Publications of the HPC²
Publications by HPC centers and institutes include items from past years such as an early publication written by one of the HPC founding investigators, Dr. Joe Thompson. Numerical Grid Generation was originally published by Elsevier Science Publishing Co., Inc. in 1985, and the copyright was transferred to Joe F. Thompson in 1997.
Publications for: Medal
Vadlamani, S., Medal, H., Eksioglu, B., & Li, P. (2014). Security in Wireless Networks: An Operations Research Oriented Tutorial. In S. Butenko, E.L. Pasiliao, V. Shylo (Eds.), Examining Robustness and Vulnerability of Networked Systems. IOS Press. 37, 272-288.
Hernandez, I., Ramirez-Marquez, J. E., Rainwater, C., Pohl, E., & Medal, H. (2014). Robust Facility Location: Hedging Against Failures. Reliability Engineering & System Safety. 123, 73-80. [Abstract] [Document Site]
Medal, H., Pohl, E. A., & Rossetti, M. D. (2014). A Multi-objective Integrated Facility Location- Hardening Model: Analyzing the Pre- and Post-Disruption Tradeoff. European Journal of Operational Research. 237, 257-270.
Medal, H., Rainwater, C. E., Pohl, E. A., & Rossetti, M. D. (2014). A Bi-objective Analysis of the R-All-Neighbor P-Center Problem. Computers and Industrial Engineering. 72, 114-128.
Gedik, R., Medal, H., Rainwater, C., Pohl, E., & Mason, S. (2014). Vulnerability Assessment and Re-routing of Freight Trains Under Disruptions: A Coal Supply Chain Network Application. Transportation Research Part E. 71, 45-57.
Peer-Reviewed Conference Papers
Vadlamani, S., Medal, H., Eksioglu, B., & Li, P. (2014). A Bilevel Programming Model for the Wireless Network Jamming Placement Problem. Proceedings of the Industrial Engineering Research Conference. Montreal, CA.
Li, X., Medal, H., & Wang, J. (2014). A Network Design Model under Connectivity Constraints with Heterogeneous Services. Proceeding of the 93rd TRB Annual Meeting. Washington, D.C.
Medal, H., Vadlamani, S., & Eksioglu, B. (2014). The Wireless Network Jamming Problem Subject to Protocol Interference. Montreal, CA.
Nandi, A., & Medal, H. (2014). Optimal Allocation of Security Resources: Analyzing the Security- Efficiency-Cost Tradeoff. Montreal, CA.
News | Events | Jobs | Intranet (Restricted access)
Mississippi State University is an equal opportunity institution.