Skip to main menu
Scroll to content
Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit
https://bibliotekanauki.pl
Search
Browse
About
test
Issue details
Link to site
Copy
Publisher
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Journal
Operations Research and Decisions
Year
2014
Volume
24
Issue
3
Identifiers
Cover
Volume contents
3
article:
Theoretical and methodological bases of threats. The method of security management support
(
GALANC T.
,
KOŁWZAN W.
,
PIERONEK J.
), p. 5-21
article:
Choosing what to protect when attacker resources and asset valuations are uncertain
(
HAUSKEN K.
), p. 23-44
article:
Optimization of an M/M/1/N feedback queue with retention of reneged customers
(
KUMAR R.
,
JAIN N. K.
,
SOM B. K.
), p. 45-58
article:
A game theoretical study of generalized trust and reciprocation in Poland: I. Theory and experimental design
(
MARKOWSKA-PRZYBYŁA U.
,
RAMSEY D.
), p. 59-76
article:
A collaborative strategy for a three echelon supply chain with ramp type demand, deterioration and inflation
(
SINGH N.
,
VAISH B.
,
SINGH S. R.
), p. 77-100
open years
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.