Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Systems Engineering —Theory & Practice
1000-6788
2010 Issue 10
Collaborative allocation of capacity and slot in CDM ADGDP airport
ZHANG Hong-hai;HU Ming-hua
..............page:1901-1908
Grey amplitude incidence model
SHI Hong-xing;LIU Si-feng;FANG Zhi-geng;YANG Bao-hua
..............page:1828-1833
Integrated optimization model for sequencing multi-stage automotive assembly shops
XIONG Fu-li;YAN Hong-sen
..............page:1891-1900
Secondary water distribution based on game analysis and solution by improved genetic algorithm
LI Jian-xun;XIE Jian-cang;SHEN Bing;ZHANG Chen
..............page:1914-1920
Evolution of BBS virtual community and its simulation
WU Yu;XIAO Kai-zhou;LIU Hong-tao;TANG Hong
..............page:1883-1890
Effective hybrid collaborative filtering model based on PCA-SOM
YU Xue;LI Min-qiang
..............page:1850-1854
Distributed data mining model based on Support Vector Machines
JU Chun-hua;GUO Fei-peng
..............page:1855-1863
Time-cost-quality trade-off model based on genetic algorithms and Pareto ranking
CHEN Yong-qiang;GAO Ming;ZHANG Lian-ying
..............page:1774-1780
Chinese movies\' life cycle model and empirical analysis
LI Bo;LU Feng-bin;ZHAO Xiu-juan;WANG Qian;WANG Shou-yang
..............page:1790-1797
Multi-server fuzzy queues based on fuzzy structured element
ZHANG Yan-ju;LIU Jia-xu
..............page:1815-1821
Improved LEM2 rule induction algorithm
XU Yi;LI Long-shu;LI Xue-jun
..............page:1841-1849
Multi-objective flexible job shop scheduling with buffer storage constraints
LI Lin;HUO Jia-zhen
..............page:1803-1814
Frication interference in mixed traffic based on cellular automaton
WEI Li-ying;YING Li-tian
..............page:1909-1913
Pricing issues in a two-echelon dual-channel supply china
XU Chuan-yong;GOU Qing-long;ZHOU Chui-ri;LIANG Liang
..............page:1741-1752
Cryptanalysis and improvement of Park et al.\'s remote user authentication protocol
XIE Qi;CHEN De-ren;YU Xiu-yuan
..............page:1877-1882
Steganalysis based on wavelet packet transform and genetic algorithm
ZHOU Zhi-ping;ZHANG Xiao-xiang;HUI Mao-mao
..............page:1864-1869
New decision model of grey target with both the positive clout and the negative clout
SONG Jie;DANG Yao-guo;WANG Zheng-xin;ZHANG Ke
..............page:1822-1827