Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 70 matches
- 2023
- Ting-Yu Chen:
An advanced approach to multiple criteria optimization and compromise solutions under circular intuitionistic fuzzy uncertainty. Adv. Eng. Informatics 57: 102112 (2023) - Somayeh Soltani, Seyed-Amin Hosseini-Seno:
Detecting the software usage on a compromised system: A triage solution for digital forensics. Forensic Sci. Int. Digit. Investig. 44: 301484 (2023) - Yuan Rong, Liying Yu:
Decision Support System for Prioritization of Offshore Wind Farm Site by Utilizing Picture Fuzzy Combined Compromise Solution Group Decision Method. Entropy 25(7): 1081 (2023) - Atieh Mohammadkhani, Seyed Meysam Mousavi:
A new last aggregation fuzzy compromise solution approach for evaluating sustainable third-party reverse logistics providers with an application to food industry. Expert Syst. Appl. 216: 119396 (2023) - Kuei-Hu Chang:
Integrating Subjective-Objective Weights Consideration and a Combined Compromise Solution Method for Handling Supplier Selection Issues. Syst. 11(2): 74 (2023) - Yuan Rong, Liying Yu, Yi Liu:
Fermatean Fuzzy Combined Compromise Solution Multiple Expert Multiple Criteria Decision-Making Approach. Real Life Applications of Multiple Criteria Decision Making Techniques in Fuzzy Domain 2023: 85-104 - Andrey Zhitnikov, Ori Sztyglic, Vadim Indelman:
No Compromise in Solution Quality: Speeding Up Belief-dependent Continuous POMDPs via Adaptive Multilevel Simplification. CoRR abs/2310.10274 (2023) - Gabe Guo, Judah Goldfeder, Ling Lan, Aniv Ray, Albert Hanming Yang, Boyuan Chen, Simon J. L. Billinge, Hod Lipson:
Towards End-to-End Structure Solutions from Information-Compromised Diffraction Data via Generative Deep Learning. CoRR abs/2312.15136 (2023) - 2022
- Arunodaya Raj Mishra, Pratibha Rani, Abhijit Saha, Ibrahim M. Hezam, Dragan Pamucar, Minja Marinovic, Kiran Pandey:
Assessing the Adaptation of Internet of Things (IoT) Barriers for Smart Cities' Waste Management Using Fermatean Fuzzy Combined Compromise Solution Approach. IEEE Access 10: 37109-37130 (2022) - Xindong Peng, Wenquan Li:
Spherical fuzzy decision making method based on combined compromise solution for IIoT industry evaluation. Artif. Intell. Rev. 55(3): 1857-1886 (2022) - Atieh Mohammadkhani, Seyed Meysam Mousavi:
Assessment of third-party logistics providers by introducing a new stochastic two-phase compromise solution model with last aggregation. Comput. Ind. Eng. 170: 108324 (2022) - Dongmei Wei, Dan Meng, Yuan Rong, Yi Liu, Harish Garg, Dragan Pamucar:
Fermatean Fuzzy Schweizer-Sklar Operators and BWM-Entropy-Based Combined Compromise Solution Approach: An Application to Green Supplier Selection. Entropy 24(6): 776 (2022) - Madjid Tavana, Akram Shaabani, Debora Di Caprio, Abbas Bonyani:
A novel Interval Type-2 Fuzzy best-worst method and combined compromise solution for evaluating eco-friendly packaging alternatives. Expert Syst. Appl. 200: 117188 (2022) - Xindong Peng, Harish Garg, Zhigang Luo:
Hesitant Fuzzy Soft Combined Compromise Solution Method for IoE Companies' Evaluation. Int. J. Fuzzy Syst. 24(1): 457-473 (2022) - Zhiqiang Liao, Huchang Liao, Benjamin Lev:
Compromise solutions for stochastic multicriteria acceptability analysis with uncertain preferences and nonmonotonic criteria. Int. Trans. Oper. Res. 29(6): 3737-3757 (2022) - Gizem Temelcan, Hale Gonce Kocken, Inci Albayrak:
