical node problems
  publication-title: Eng. Appl. Artif. Intell.
– volume: 7
  start-page: 1
  year: 2006
  end-page: 30
  ident: b40
  article-title: Statistical comparisons of classifiers over multiple data sets
  publication-title: J. Mach. Learn. Res.
– volume: 39
  start-page: 2763
  issue: 11
  year: 2012
  ident: 10.1016/j.knosys.2020.106562_b13
  article-title: Global search algorithms using a combinatorial unranking-based problem representation for the critical node detection problem
  publication-title: Comput. Oper. Res.
  doi: 10.1016/j.cor.2012.02.008
– volume: 238
  start-page: 637
  issue: 1–2
  year: 2016
  ident: 10.1016/j.knosys.2020.106562_b9
  article-title: Hybrid constructive heuristics for the critical node problem
  publication-title: Ann. Oper. Res.
  doi: 10.1007/s10479-016-2110-y
– volume: 538
  year: 2020
  ident: 10.1016/j.knosys.2020.106562_b15
  article-title: Critical node detection problem for complex network in undirected weighted networks
  publication-title: Physica A
  doi: 10.1016/j.physa.2019.122862
– start-page: 1
  year: 2008
  ident: 10.1016/j.knosys.2020.106562_b16
  article-title: A late acceptance strategy in hill-climbing for examination timetabling problems
– ident: 10.1016/j.knosys.2020.106562_b12
  doi: 10.1145/3067695.3075993
– ident: 10.1016/j.knosys.2020.106562_b34
  doi: 10.1007/978-3-030-05983-5_14
– volume: 67
  start-page: 209
  issue: 3
  year: 2016
  ident: 10.1016/j.knosys.2020.106562_b11
  article-title: Local search metaheuristics for the critical node problem
  publication-title: Networks
  doi: 10.1002/net.21671
– start-page: 997
  year: 2009
  ident: 10.1016/j.knosys.2020.106562_b19
  article-title: Examination timetabling using late acceptance hyper-heuristics
– volume: 145
  start-page: 197
  year: 2018
  ident: 10.1016/j.knosys.2020.106562_b25
  article-title: Late acceptance hill climbing algorithm for solving patient admission scheduling problem
  publication-title: Knowl.-Based Syst.
  doi: 10.1016/j.knosys.2018.01.017
– ident: 10.1016/j.knosys.2020.106562_b33
  doi: 10.1007/978-3-319-77538-8_52
– ident: 10.1016/j.knosys.2020.106562_b29
  doi: 10.1007/978-3-319-17665-9_3
– volume: 26
  start-page: 159
  issue: 1
  year: 2015
  ident: 10.1016/j.knosys.2020.106562_b31
  article-title: A late acceptance hill-climbing algorithm for balancing two-sided assembly lines with multiple constraints
  publication-title: J. Intell. Manuf.
  doi: 10.1007/s10845-013-0770-x
– year: 2020
  ident: 10.1016/j.knosys.2020.106562_b42
  article-title: Frequent pattern based search: A case study on the quadratic assignment problem
  publication-title: IEEE Trans. Syst., Man, Cybernet.: Syst.
– volume: 258
  start-page: 70
  issue: 1
  year: 2017
  ident: 10.1016/j.knosys.2020.106562_b17
  article-title: The late acceptance hill-climbing heuristic
  publication-title: European J. Oper. Res.
  doi: 10.1016/j.ejor.2016.07.012
– volume: 125
  start-page: 26
  year: 2017
  ident: 10.1016/j.knosys.2020.106562_b38
  article-title: An iterated local search algorithm for the minimum differential dispersion problem
  publication-title: Knowl.-Based Syst.
  doi: 10.1016/j.knosys.2017.03.028
– volume: 69
  start-page: 10
  year: 2016
  ident: 10.1016/j.knosys.2020.106562_b2
  article-title: Methods for removing links in a network to minimize the spread of infections
  publication-title: Comput. Oper. Res.
  doi: 10.1016/j.cor.2015.11.001
– volume: 78
  start-page: 25753
  issue: 18
  year: 2019
  ident: 10.1016/j.knosys.2020.106562_b35
  article-title: Feature selection for facial emotion recognition using late hill-climbing based memetic algorithm
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-019-07811-x
– volume: 57
  start-page: 71
  issue: 1
  year: 2014
  ident: 10.1016/j.knosys.2020.106562_b1
  article-title: A cutting-plane algorithm for solving a weighted influence interdiction problem
  publication-title: Comput. Optim. Appl.
  doi: 10.1007/s10589-013-9589-9
– start-page: 173
  year: 2013
  ident: 10.1016/j.knosys.2020.106562_b28
  article-title: An application of late acceptance hill-climbing to the traveling purchaser problem
– volume: 13
  start-page: 138
  issue: 6
  year: 2020
  ident: 10.1016/j.knosys.2020.106562_b27
  article-title: Late acceptance hill-climbing matheuristic for the general lot sizing and scheduling problem with rich constraints
  publication-title: Algorithms
  doi: 10.3390/a13060138
– volume: 55
  start-page: 128
  year: 2016
  ident: 10.1016/j.knosys.2020.106562_b14
  article-title: A general evolutionary framework for different classes of critical node problems
  publication-title: Eng. Appl. Artif. Intell.
