Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An iterative security game for computing robust and adaptive network flows., and . Comput. Oper. Res., (2022)Strategic Workforce Planning Under Uncertainty., , and . Oper. Res., 70 (2): 1042-1065 (2022)Online Searching., and . Operations Research, 49 (4): 501-515 (2001)Average-Case Performance of Rollout Algorithms for Knapsack Problems., and . J. Optimization Theory and Applications, 165 (3): 964-984 (2015)Evaluation of smart-phone performance for real-time traffic prediction., , , , , , and . ITSC, page 3010-3015. IEEE, (2014)Analysis of Probabilistic Combinatorial Optimization Problems in Euclidean Spaces.. Math. Oper. Res., 18 (1): 51-70 (1993)Gaussian Process Planning with Lipschitz Continuous Reward Functions: Towards Unifying Bayesian Optimization, Active Learning, and Beyond., , and . CoRR, (2015)Probability Distributions on Partially Ordered Sets and Network Security Games., , and . CoRR, (2018)Predicting traffic speed in urban transportation subnetworks for multiple horizons., , , , , , and . ICARCV, page 547-552. IEEE, (2014)On Centralized and Decentralized Architectures for Traffic Applications., , , , , and . IEEE Trans. Intell. Transp. Syst., 17 (7): 1988-1997 (2016)