Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Systems Engineering
1000-5781
2007 Issue 5
tou gao xu zhi
..............page:封3
Mix optimization scheduling approach for multi-resource job-shop
LI Shu-Juan;LI Yan;LIU Zhi-Gang
..............page:551-555
Constrained fuzzy predictive control for multivariable nonlinear systems
SU Bai-li;CHEN Zeng-qiang;YUAN Zhu-zhi
..............page:546-550
Synthetic methods for reliability analysis of phased-mission system with imperfect coverage
CHEN Guang-yu;HUANG Xi-zi;ZHANG Xiao-min;TANG Xiao-wo
..............page:539-545
Model and algorithm for task assignment problem in product data management
LUO Xing-gang;WANG Ding-wei;TANG Jia-fu
..............page:467-473
Application of stochastic linear quadratic optimal control in portfolio selection problem
LI Hong-jie;YANG Xiao-chun
..............page:461-466,473
Interior brittleness process of coal mine accident system
JIN Hong-zhang;WU Hong-mei;LIN De-ming;XUE Ping;ZHAO Jin-xian
..............page:449-454
Extended fuzzy neural network based on T-S model and its application
HAN Min;FAN Ying-nan
..............page:532-538
Integrated dynamic modeling of airline seat inventory control and overbooking
ZHU Jin-fu;LIU Wei;YAO Yun
..............page:525-531
Contract design of job subcontracting for fourth party logistics
WANG Yong;YANG Jin;LIAO Bing
..............page:520-524
Multi-objective flexible job-shop scheduling based on immune algorithm
YU Jian-jun;SUN Shu-dong;LIU Yi-yong
..............page:511-519
Valuation of European option subject to default risk
WU Heng-yu;L(U) Jiang-lin;MIN Xiao-ping
..............page:504-510,531
Study of existence of co-persistence in volatility
DU Zi-ping;ZHANG Wei
..............page:498-503
Compatibility fuzzy analysis on group decision making
CHEN Ye-hua;QIU Wan-hua
..............page:492-497
Comparison and improvement of distances between vague sets
ZHOU Zhen;WU Qi-zong
..............page:486-491
Sequential innovation and entry deterrence with network externalities
LI Ke-ke;CHEN Hong-min
..............page:480-485