Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Network Protection Games Against Multiple Types Of Strategic Attackers., and . ICASSP, page 2620-2624. IEEE, (2021)Allocation sequences of two processes sharing a resource., , , and . IEEE Trans. Robotics Autom., 11 (5): 748-753 (1995)On the unimodality of the price-setting newsvendor problem with additive demand under risk considerations., and . Eur. J. Oper. Res., 265 (3): 962-974 (2018)Modeling traffic flow interrupted by incidents., , and . Eur. J. Oper. Res., 195 (1): 127-138 (2009)A decomposable resource allocation model with generalized overarching protections., , and . Ann. Oper. Res., 320 (1): 493-507 (2023)A Friendly Interference Game in Wireless Secret Communication Networks., and . NetGCooP, volume 1354 of Communications in Computer and Information Science, page 25-37. Springer, (2020)Variability Sensitive Markov Decision Processes., and . Math. Oper. Res., 17 (3): 558-571 (1992)A price-setting newsvendor problem under mean-variance criteria., , and . Eur. J. Oper. Res., 247 (2): 575-587 (2015)Traffic density on corridors subject to incidents: models for long-term congestion management., , and . EURO J. Transp. Logist., 8 (5): 795-831 (2019)A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies over Parallel Wireless Channels., , and . CNS, page 47-55. IEEE, (2021)