  doi: 10.1016/j.engappai.2016.06.010
– start-page: 603
  year: 2014
  ident: 10.1016/j.knosys.2020.106562_b8
  article-title: A fast greedy algorithm for the critical node detection problem
– volume: 21
  start-page: 577
  issue: 5
  year: 2015
  ident: 10.1016/j.knosys.2020.106562_b10
  article-title: Heuristic identification of critical nodes in sparse real-world graphs
  publication-title: J. Heuristics
  doi: 10.1007/s10732-015-9290-5
– volume: 78
  start-page: 172
  year: 2017
  ident: 10.1016/j.knosys.2020.106562_b23
  article-title: Maxsat-based large neighborhood search for high school timetabling
  publication-title: Comput. Oper. Res.
  doi: 10.1016/j.cor.2016.08.004
– volume: 10
  start-page: 192
  issue: 1
  year: 2010
  ident: 10.1016/j.knosys.2020.106562_b20
  article-title: Experimental result of late acceptance randomized descent algorithm for solving course timetabling problems
  publication-title: Int. J. Comput. Sci. Netw. Secur.
– start-page: 457
  year: 2009
  ident: 10.1016/j.knosys.2020.106562_b24
  article-title: A late acceptance algorithm for the lock scheduling problem
– ident: 10.1016/j.knosys.2020.106562_b26
  doi: 10.1007/978-3-030-41964-6_22
– volume: 49
  start-page: 3699
  issue: 10
  year: 2019
  ident: 10.1016/j.knosys.2020.106562_b4
  article-title: Memetic search for identifying critical nodes in sparse graphs
  publication-title: IEEE Trans. Cybernet.
  doi: 10.1109/TCYB.2018.2848116
– volume: 19
  start-page: 479
  issue: 4
  year: 2016
  ident: 10.1016/j.knosys.2020.106562_b22
  article-title: A step counting hill climbing algorithm applied to university examination timetabling
  publication-title: J. Sched.
  doi: 10.1007/s10951-016-0469-x
– volume: 38
  start-page: 1766
  issue: 12
  year: 2011
  ident: 10.1016/j.knosys.2020.106562_b5
  article-title: Complexity of the critical node problem over trees
  publication-title: Comput. Oper. Res.
  doi: 10.1016/j.cor.2011.02.016
– volume: 16
  start-page: 372
  issue: 6
  year: 1973
  ident: 10.1016/j.knosys.2020.106562_b36
  article-title: Algorithm 447: efficient algorithms for graph manipulation
  publication-title: Commun. ACM
  doi: 10.1145/362248.362272
– ident: 10.1016/j.knosys.2020.106562_b30
  doi: 10.1109/UKCI.2014.6930167
– volume: 53
  start-page: 649
  issue: 3
  year: 2012
  ident: 10.1016/j.knosys.2020.106562_b6
  article-title: Branch and cut algorithms for detecting critical nodes in undirected graphs
  publication-title: Comput. Optim. Appl.
  doi: 10.1007/s10589-012-9458-y
– year: 2020
  ident: 10.1016/j.knosys.2020.106562_b41
  article-title: Machine learning for combinatorial optimization: a methodological tour d’horizon
  publication-title: European J. Oper. Res.
– volume: 17
  start-page: 249
  issue: 3
  year: 2014
  ident: 10.1016/j.knosys.2020.106562_b21
  article-title: An adaptive artificial bee colony and late-acceptance hill-climbing algorithm for examination timetabling
  publication-title: J. Sched.
  doi: 10.1007/s10951-013-0352-y
– volume: 36
  start-page: 2193
  issue: 7
  year: 2009
  ident: 10.1016/j.knosys.2020.106562_b7
  article-title: Detecting critical nodes in sparse graphs
  publication-title: Comput. Oper. Res.
  doi: 10.1016/j.cor.2008.08.016
– volume: 265
  start-page: 895
  issue: 3
  year: 2018
  ident: 10.1016/j.knosys.2020.106562_b39
  article-title: The bi-objective critical node detection problem
  publication-title: European J. Oper. Res.
  doi: 10.1016/j.ejor.2017.08.053
– volume: 7
  start-page: 1
  issue: Jan
  year: 2006
  ident: 10.1016/j.knosys.2020.106562_b40
  article-title: Statistical comparisons of classifiers over multiple data sets
  publication-title: J. Mach. Learn. Res.
