


default search action
Mathematical Methods of Operations Research, Volume 76
Volume 76, Number 1, August 2012
- Clemens Thielen

, Stephan Westphal
:
Approximation algorithms for TTP(2). 1-20 - Johannes P. Temme:

Power utility maximization in exponential Lévy models: convergence of discrete-time to continuous-time maximizers. 21-41 - Hisao Kameda, Eitan Altman, Corinne Touati, Arnaud Legrand:

Nash equilibrium based fairness. 43-65 - Thorsten Koch

, Ted K. Ralphs, Yuji Shinano:
Could we use a million cores to solve an integer program? 67-93 - Nam-Dung Hoàng, Thorsten Koch

:
Steiner tree packing revisited. 95-123
Volume 76, Number 2, October 2012
- Jon Lee

, Leo Liberti
:
A matroid view of key theorems for edge-swapping algorithms. 125-127 - Lingchen Kong, Qingmin Meng:

A semismooth Newton method for nonlinear symmetric cone programming. 129-145 - Mehdi Zaferanieh

, Jafar Fathali
:
Finding a core of a tree with pos/neg weight. 147-160 - Daniel Jaume, Jordi Massó

, Alejandro Neme:
The multiple-partners assignment game with heterogeneous sales and multi-unit demands: competitive equilibria. 161-187 - Soonhui Lee, Tito Homem-de-Mello

, Anton J. Kleywegt:
Newsvendor-type models with decision-dependent uncertainty. 189-221 - Dries R. Goossens, Sergey Polyakovskiy

, Frits C. R. Spieksma
, Gerhard J. Woeginger:
Between a rock and a hard place: the two-to-one assignment problem. 223-237
Volume 76, Number 3, December 2012
- Pekka Matomäki:

On solvability of a two-sided singular control problem. 239-271 - Ajay Kumar Bhurjee

, Geetanjali Panda:
Efficient solution of interval optimization problem. 273-288 - Torgny Almgren, Niclas Andréasson, Michael Patriksson

, Ann-Brith Strömberg
, Adam Wojciechowski, Magnus Önnheim:
The opportunistic replacement problem: theoretical analyses and numerical tests. 289-319 - Stephan Dominique Andres:

Game-perfect digraphs. 321-341 - Arantza Estévez-Fernández

, M. Gloria Fiestras-Janeiro
, Manuel A. Mosquera, Estela Sánchez-Rodríguez
:
A bankruptcy approach to the core cover. 343-359 - Li Zhu, Fu-quan Xia

:
Scalarization method for Levitin-Polyak well-posedness of vectorial optimization problems. 361-375 - Lakdere Benkherouf, Michael Johnson:

Optimality of (s, S) policies for jump inventory models. 377-393

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














