default search action
Thomas C. Sharkey
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Daniel Kosmas, Thomas C. Sharkey, John E. Mitchell, Kayse Lee Maass, Lauren Martin:
Multi-period max flow network interdiction with restructuring for disrupting domestic sex trafficking networks. Ann. Oper. Res. 335(2): 797-860 (2024) - 2023
- [j32]Mustafa Can Camur, Thomas C. Sharkey, Chrysafis Vogiatzis:
The stochastic pseudo-star degree centrality problem. Eur. J. Oper. Res. 308(2): 525-539 (2023) - [j31]Daniel Kosmas, Thomas C. Sharkey, John E. Mitchell, Kayse Lee Maass, Lauren Martin:
Interdicting restructuring networks with applications in illicit trafficking. Eur. J. Oper. Res. 308(2): 832-851 (2023) - [j30]Lucky Cho, Thomas C. Sharkey:
Integer Programming Methods to Identify Nash Equilibrium Solutions for Platform-Based Scheduling Games. Oper. Res. Forum 4(4): 94 (2023) - 2022
- [j29]Mustafa Can Camur, Thomas C. Sharkey, Chrysafis Vogiatzis:
The Star Degree Centrality Problem: A Decomposition Approach. INFORMS J. Comput. 34(1): 93-112 (2022) - [j28]Amr Elsisy, Aamir Mandviwalla, Boleslaw K. Szymanski, Thomas C. Sharkey:
A network generator for covert network structures. Inf. Sci. 584: 387-398 (2022) - [j27]Daniel Kosmas, John E. Mitchell, Thomas C. Sharkey, Boleslaw K. Szymanski:
Optimizing edge sets in networks to produce ground truth communities based on modularity. Networks 80(2): 152-177 (2022) - [i4]Daniel Kosmas, Christina Melander, Emily Singerhouse, Thomas C. Sharkey, Kayse Lee Maass, Kelle Barrick, Lauren Martin:
Generating Synthetic but Realistic Human Trafficking Networks for Modeling Disruptions through Transdisciplinary and Community-Based Action Research. CoRR abs/2203.01893 (2022) - [i3]Thomas C. Sharkey, Steven Foster, Sudeep Hegde, Mary E. Kurz, Emily L. Tucker:
A Framework for Operations Research Model Use in Resilience to Fundamental Surprise Events: Observations from University Operations during COVID-19. CoRR abs/2210.08963 (2022) - 2021
- [j26]Thomas C. Sharkey, Sarah G. Nurre Pinkley, Daniel A. Eisenberg, David L. Alderson:
In search of network resilience: An optimization-based view. Networks 77(2): 225-254 (2021) - [j25]Hongtan Sun, Thomas C. Sharkey:
Decentralized scheduling with precedence constraints. Optim. Lett. 15(8): 2555-2575 (2021) - [i2]Daniel Kosmas, John E. Mitchell, Thomas C. Sharkey, Boleslaw K. Szymanski:
Optimizing Edge Sets in Networks to Produce Ground Truth Communities Based on Modularity. CoRR abs/2103.09351 (2021) - 2020
- [j24]Huy Nguyen, Thomas C. Sharkey, John E. Mitchell, William A. Wallace:
Optimizing the recovery of disrupted single-sourced multi-echelon assembly supply chain networks. IISE Trans. 52(7): 703-720 (2020) - [j23]Thomas C. Sharkey, Steve Bublak, Lisa Disselkamp, Brittney Shkil:
Case Article - Workforce Scheduling for Airport Immigration on the Island of Tropical Paradise. INFORMS Trans. Educ. 20(2): 85-89 (2020) - [j22]Thomas C. Sharkey, Steve Bublak, Lisa Disselkamp, Brittney Shkil:
Case - Workforce Scheduling for Airport Immigration on the Island of Tropical Paradise. INFORMS Trans. Educ. 20(2): 90-92 (2020) - [j21]Emily A. Heath, John E. Mitchell, Thomas C. Sharkey:
Scheduling of tasks with effectiveness precedence constraints. Optim. Lett. 14(1): 37-49 (2020) - [i1]Amr Elsisy, Aamir Mandviwalla, Boleslaw K. Szymanski, Thomas C. Sharkey:
A Synthetic Network Generator for Covert Network Analytics. CoRR abs/2008.04445 (2020)
2010 – 2019
- 2019
- [j20]Ni Ni, Richard G. Little, Thomas C. Sharkey, William A. Wallace:
Modelling the recovery of critical commercial services and their interdependencies on civil infrastructures. Int. J. Crit. Infrastructures 15(4): 355-382 (2019) - 2018
- [j19]Sarah G. Nurre, Thomas C. Sharkey:
Online scheduling problems with flexible release dates: Applications to infrastructure restoration. Comput. Oper. Res. 92: 1-16 (2018) - [c2]Ashwin Bahulkar, Boleslaw K. Szymanski, N. Orkun Baycik, Thomas C. Sharkey:
