

Author: Chen S.-M.
Publisher: Elsevier
ISSN: 0165-0114
Source: Fuzzy Sets and Systems, Vol.118, Iss.1, 2001-02, pp. : 75-88
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Applying fuzzy set theory to evaluate the rate of aggregative risk in software development
By Huey-Ming L.
Fuzzy Sets and Systems, Vol. 79, Iss. 3, 1996-05 ,pp. :






Fuzzy group decision-making for facility location selection
By Kahraman C. Ruan D. Dogan I.
Information Sciences, Vol. 157, Iss. unknown, 2003-12 ,pp. :