From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The use of mathematical programming to verify rule-based knowledge., и . Ann. Oper. Res., 65 (1): 181-193 (1996)An Activity Theory Analysis of RFID in Hospitals.. Int. J. Appl. Logist., 1 (2): 64-81 (2010)Artificial Intelligence and Virtual Organizations., , и . Commun. ACM, 40 (1): 52-59 (1997)Guest Editor's Introduction: AI for Applications.. IEEE Expert, 11 (4): 59 (1996)Editorial: Transitions.. IEEE Expert, 12 (1): 2 (1997)Editorial: A Lack of Knowledge at the Top.. IEEE Expert, 12 (6): 2 (1997)Developing multiple-agent systems is more than top-down vs. bottom-up. IEEE Intelligent Systems, 13 (2): 2--5 (1998)The Impact of the Euro on Information Systems.. J. Information Systems, 13 (2): 105-116 (1999)SYSCO's Best Business Practices (BBP).. ICIS, Association for Information Systems, (2011)On representation of source reliability through weights on rules.. Int. J. Intell. Syst., 7 (6): 493-503 (1992)