default search action
Mohamed Naceur Azaiez
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Umar S. Suryahatmaja, Mehdi Mrad, Mohamed Naceur Azaiez, Asma Ben Yaghlane, Anis Gharbi:
The K Critical Path Sets to Protect in Interdiction Networks Under Limited Defensive Resources. IEEE Trans. Netw. Serv. Manag. 20(4): 5141-5154 (2023) - 2022
- [j17]Mohamed Naceur Azaiez, Anis Gharbi, Imed Kacem, Yosra Makhlouf, Malek Masmoudi:
Two-stage no-wait hybrid flow shop with inter-stage flexibility for operating room scheduling. Comput. Ind. Eng. 168: 108040 (2022) - 2021
- [j16]Mehdi Mrad, Umar S. Suryahatmaja, Asma Ben Yaghlane, Mohamed Naceur Azaiez:
Attack Strategies on Networks With a Budget Constraint. IEEE Access 9: 100530-100547 (2021) - [c2]Mohamed Naceur Azaiez, Anis Gharbi, Imed Kacem, Yosra Makhlouf, Malek Masmoudi:
Two-stage no-wait hybrid flow shop scheduling with inter-stage flexibility: A mathematical model. ICNSC 2021: 1-5 - 2020
- [j15]Mehdi Mrad, Umar S. Suryahatmaja, Asma Ben Yaghlane, Mohamed Naceur Azaiez:
Optimal k Cut-Sets in Attack/Defense Strategies on Networks. IEEE Access 8: 131165-131177 (2020)
2010 – 2019
- 2019
- [j14]Asma Ben Yaghlane, Mohamed Naceur Azaiez:
System survivability to continuous attacks: A game theoretic setting for constant attack rate processes. J. Oper. Res. Soc. 70(8): 1308-1320 (2019) - [j13]Asma Ben Yaghlane, Mohamed Naceur Azaiez, Mehdi Mrad:
System survivability in the context of interdiction networks. Reliab. Eng. Syst. Saf. 185: 362-371 (2019) - 2017
- [j12]Asma Ben Yaghlane, Mohamed Naceur Azaiez:
Systems under attack-survivability rather than reliability: Concept, results, and applications. Eur. J. Oper. Res. 258(3): 1156-1164 (2017) - [c1]Anis Gharbi, Mohamed-Aly Louly, Mohamed Naceur Azaiez:
Physician scheduling using goal programming-an application to a large hospital in Saudi Arabia. CoDIT 2017: 922-925 - 2010
- [j11]Anis Gharbi, Mohamed Naceur Azaiez, Mohamed Kharbeche:
Minimizing Expected Attacking Cost in Networks. Electron. Notes Discret. Math. 36: 947-954 (2010)
2000 – 2009
- 2008
- [j10]Mohamed Naceur Azaiez:
An Integrated DP-MIP Model for Optimal Crop Mix Selection with Deficit Irrigation. Asia Pac. J. Oper. Res. 25(5): 625-647 (2008) - [j9]Mohamed Naceur Azaiez:
Modeling Optimal Allocation of Deficit Irrigation: Application to Crop Production in Saudi Arabia. J. Math. Model. Algorithms 7(3): 277-289 (2008) - 2007
- [j8]Mohamed Naceur Azaiez, Vicki M. Bier:
Optimal resource allocation for security in reliability systems. Eur. J. Oper. Res. 181(2): 773-786 (2007) - 2006
- [j7]Moncer A. Hariga, Mohamed Naceur Azaiez, Mohamed Ben-Daya:
A discounted integrated inspection-maintenance model for a single deteriorating production facility. Int. Trans. Oper. Res. 13(4): 353-364 (2006) - [j6]Moncer Hariga, Mohamed Naceur Azaiez:
Heuristic procedures for the single facility inspection problem with minimal repair and increasing failure rate. J. Oper. Res. Soc. 57(9): 1081-1088 (2006) - 2005
- [j5]Mohamed Naceur Azaiez, S. S. Al Sharif:
A 0-1 goal programming model for nurse scheduling. Comput. Oper. Res. 32: 491-507 (2005) - [j4]Mohamed Naceur Azaiez, Moncer Hariga, Ibrahim Al-Harkan:
A chance-constrained multi-period model for a special multi-reservoir system. Comput. Oper. Res. 32: 1337-1351 (2005) - 2002
- [j3]Mohamed Naceur Azaiez:
A model for conjunctive use of ground and surface water with opportunity costs. Eur. J. Oper. Res. 143(3): 611-624 (2002) - 2001
- [j2]Mohamed Haouari, Mohamed Naceur Azaiez:
Optimal cropping patterns under water deficits. Eur. J. Oper. Res. 130(1): 133-146 (2001) - [j1]Mohamed Naceur Azaiez, Moncer Hariga:
A single-period model for conjunctive use of ground and surface water under severe overdrafts and water deficit. Eur. J. Oper. Res. 133(3): 653-666 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint