Operations Research, Engineering, and Cyber Security
Editor
- Nicholas J. Daras(Hellenic Military Academy)Themistocles M. Rassias(National Technical University of Athens)
Abstract
Individual chapters are listed in the "Chapters" tab
Suggested Citation
DOI: 10.1007/978-3-319-51500-7
Download full text from publisher
To our knowledge, this item is not available for download. To find whether it is available, there are three options:1. Check below whether another version of this item is available online.
2. Check on the provider's web page whether it is in fact available.
3. Perform a search for a similarly titled item that would be available.
Book Chapters
The following chapters of this book are listed in IDEAS- Khalid Addi & Daniel Goeleven, 2017. "Complementarity and Variational Inequalities in Electronics," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 1-43, Springer.
- C. E Athanasiadis & V. Sevroglou & K. I. Skourogiannis, 2017. "Electromagnetic Scattering by a Chiral Impedance Screen," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 45-56, Springer.
- Lakdere Benkherouf & Konstantina Skouri & Ioannis Konstantaras, 2017. "Optimal Batch Production with Rework Process for Products with Time-Varying Demand Over Finite Planning Horizon," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 57-68, Springer.
- Kenier Castillo & Francisco Marcellán & Jorge Rivero, 2017. "On Co-polynomials on the Real Line and the Unit Circle," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 69-94, Springer.
- C. Christopoulos, 2017. "Electromagnetic Compatibility (EMC) in Challenging Environments," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 95-115, Springer.
- Patrizia Daniele & Antonino Maugeri & Anna Nagurney, 2017. "Cybersecurity Investments with Nonlinear Budget Constraints: Analysis of the Marginal Expected Utilities," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 117-134, Springer.
- Nicholas J. Daras, 2017. "Ellipsoid Targeting with Overlap," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 135-154, Springer.
- Bhaskar DasGupta & Venkatkumar Srinivasan, 2017. "A Review of Several Optimization Problems Related to Security in Networked System," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 155-166, Springer.
- C. T. J. Dodson, 2017. "On Some Information Geometric Approaches to Cyber Security," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 167-197, Springer.
- Silvestru Sever Dragomir, 2017. "A Survey of Recent Inequalities for Relative Operator Entropy," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 199-229, Springer.
- Axel Dreves & Joachim Gwinner & Nina Ovcharova, 2017. "On the Use of Elliptic Regularity Theory for the Numerical Solution of Variational Problems," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 231-257, Springer.
- Vladimir V. Goncharov & Grigorii E. Ivanov, 2017. "Strong and Weak Convexity of Closed Sets in a Hilbert Space," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 259-297, Springer.
- Scott Greenhalgh & Monica-Gabriela Cojocaru, 2017. "Non-equilibrium Solutions of Dynamic Networks: A Hybrid System Approach," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 299-315, Springer.
- W. J. Hurley & Jack Brimberg & Andrey Pavlov, 2017. "Measuring Ballistic Dispersion for the Purpose of Ammunition Quality Assurance," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 317-330, Springer.
- Konstantinos A. Raftopoulos & Nikolaos Papadakis & Klimis S. Ntalianis & Paraskevi Tzouveli & Georgios Goudelis & Stefanos D. Kollias, 2017. "Region-Based Watermarking for Images," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 331-343, Springer.
- Konstantina Skouri & Lakdere Benkherouf & Ioannis Konstantaras, 2017. "Optimal Inventory Policies for Finite Horizon Inventory Models with Time Varying Demand: A Unified Presentation," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 345-358, Springer.
- Mihai Turinici, 2017. "Metrical Pareto Efficiency and Monotone EVP," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 359-401, Springer.
- Outi Wilppu & Marko M. Mäkelä & Yury Nikulin, 2017. "New Two-Slope Parameterized Achievement Scalarizing Functions for Nonlinear Multiobjective Optimization," Springer Optimization and Its Applications, in: Nicholas J. Daras & Themistocles M. Rassias (ed.), Operations Research, Engineering, and Cyber Security, pages 403-422, Springer.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:spopap:978-3-319-51500-7. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.