– volume: 28
  start-page: 92
  year: 2018
  ident: 10.1016/j.knosys.2020.106562_b3
  article-title: The critical node detection problem in networks: A survey
  publication-title: Comp. Sci. Rev.
  doi: 10.1016/j.cosrev.2018.02.002
– ident: 10.1016/j.knosys.2020.106562_b18
  doi: 10.1007/978-3-030-03991-2_29
– ident: 10.1016/j.knosys.2020.106562_b32
  doi: 10.1007/978-3-319-50127-7_13
– start-page: 129
  year: 2019
  ident: 10.1016/j.knosys.2020.106562_b37
  article-title: Iterated local search: Framework and applications
SSID ssj0002218
Score 2.371292
Snippet Identifying critical nodes is an efficient way to analyze and apprehend the properties, structures, and functions of complex networks, which is a challenging...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 106562
SubjectTerms Algorithms
Combinatorial optimization
Constraints
Critical node problem
Graph theory
Late acceptance strategy
Metaheuristics
Node-weighted graph
Nodes
Optimization
Perturbation
Search algorithms
Upper bounds
Weighting
Title Late acceptance-based heuristic algorithms for identifying critical nodes of weighted graphs
URI https://dx.doi.org/10.1016/j.knosys.2020.106562
https://www.proquest.com/docview/2479815912
Volume 211
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  customDbUrl:
  eissn: 1872-7409
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002218
  issn: 0950-7051
  databaseCode: GBLVA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  customDbUrl:
  eissn: 1872-7409
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002218
  issn: 0950-7051
  databaseCode: ACRLP
  dateStart: 19950201
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals [SCFCJ]
  customDbUrl:
  eissn: 1872-7409
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002218
  issn: 0950-7051
  databaseCode: AIKHN
  dateStart: 19950201
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Science Direct
  customDbUrl:
  eissn: 1872-7409
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002218
  issn: 0950-7051
  databaseCode: .~1
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1872-7409
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0002218
  issn: 0950-7051
  databaseCode: AKRWK
  dateStart: 19871201
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA6lXrz4Fqu15OA1tptsu8mxFEt90IsWehCWbJK11bpb-kC8-NudZLOKghS8ZpOwzGTm-xLmgdCFhHu0MGGHGNNJSKiVJJJqCnaVslRIGTLtqn0OO4NReDNujyuoV-bC2LBK7_sLn-68tR9pemk259Np8x7IAZxXACxLe4XrNByGke1icPnxHeZBqXvjs5OJnV2mz7kYr5csX77bot3UDgG1oX_B0y9H7dCnv4d2PG3E3eLP9lHFZAdot2zJgL2FHqLHO-COWCobrGL1SSxKaTwx66IiM5azp3wxXU1elxjoKp66PF2X64SV73qAs1ybJc5T_ObeTWG9K2u9PEKj_tVDb0B8AwWiwDRXhGpjGNeMcxNEiVRBkAq4QClDheEq4ZK3hGSaqhYTSkrFklYnNS3FeZsrDUB_jKpZnpkThFlbw80oUloaEfJEy1SrVLaZBXmRJkENsVJusfLVxW2Ti1lchpE9x4W0YyvtuJB2DZGvVfOiusaG-VGpkvjHKYkBADasrJcajL2VwvcwEhz4XEBP_73xGdqmNszFvsqIOqquFmtzDjxllTTcQWygre717WD4Cdo-6uA
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA-iB734LU6n5uA1bk3aNTnKUKbOXZzgQQhpkup0tsNNxIt_uy9pqiiI4DVNQnnJe7_fC-8DoUMFfrSwcYdY28lIbLQiihoKepWzXCgVM-OrfQ46vev4_Ca5mUPdOhfGhVUG21_ZdG-tw0grSLM1GY1aV0AO4L4CYDnaK1yn4YU4oanzwI7ev-I8KPWPfG42cdPr_Dkf5PVYlNM3V7WbuiHgNvQ3fPphqT38nK6i5cAb8XH1a2tozhbraKXuyYCDim6g2z6QR6y0i1ZxB0ocTBl8b1-qksxYje_K59Hs_mmKga_ikU_U9clOWIe2B7gojZ3iMsev_uEU1vu61tNNdH16Muz2SOigQDTo5oxQYy3jhnFuozRTOopyAR6UtlRYrjOueFsoZqhuM6GV0ixrd3Lb1pwnXBtA-i00X5SF3UaYJQZco1QbZUXMM6Nyo3OVMIfyIs-iBmK13KQO5cVdl4uxrOPIHmQlbemkLStpNxD5XDWpymv8MT-tj0R-uyYSEOCPlc36BGVQU_gep4IDoYvozr83PkCLveFlX_bPBhe7aIm6mBf3RCOaaH72_GL3gLTMsn1_KT8AVLDsdQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Late+acceptance-based+heuristic+algorithms+for+identifying+critical+nodes+of+weighted+graphs&rft.jtitle=Knowledge-based+systems&rft.au=Zhou%2C+Yangming&rft.au=Wang%2C+Zhe&rft.au=Jin%2C+Yan&rft.au=Fu%2C+Zhang-Hua&rft.date=2021-01-09&rft.issn=0950-7051&rft.volume=211&rft.spage=106562&rft_id=info:doi/10.1016%2Fj.knosys.2020.106562&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_knosys_2020_106562
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0950-7051&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0950-7051&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0950-7051&client=summon