Optimal security-constrained power scheduling by Benders decomposition | Publicación