Author of the publication

Using branch-and-bound algorithms to obtain suboptimal solutions.

, , , and . Z. Oper. Research, 27 (1): 177-202 (1983)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of a Polling System with Single Buffers and Its Application to Interconnected Networks., , and . IEEE J. Sel. Areas Commun., 4 (6): 802-812 (1986)Analysis of an Asymmetric Polling System with Single Buffers., , and . Performance, page 241-251. North-Holland, (1987)Performance analysis of CSMA/CD networks with a buffered gateway., , and . IEEE Trans. Commun., 38 (9): 1404-1418 (1990)Performance analysis of CSMA/CD-DRC system., , and . Telecommun. Syst., 15 (1-2): 93-112 (2000)Analysis of Asymmetric Single-Buffer Polling and Priority Systems without Switchover Times., , , and . SIGMETRICS, page 236. ACM, (1989)Mondou: Interface with Text Data Mining for Web Search Engine., and . HICSS (5), page 275-283. IEEE Computer Society, (1998)Sample-path analysis of queueing systems with leaky bucket., and . Broadband Communications, volume 121 of IFIP Conference Proceedings, page 435-446. Chapman & Hall, (1998)Performance Anlaysis of a CSMA/CD System with Heterogeneous Stations., , and . Computer Performance and Reliability, page 473-488. North-Holland, (1987)Evaluation of the File Redundancy in Distributed Database Systems., , , and . IEEE Trans. Software Eng., 11 (2): 199-205 (1985)Performance Evaluation of Prioritized Token Ring Protocols, , , and . page 3.1-3.7. (1985)