Author of the publication

A Group Decision-Support Method for Search and Rescue Based on Markov Chain.

, , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 590-592. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on Public Opinion Propagation in Micro-Blogging Based on Epidemic Models., and . ISCRAM, ISCRAM Association, (2016)Classification of customer loyalty based on Hidden Markov Model., and . Int. J. Internet Enterp. Manag., 4 (1): 54-67 (2006)A sequential group decision process for emergency response., , , and . SMC, page 867-871. IEEE, (2008)A Group Decision-Support Method for Search and Rescue Based on Markov Chain., , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 590-592. Springer, (2005)A Hidden Pattern Discovery and Meta-synthesis of Preference Adjustment in Group Decision-Making., , and . International Conference on Computational Science (4), volume 4490 of Lecture Notes in Computer Science, page 51-58. Springer, (2007)A semantics-based multi-agent framework for vehicular social network development., , , and . DIVANet@MSWiM, page 87-96. ACM, (2011)A Case-Based Evolutionary Group Decision Support Method for Emergency Response., , and . PAISI, volume 4430 of Lecture Notes in Computer Science, page 94-104. Springer, (2007)Mission-Critical Group Decision-Making: Solving the Problem of Decision Preference Change in Group Decision-Making Using markov Chain Model., , and . J. Glob. Inf. Manag., 16 (2): 35-57 (2008)Privacy Preserving Mining of Global Association Rules on Distributed Dataset., , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 654-656. Springer, (2006)Incorporating Privacy Concerns in Data Mining on Distributed Data., , and . AIMSA, volume 4183 of Lecture Notes in Computer Science, page 87-97. Springer, (2006)