Publication | Closed Access
Network constrained security control using an interior point algorithm
51
Citations
20
References
1993
Year
Mathematical ProgrammingSecure Network AccessEngineeringInformation SecurityComputer EngineeringSecuritySystems EngineeringSecurity Control ProblemInterior Point AlgorithmSimplex MethodComputer ScienceSemidefinite ProgrammingControl System SecurityLinear ProgrammingConstrained OptimizationInterior Point MethodQuadratic ProgrammingNetwork Security
N. Karmarkar's interior point method (1984), said to perform much faster than the simplex method in solving large scale linear programming problems, has attracted a great deal of attention. The authors present a preliminary implementation of the interior point algorithm and test results on the network constrained security control problem. Test results indicate that when solving various sizes of network constrained security control linear programming problems with increasing numbers of controls and constraints, both the total number of iterations and the overall execution time grow at a slower rate in the interior point method than in the simplex method. The number of iterations required by the interior point method is relatively insensitive to problem size and composition, while iteration counts for the simplex method tend to be much higher in the presence of large numbers of control variables and/or constraints. >
| Year | Citations | |
|---|---|---|
Page 1
Page 1