Author of the publication

Genetic algorithms for integrating cell formation with machine layout and scheduling.

, , , and . Comput. Ind. Eng., 53 (2): 277-289 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Disclosure and Online Social Networks: From the Case of Facebook News Feed Controversy to a Theoretical Understanding., , , and . AMCIS, page 503. Association for Information Systems, (2010)Neural network system for forecasting method selection., and . Decis. Support Syst., 12 (1): 13-24 (1994)Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods., , , and . Decis. Sci., 32 (4): 635-660 (2001)A semantic authorization model for pervasive healthcare., , and . J. Netw. Comput. Appl., (2014)A Controller/Architecture Co-design Framework for Wireless Cyber-Physical Systems., , , and . iThings/GreenCom/CPSCom/SmartData, page 76-84. IEEE Computer Society, (2017)A heuristic ant algorithm for solving QoS multicast routing problem., , , and . IEEE Congress on Evolutionary Computation, page 1630-1635. IEEE, (2002)Online Structural Break Detection for Pairs Trading Using Wavelet Transform and Hybrid Deep Learning Model., , , , , , , and . BigComp, page 209-216. IEEE, (2020)Automaton segmentation: a new approach to preserve privacy in xml information brokering., , , , and . CCS, page 508-518. ACM, (2007)Information markets vs. opinion pools: an empirical comparison., , , and . EC, page 58-67. ACM, (2005)Privacy Preserving Data Mining Research: Current Status and Key Issues., , , , and . International Conference on Computational Science (3), volume 4489 of Lecture Notes in Computer Science, page 762-772. Springer, (2007)