Community Detection with Edge Augmentation in Criminal Networks. ASONAM 2018: 1168-1175 - 2017
- [j18]Richard A. Garrett, Thomas C. Sharkey, Martha Grabowski, William A. Wallace:
Dynamic resource allocation to support oil spill response planning for energy exploration in the Arctic. Eur. J. Oper. Res. 257(1): 272-286 (2017) - [j17]Hongtan Sun, Thomas C. Sharkey:
Approximation guarantees of algorithms for fractional optimization problems arising in dispatching rules for INDS problems. J. Glob. Optim. 68(3): 623-640 (2017) - [j16]Huy Nguyen, Thomas C. Sharkey:
A computational approach to determine damage in infrastructure networks from outage reports. Optim. Lett. 11(4): 753-770 (2017) - [c1]Emily A. Heath, John E. Mitchell, Thomas C. Sharkey:
Restoration decision making for a supply chain network under cyber attack. SummerSim 2017: 8:1-8:12 - 2016
- [j15]Emily A. Heath, John E. Mitchell, Thomas C. Sharkey:
Applying ranking and selection procedures to long-term mitigation for improved network restoration. EURO J. Comput. Optim. 4(3-4): 447-481 (2016) - [j14]Thomas C. Sharkey, Sarah G. Nurre:
Video Tutorials Within an Undergraduate Operations Research Course: Student Perception on Their Integration and Creating A Blended Learning Environment. INFORMS Trans. Educ. 17(1): 1-12 (2016) - 2015
- [j13]Thomas C. Sharkey, Burak Cavdaroglu, Huy Nguyen, Jonathan Holman, John E. Mitchell, William A. Wallace:
Interdependent network restoration: On the value of information-sharing. Eur. J. Oper. Res. 244(1): 309-321 (2015) - 2014
- [j12]Sarah G. Nurre, Thomas C. Sharkey:
Integrated network design and scheduling problems with parallel identical machines: Complexity results and dispatching rules. Networks 63(4): 306-326 (2014) - [j11]Jiaming Qiu, Thomas C. Sharkey:
A dynamic edge covering and scheduling problem: complexity results and approximation algorithms. Optim. Lett. 8(4): 1201-1212 (2014) - 2013
- [j10]Burak Cavdaroglu, Erik Hammel, John E. Mitchell, Thomas C. Sharkey, William A. Wallace:
Integrating restoration and scheduling decisions for disrupted interdependent infrastructure systems. Ann. Oper. Res. 203(1): 279-294 (2013) - 2012
- [j9]Sarah G. Nurre, Burak Cavdaroglu, John E. Mitchell, Thomas C. Sharkey, William A. Wallace:
Restoring infrastructure systems: An integrated network design and scheduling (INDS) problem. Eur. J. Oper. Res. 223(3): 794-806 (2012) - [j8]Wilco van den Heuvel, O. Erhun Kundakcioglu, Joseph Geunes, H. Edwin Romeijn, Thomas C. Sharkey, Albert P. M. Wagelmans:
Integrated market selection and production planning: complexity and solution approaches. Math. Program. 134(2): 395-424 (2012) - 2011
- [j7]Thomas C. Sharkey, H. Edwin Romeijn, Joseph Geunes:
A class of nonlinear nonseparable continuous knapsack and multiple-choice knapsack problems. Math. Program. 126(1): 69-96 (2011) - [j6]Thomas C. Sharkey:
Network flow problems with pricing decisions. Optim. Lett. 5(1): 71-83 (2011) - 2010
- [j5]Michael Dinitz, Jonah M. Gold, Thomas C. Sharkey, Lorenzo Traldi:
Graphical representations of clutters. Ars Comb. 94 (2010) - [j4]Thomas C. Sharkey, H. Edwin Romeijn:
Greedy approaches for a class of nonlinear Generalized Assignment Problems. Discret. Appl. Math. 158(5): 559-572 (2010) - [j3]H. Edwin Romeijn, Thomas C. Sharkey, Zuo-Jun Max Shen, Jiawei Zhang:
Integrating facility location and production planning decisions. Networks 55(2): 78-89 (2010)
2000 – 2009
- 2008
- [j2]Thomas C. Sharkey, H. Edwin Romeijn:
A simplex algorithm for minimum-cost network-flow problems in infinite networks. Networks 52(1): 14-31 (2008) - [j1]Thomas C. Sharkey, H. Edwin Romeijn:
Simplex-inspired algorithms for solving a class of convex programming problems. Optim. Lett. 2(4): 455-481 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint