-
1
-
-
59649093391
-
If bz medium did spanning trees these would be the same trees as physarum built
-
Andrew Adamatzky. If bz medium did spanning trees these would be the same trees as physarum built. Physics Letters A, 373.
-
Physics Letters A
, pp. 373
-
-
Adamatzky, A.1
-
3
-
-
84861954239
-
Slime mold solves maze in one pass, assisted by gradient of chemo-attractants
-
Andrew Adamatzky. (2012). Slime mold solves maze in one pass, assisted by gradient of chemo-attractants. NanoBioscience, IEEE Transactions on, 11(2): 131-134.
-
(2012)
NanoBioscience, IEEE Transactions on
, vol.11
, Issue.2
, pp. 131-134
-
-
Adamatzky, A.1
-
4
-
-
84922732139
-
A would-be nervous system made from a slime mold
-
Andrew Adamatzky. (2015). A would-be nervous system made from a slime mold. Artificial Life, 21(1): 73-91.
-
(2015)
Artificial Life
, vol.21
, Issue.1
, pp. 73-91
-
-
Adamatzky, A.1
-
6
-
-
32844462205
-
The role of the ds/ahp in identifying inter-group alliances and majority rule within group decision making
-
Malcolm J Beynon. (2006). The role of the ds/ahp in identifying inter-group alliances and majority rule within group decision making. Group Decision and Negotiation, 15(1): 21-42.
-
(2006)
Group Decision and Negotiation
, vol.15
, Issue.1
, pp. 21-42
-
-
Beynon, M.J.1
-
7
-
-
34248395200
-
Evaluation of risk for acts of terrorism using belief and fuzzy sets
-
John L Darby. (2007). Evaluation of risk for acts of terrorism using belief and fuzzy sets. Journal of Nuclear Materials Management, 35(2): 19-34.
-
(2007)
Journal of Nuclear Materials Management
, vol.35
, Issue.2
, pp. 19-34
-
-
Darby, J.L.1
-
8
-
-
0000516376
-
Upper and lower probabilities induced by a multivalued mapping
-
Arthur P Dempster. (1967). Upper and lower probabilities induced by a multivalued mapping. The Annals of Mathematical Statistics, pages 325-339.
-
(1967)
The Annals of Mathematical Statistics
, pp. 325-339
-
-
Dempster, A.P.1
-
9
-
-
84941879377
-
Generalized evidence theory
-
Yong Deng. (2015). Generalized evidence theory. Applied Intelligence, 43(3): 530-543.
-
(2015)
Applied Intelligence
, vol.43
, Issue.3
, pp. 530-543
-
-
Deng, Y.1
-
10
-
-
77956618534
-
Modeling contaminant intrusion in water distribution networks: A new similarity-based dst method
-
Yong Deng, Wen Jiang, and Rehan Sadiq. (2011). Modeling contaminant intrusion in water distribution networks: A new similarity-based dst method. Expert Systems with Applications, 38(1): 571-578.
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.1
, pp. 571-578
-
-
Deng, Y.1
Jiang, W.2
Sadiq, R.3
-
11
-
-
80052032045
-
Risk analysis in a linguistic environment: A fuzzy evidential reasoning-based approach
-
Yong Deng, Rehan Sadiq, Wen Jiang, and Solomon Tesfamariam. (2011). Risk analysis in a linguistic environment: a fuzzy evidential reasoning-based approach. Expert Systems with Applications, 38(12): 15438-15446.
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.12
, pp. 15438-15446
-
-
Deng, Y.1
Sadiq, R.2
Jiang, W.3
Tesfamariam, S.4
-
12
-
-
77951141192
-
The group consensus based evidential reasoning approach for multiple attributive group decision analysis
-
Chao Fu and Shan Lin Yang. (2010). The group consensus based evidential reasoning approach for multiple attributive group decision analysis. European Journal of Operational Research, 206(3): 601-608.
-
(2010)
European Journal of Operational Research
, vol.206
, Issue.3
, pp. 601-608
-
-
Fu, C.1
Yang, S.L.2
-
16
-
-
33749397279
-
Evaluating sensor reliability in classification problems based on evidence theory
-
Huawei Guo, Wenkang Shi, and Yong Deng. (2006). Evaluating sensor reliability in classification problems based on evidence theory. Systems Man and Cybernetics Part BCybernetics, IEEE Transactions on, 36(5): 970-981.
-
(2006)
Systems Man and Cybernetics Part BCybernetics, IEEE Transactions on
, vol.36
, Issue.5
, pp. 970-981
-
-
Guo, H.1
Shi, W.2
Deng, Y.3
-
17
-
-
77953154927
-
Examining metrics and methods for determining critical facility system effectiveness
-
Patrick T. Hester, K. Adams, and Sankaran Mahadevan. (2010). Examining metrics and methods for determining critical facility system effectiveness. International Journal of Critical Infrastructures, 6(3): 105-131.
