<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">inf21406</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2010.305</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>A Dynamic Network Interdiction Problem</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Lunday</surname>
						<given-names>Brian J.</given-names>
					</name>
					<email xlink:href="mailto:brian.lunday@usma.edu">brian.lunday@usma.edu</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Sherali</surname>
						<given-names>Hanif D.</given-names>
					</name>
					<email xlink:href="mailto:hanifs@vt.edu">hanifs@vt.edu</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">Department of Mathematical Sciences, United States Military Academy, West Point, NY 10996, USA</aff>
				<aff id="j_INFORMATICA_aff_001">Grado Department of Industrial and Systems Engineering, Virginia Polytechnic Institute and State University, Blacksburg, VA, 24061, USA</aff>
			</contrib-group>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2010</year>
			</pub-date>
			<volume>21</volume>
			<issue>4</issue>
			<fpage>553</fpage>
			<lpage>574</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>02</month>
					<year>2010</year>
				</date>
				<date date-type="accepted">
					<day>01</day>
					<month>07</month>
					<year>2010</year>
				</date>
			</history>
			<abstract>
				<p>We present a novel dynamic network interdiction model that accounts for interactions between an interdictor deploying resources on arcs in a digraph and an evader traversing the network from a designated source to a known terminus, wherein the agents may modify strategies in selected subsequent periods according to respective decision and implementation cycles. For the resulting minimax model, we develop a reformulation that facilitates a direct solution procedure using commercial software or via a proposed alternating heuristic. We examine certain related stability and convergence issues, demonstrate special convergence cases, and provide insights into the computational performance of the solution procedures.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>network interdiction</kwd>
				<kwd>resource allocation</kwd>
				<kwd>minimax flow problems</kwd>
				<kwd>dynamic formulation</kwd>
				<kwd>alternating heuristic</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>