- AartsE.H.L. and KorstJ. (1989). Simulated Annealing and Boltzmann Machines, John Wiley & Sons, New York.
- BeareG.C. (1987). Linear programming in air defense modelling, Journal of the Operational Research Society, 38, 899–905.
- BohachevskyI.O., JohnsonM. E. and SteinM. L. (1986). Generalized simulated annealing for function optimization, Technometrics, 28, 209–217.
- BohachevskyI.O., JohnsonM. E. and SteinM. L. (1988). Optimal deployment of missile interceptors, American Journal of Mathematical and Management Sciences, 8, 361–387.
- BrackenJ., BrooksP. S. and FalkJ.E. (1987). Robust preallocated preferential defense, Naval Research Logistics, 34, 1–22.
- BrackenJ., FalkJ.E. and TaiA.J.A. (1987). Robustness of preallocated preferential defense with assumed attack size and perfect attacking and defending weapons, Naval Research Logistics, 34, 23–41.
- GloverF. and GreenbergH.J. (1989). New approaches for heuristic search : A bilateral linkage with artificial intelligence, European Journal of Operational Research, 39, 119–130.
- JohnsonM.E. (1988). (ed) Simulated annealing (SA) & optimization : Modern algorithms with VLSI, optimal design, & missile defense applications, American Journal of Mathematical and Management Sciences, 8, 205–450.
- KirkpatrickS., GelattC.D.Jr., and VechhiM.P. (1983). Optimization by simulated annealing, Science, 220, 671–680.
- NigamM., SahniS., ShettiD.G. and SlagleJ.R. (1988). Allocation of weapons to targets, in: Proceedings of the Conference on Expert System Technology in the ADP Environment, (eds) ErnrichM. L., Robert SadloweA. and ArrowoodL. F., North Holland, Amsterdam, 173–181.
- MetropolisN., RosenbluthA. W., RosenbluthM. N., TellerA.H. and TellerE. (1953). Equations of state calculations by fast computing machines, Journal of Chemical Physics, 21, 1087–1092.
- WacholderE. (1989). A Neural network-based optimization algorithm for the static weapon-target assignment problem, ORSA Journal on Computing, 1, 232–246.
Optimal Weapon Mix, Deployment and Allocation Problems in Multiple Layer Defense
Reprints and Corporate Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
To request a reprint or corporate permissions for this article, please click on the relevant link below:
Academic Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
Obtain permissions instantly via Rightslink by clicking on the button below:
If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.
Related research
People also read lists articles that other readers of this article have read.
Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.
Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.