Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi Agent Systems Based Simulation of Hotel Customers in Revenue Management DSS Benchmarking Platform., , and . IC-AI, page 690-694. CSREA Press, (2007)Information Technologies Supporting Learning., , , , , and . CSEDU (1), page 5-17. INSTICC Press, (2009)Modeling and Simulation of the HADA Reconfigurable UAV., , and . Journal of Intelligent and Robotic Systems, 65 (1-4): 115-122 (2012)Lean potential of network-enabled remote service outsourcing: spatio-temporal decoupling and resource flexibility.. Int. J. Serv. Technol. Manag., 5 (5/6): 448-464 (2004)Structured analysis of alternative evaluation approaches of lab sessions in engineering education., and . EUROCON, page 1-4. IEEE, (2011)A mixed inventory model with variable lead time and random back-order rate., , and . Int. J. Syst. Sci., 36 (6): 329-339 (2005)An Alternative Approach to the Standard Enterprise Resource Planning Life Cycle: Enterprise Reference Metamodeling., , and . ICCSA (3), volume 3982 of Lecture Notes in Computer Science, page 964-973. Springer, (2006)Security Consequences of Messaging Hubs in Many-to-Many E-procurement Solutions., , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 949-959. Springer, (2004)HierGen: A Computer Tool for the Generation of Activity-on-the-Node Hierarchical Project Networks., , , and . ICCSA (3), volume 3045 of Lecture Notes in Computer Science, page 857-866. Springer, (2004)Characterization of the Security Implications of Alternative E-procurement Topologies., and . ICCSA (3), volume 2669 of Lecture Notes in Computer Science, page 114-122. Springer, (2003)