Finding compromise solutions for fully fuzzy multi-objective linear programming problems by using game theory approach. J. Intell. Fuzzy Syst. 42(1): 283-293 (2022) - Ali Ebadi Torkayesh, Morteza Yazdani, Domingo Ribeiro Soriano:
Analysis of industry 4.0 implementation in mobility sector: An integrated approach based on QFD, BWM, and stratified combined compromise solution under fuzzy environment. J. Ind. Inf. Integr. 30: 100406 (2022) - Manuel Arana-Jiménez:
On generating fuzzy Pareto solutions in fully fuzzy multiobjective linear programming via a compromise method. RAIRO Oper. Res. 56(6): 4035-4045 (2022) - Pratibha Rani, Arunodaya Raj Mishra:
Novel Single-Valued Neutrosophic Combined Compromise Solution Approach for Sustainable Waste Electrical and Electronics Equipment Recycling Partner Selection. IEEE Trans. Engineering Management 69(6): 3139-3153 (2022) - Meiqi Wu, Wenbin Deng, Zheng Pei:
An Improved Combined Compromise Solution Method to Select the Best Means of Transport for Travelling. CSAE 2022: 47:1-47:6 - 2021
- Samuel Yousefi, Mahsa Valipour, Muhammet Gul:
Systems failure analysis using Z-number theory-based combined compromise solution and full consistency method. Appl. Soft Comput. 113(Part): 107902 (2021) - Phan Thuy Kieu, Van Thanh Nguyen, Viet Tinh Nguyen, Thanh Phong Ho:
A Spherical Fuzzy Analytic Hierarchy Process (SF-AHP) and Combined Compromise Solution (CoCoSo) Algorithm in Distribution Center Location Selection: A Case Study in Agricultural Supply Chain. Axioms 10(2): 53 (2021) - Elín Björk Böðvarsdóttir, Pieter Smet, Greet Vanden Berghe, Thomas J. R. Stidsen:
Achieving compromise solutions in nurse rostering by using automatically estimated acceptance thresholds. Eur. J. Oper. Res. 292(3): 980-995 (2021) - Fatima Bellahcene, Philippe Marthon:
A compromise solution method for the multiobjective minimum risk problem. Oper. Res. 21(3): 1913-1926 (2021) - 2020
- Zeljko Stevic, Dragan Pamucar, Adis Puska, Prasenjit Chatterjee:
Sustainable supplier selection in healthcare industries using a new MCDM method: Measurement of alternatives and ranking according to COmpromise solution (MARCOS). Comput. Ind. Eng. 140: 106231 (2020) - Huchang Liao, Rui Qin, Di Wu, Morteza Yazdani, Edmundas Kazimieras Zavadskas:
Pythagorean fuzzy combined compromise solution method integrating the cumulative prospect theory and combined weights for cold chain logistics distribution center selection. Int. J. Intell. Syst. 35(12): 2009-2031 (2020) - Rong Zou, Genjiu Xu, Wenzhong Li, Xunfeng Hu:
A coalitional compromised solution for cooperative games. Soc. Choice Welf. 55(4): 735-758 (2020) - Sergey Senkevich, Ekaterina Ilchenko, Aleksandr Prilukov, Mikhail Chaplygin:
The Results of a Compromise Solution, Which Were Obtained on the Basis of the Method of Uncertain Lagrange Multipliers to Determine the Influence of Design Factors of the Elastic-Damping Mechanism in the Tractor Transmission. ICO 2020: 135-144 - Hironobu Nakayama, Ko Ogi, Kazuya Matsuo, Shuichi Kurogi:
Composition and Analysis of Pareto Optimal Compromise Solutions for Multiobjective Robust Controller Using GPC and CAN2s. ICONIP (5) 2020: 713-722 - Songpon Teerakanok, Hiroaki Yasuki, Tetsutaro Uehara:
A Practical Solution Against Business Email Compromise (BEC) Attack using Invoice Checksum. QRS Companion 2020: 160-167
skipping 40 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-08 15:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint