Results 41-50 of 737 (Search time: 0.007 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
An Efficient Mixed Integer Programming Model Based on Timed Petri Nets for Diverse Complex Cluster Tool Scheduling Problems Jung, Chihyun; Lee, Tae-Eog, IEEE TRANSACTIONS ON SEMICONDUCTOR MANUFACTURING, v.25, no.2, pp.186 - 199, 2012-05 | |
Personalized Email Prioritization Based on Content and Social Network Analysis Yang, Yiming; Yoo, Shinjae; Lin, Frank; Moon, Il-Chul, IEEE INTELLIGENT SYSTEMS, v.25, no.4, pp.12 - 18, 2010-07 | |
수명주기가 긴 제품의 설계정보관리를 위한 다층 제품정보 모델링 방안 이재현; 서효원, 한국CAD/CAM학회 논문집, v.17, no.4, pp.234 - 245, 2012-08 | |
Evaluation and optimization of feed-in tariffs Kim, Kyoung-Kuk; Lee, Chi-Guhn, ENERGY POLICY, v.49, pp.192 - 203, 2012-10 | |
What do robust equity portfolio models really do? Kim, Woo Chang; Kim, Jang Ho; Ahn, So Hyoung; Fabozzi, Frank J., ANNALS OF OPERATIONS RESEARCH, v.205, no.1, pp.141 - 168, 2013-05 | |
Hybrid grid generation for viscous flow analysis Park, Seyoun; Jeong, Byungduk; Lee, Jin Gyu; Shin, Hayong, INTERNATIONAL JOURNAL FOR NUMERICAL METHODS IN FLUIDS, v.71, no.7, pp.891 - 909, 2013-03 | |
SCHEDULING ALGORITHMS FOR MOBILE HARBOR: AN EXTENDED M-PARALLEL MACHINE PROBLEM Sung, I.; Nam, H.; Lee, Taesik, INTERNATIONAL JOURNAL OF INDUSTRIAL ENGINEERING-THEORY APPLICATIONS AND PRACTICE, v.20, no.1-2, pp.211 - 224, 2013 | |
A Counterattack- Detection Scheme in Transmission Time-Based Wormhole Detection Methods Kim, Dong-uk; Kim, Hyo-won; Kim, Gisung; Kim, Sehun, INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013 | |
소부대 전술 훈련을 위한 개체기반 워게임 모델과 전차시뮬레이터 연동에 관한 연구 김문수; 김대규; 권혁래; 이태억, 한국군사과학기술학회지, v.15, no.1, pp.36 - 45, 2012-02 | |
Duration-enhancing overlay strategies for defined benefit pension plans Mulvey, J.M.; Kim, Woo Chang; Ma, Y., JOURNAL OF ASSET MANAGEMENT, v.11, no.2-3, pp.136 - 162, 2010-06 |
Discover