Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing compromise sets in polyhedral framework., , , and . Appl. Math. Lett., 13 (5): 93-98 (2000)Agricultural sustainable management: a normative approach based on goal programming., , and . JORS, 60 (4): 534-543 (2009)Computing compromise solutions: On the connections between compromise programming and composite programming., and . Applied Mathematics and Computation, 195 (1): 1-10 (2008)Operations research in the natural resource industry., , , , and . ITOR, 19 (1-2): 39-62 (2012)A new method to locate faults in power networks based on Electromagnetic Time Reversal., , , , , and . SPAWC, page 469-474. IEEE, (2012)Applying Multi-Agent Systems to Organizational Modelling in Industrial Environments., , , and . ICEIS (2), page 181-186. (2008)Integration of Expert System Rules into Standardized Object Description Models for Telecommunication Network Management., , , , and . ICEIS, page 171-175. (2000)The MB2 gene family of Plasmodium species has a unique combination of S1 and GTP-binding domains., , , , and . BMC Bioinformatics, (2004)Visual stimulus-driven functional organization of macaque prefrontal cortex., , , and . NeuroImage, (2019)A Fitness Estimation Strategy for Web Based Interactive Evolutionary Applications Considering User Preferences and Activities Using Fuzzy Logic., and . Design of Intelligent Systems Based on Fuzzy Logic, Neural Networks and Nature-Inspired Optimization, volume 601 of Studies in Computational Intelligence, Springer, (2015)