-
(2010)
International Journal of Critical Infrastructures
, vol.6
, Issue.3
, pp. 105-131
-
-
Hester, P.T.1
Adams, K.2
Mahadevan, S.3
-
18
-
-
84894058438
-
A multicriteria approach to critical facility security system design
-
Patrick T. Hester and Sankaran Mahadevan. (2010). A multicriteria approach to critical facility security system design. Applications of Management Science, 14(2): 105-131.
-
(2010)
Applications of Management Science
, vol.14
, Issue.2
, pp. 105-131
-
-
Hester, P.T.1
Mahadevan, S.2
-
19
-
-
0242351957
-
Chemical facility vulnerability assessment project
-
Calvin D. Jaeger. (2003). Chemical facility vulnerability assessment project. Journal of Hazardous Materials, 104(2): 207-213.
-
(2003)
Journal of Hazardous Materials
, vol.104
, Issue.2
, pp. 207-213
-
-
Jaeger, C.D.1
-
20
-
-
85088006572
-
Development of a vulnerability assessment code for a physical protection system
-
Sung Soon Jang, Sung-Woo Kwak, Hosik Yoo, Jung-Soo Kim, and Wan Ki Yoon. (2009). Development of a vulnerability assessment code for a physical protection system. Nuclear Engineering and Technology, 41(5): 747-752.
-
(2009)
Nuclear Engineering and Technology
, vol.41
, Issue.5
, pp. 747-752
-
-
Jang, S.S.1
Kwak, S.-W.2
Yoo, H.3
Kim, J.-S.4
Yoon, W.K.5
-
21
-
-
84929423672
-
An improved method to rank generalized fuzzy numbers with different left heights and right heights
-
Wen Jiang, Yu Luo, Xiyun Qin, and Jun Zhan. (2015). An improved method to rank generalized fuzzy numbers with different left heights and right heights. Journal of Intelligent & Fuzzy Systems, 28(5): 2343-2355.
-
(2015)
Journal of Intelligent & Fuzzy Systems
, vol.28
, Issue.5
, pp. 2343-2355
-
-
Jiang, W.1
Luo, Y.2
Qin, X.3
Zhan, J.4
-
22
-
-
84929409602
-
Determining basic probability assignment based on the improved similarity measures of generalized fuzzy numbers
-
Wen Jiang, Yan Yang, Yu Luo, and Xiyun Qin. (2015). Determining basic probability assignment based on the improved similarity measures of generalized fuzzy numbers. International Journal of Computers Communications & Control, 10(3): 333-347.
-
(2015)
International Journal of Computers Communications & Control
, vol.10
, Issue.3
, pp. 333-347
-
-
Jiang, W.1
Yang, Y.2
Luo, Y.3
Qin, X.4
-
23
-
-
0010623928
-
A new distance between two bodies of evidence
-
Anne-Laure Jousselme, Dominic Grenier, and Éloi Bossé. (2001). A new distance between two bodies of evidence. Information Fusion, 2(2): 91-101.
-
(2001)
Information Fusion
, vol.2
, Issue.2
, pp. 91-101
-
-
Jousselme, A.-L.1
Grenier, D.2
Bossé, É.3
-
24
-
-
0031102942
-
Probability models for access security system architectures
-
John E Kobza and Sheldon H Jacobson. (1997). Probability models for access security system architectures. Journal of the Operational Research Society, 48(3): 255-263.
-
(1997)
Journal of the Operational Research Society
, vol.48
, Issue.3
, pp. 255-263
-
-
Kobza, J.E.1
Jacobson, S.H.2
-
25
-
-
33947544495
-
Development of a security vulnerability assessment process for the ramcap chemical sector
-
David A. Moorea, Brad Fuller, Michael Hazzan, and J. William Jones. (2007). Development of a security vulnerability assessment process for the ramcap chemical sector. Journal of Hazardous Materials, 142(2): 689-694.
-
(2007)
Journal of Hazardous Materials
, vol.142
, Issue.2
, pp. 689-694
-
-
Moorea, D.A.1
Fuller, B.2
Hazzan, M.3
William Jones, J.4
-
26
-
-
0033728781
-
Combining belief functions when evidence conflicts
-
Catherine K Murphy. (2000). Combining belief functions when evidence conflicts. Decision Support Systems, 29(1): 1-9.
-
(2000)
Decision Support Systems
, vol.29
, Issue.1
, pp. 1-9
-
-
Murphy, C.K.1
-
27
-
-
35348951490
-
A bilevel mixed-integer program for critical infrastructure protection planning
-
Maria P Scaparra and Richard L Church. (2008). A bilevel mixed-integer program for critical infrastructure protection planning. Computers & Operations Research, 35(6): 1905-1923.
-
(2008)
Computers & Operations Research
, vol.35
, Issue.6
, pp. 1905-1923
-
-
Scaparra, M.P.1
Church, R.L.2
-
28
-
-
0004209735
-
-
Princeton University Press, Princeton University Press, Princeton
-
Glenn Shafer. (1976). A Mathematical Theory of Evidence. Princeton University Press, Princeton University Press, Princeton.
-
(1976)
A Mathematical Theory of Evidence
-
-
Shafer, G.1
-
29
-
-
84938214454
-
Dependence assessment in Human Reliability Analysis using evidence theory and AHP
-
Xiaoyan Su, Sankaran Mahadevan, Peida Xu, and Yong Deng. (2015). Dependence assessment in Human Reliability Analysis using evidence theory and AHP. Risk Analysis, 35(7): 1296-1316.
-
(2015)
Risk Analysis
, vol.35
, Issue.7
, pp. 1296-1316
-
-
Su, X.1
Mahadevan, S.2
Xu, P.3
Deng, Y.4
-
30
-
-
33846443614
-
A mathematical model for adaptive transport network in path finding by true slime mold
-
Atsushi Tero, Ryo Kobayashi, and Toshiyuki Nakagaki. (2007). A mathematical model for adaptive transport network in path finding by true slime mold. Journal of Theoretical Biology, 244(4): 553-564.
-
(2007)
Journal of Theoretical Biology
, vol.244
, Issue.4
, pp. 553-564
-
-
Tero, A.1
Kobayashi, R.2
Nakagaki, T.3
-
31
-
-
79955036409
-
Risk analysis of physical protection system based on evidence theory
-
Peida Xu, Xiaoyan Su, Jiyi Wu, Xiaohong Sun, Yajuan Zhang, and Yong Deng. (2010). Risk analysis of physical protection system based on evidence theory. Journal of Information and Computational Science, 7(13): 2871-2878.
-
(2010)
Journal of Information and Computational Science
, vol.7
, Issue.13
, pp. 2871-2878
-
-
Xu, P.1
Su, X.2
Wu, J.3
Sun, X.4
Zhang, Y.5
Deng, Y.6
-
32
-
-
84907054235
-
The optimal path tour problem
-
Chao Yan, Cai Gao, Jianjun Yu, Yong Deng, and Kai Nan. (2014). The optimal path tour problem. International Journal Of Unconventional computing, 10(5-6): 429-454.
-
(2014)
International Journal Of Unconventional computing
, vol.10
, Issue.5-6
, pp. 429-454
-
-
Yan, C.1
Gao, C.2
Yu, J.3
Deng, Y.4
Nan, K.5
-
33
-
-
4544357255
-
Combining belief functions based on distance of evidence
-
Deng Yong, Shi WenKang, Zhu ZhenFu, and Liu Qi. (2004). Combining belief functions based on distance of evidence. Decision Support Systems, 38(3): 489-493.
-
(2004)
Decision Support Systems
, vol.38
, Issue.3
, pp. 489-493
-
-
Yong, D.1
WenKang, S.2
ZhenFu, Z.3
Qi, L.4
-
34
-
-
84877341037
-
Solving 0-1 knapsack problems based on amoeboid organism algorithm
-
Xiaoge Zhang, Shiyan Huang, Yong Hu, Yajuan Zhang, Sankaran Mahadevan, and Yong Deng. (2013). Solving 0-1 knapsack problems based on amoeboid organism algorithm. Applied Mathematics and Computation, 219(19): 9959-9970.
-
(2013)
Applied Mathematics and Computation
, vol.219
, Issue.19
, pp. 9959-9970
-
-
Zhang, X.1
Huang, S.2
Hu, Y.3
Zhang, Y.4
Mahadevan, S.5
Deng, Y.6
-
35
-
-
84887899268
-
A physarum polycephalum optimization algorithm for the bi-objective shortest path problem
-
Xiaoge Zhang, QingWang, Felix TS Chan, Sankaran Mahadevan, and Yong Deng. (2014). A physarum polycephalum optimization algorithm for the bi-objective shortest path problem. International Journal of Unconventional Computing, 10(1-2): 143-162.
-
(2014)
International Journal of Unconventional Computing
, vol.10
, Issue.1-2
, pp. 143-162
-
-
Zhang, X.1
QingWang2
Felix, T.3
Chan, S.4
Mahadevan, S.5
Deng, Y.6
-
36
-
-
84875181451
-
A biologically inspired solution for fuzzy shortest path problems
-
Yajuan Zhang, Zili Zhang, Yong Deng, and Sankaran Mahadevan. (2013). A biologically inspired solution for fuzzy shortest path problems. Applied Soft Computing, 13(5): 2356-2363.
-
(2013)
Applied Soft Computing
, vol.13
, Issue.5
, pp. 2356-2363
-
-
Zhang, Y.1
Zhang, Z.2
Deng, Y.3
Mahadevan, S.4
|