default search action
Hong Yan 0002
Person information
- affiliation: Hong Kong Polytechnic University, Department of Management, Hong Kong
- affiliation (PhD): Carnegie Mellon University, Pittsburgh, PA, USA
Other persons with the same name
- Hong Yan — disambiguation page
- Hong Yan 0001 — City University of Hong Kong, Department of Electronic Engineering, Hong Kong (and 2 more)
- Hong Yan 0003 — Yingkou Institute of Technology, College of Electrical Engineering, China
- Hong Yan 0004 — Sun Yat-sen University, School of Computer Science and Engineering, Guangzhou, China
Other persons with a similar name
- Yanhong Fan 0001 (aka: Yan-Hong Fan 0001) — Shandong University, Key Laboratory of Cryptologic Technology and Information Security, School of Cyber Science and Technology, Qingdao, China
- Yan Hong
- Hongyan Sang (aka: Hong-yan Sang)
- Yanhong She (aka: Yan-Hong She) — disambiguation page
- Hong-Sen Yan (aka: Hongsen Yan)
- Hongmei Yan (aka: Hong-Mei Yan) — disambiguation page
- Xiaohong Yan (aka: Xiao-Hong Yan)
- Hongyan Yang (aka: Hong-Yan Yang) — disambiguation page
- Hongyan Yang 0001 (aka: Hong-Yan Yang 0001) — Beijing University of Technology, Faculty of Information Technology, China (and 2 more)
- Hongyan Zhang (aka: Hong-Yan Zhang) — disambiguation page
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j47]Xufeng Yang, Juliang Zhang, Wen Jiao, Hong Yan:
Optimal Capacity Rationing Policy for a Container Leasing System with Multiple Kinds of Customers and Substitutable Containers. Manag. Sci. 69(3): 1468-1485 (2023) - 2022
- [j46]Ping Zhang, King-Wah Pang, Hong Yan:
Coordinating inventory sharing with retailer's return in the consignment contracts. Int. J. Prod. Res. 60(4): 1196-1209 (2022) - [j45]Zu-Jun Ma, Yu-Sen Ye, Ying Dai, Hong Yan:
The price of anarchy in closed-loop supply chains. Int. Trans. Oper. Res. 29(1): 624-656 (2022)
2010 – 2019
- 2018
- [j44]Shaolong Tang, Wenjie Wang, Stella Cho, Hong Yan:
Reducing emissions in transportation and inventory management: (R, Q) Policy with considerations of carbon reduction. Eur. J. Oper. Res. 269(1): 327-340 (2018) - 2017
- [j43]Wen Jiao, Ju-Liang Zhang, Hong Yan:
The stochastic lot-sizing problem with quantity discounts. Comput. Oper. Res. 80: 1-10 (2017) - [j42]Gang Li, Gang Yu, Shouyang Wang, Hong Yan:
Bullwhip and anti-bullwhip effects in a supply chain. Int. J. Prod. Res. 55(18): 5423-5434 (2017) - [j41]Yong Shi, Zhuofan Yang, Hong Yan, Xin Tian:
Delivery efficiency and supplier performance evaluation in China's E-retailing industry. J. Syst. Sci. Complex. 30(2): 392-410 (2017) - 2016
- [j40]Jianbin Li, Qifei Wang, Hong Yan, Stuart X. Zhu:
Optimal Remanufacturing and Pricing Strategies Under Name-Your-Own-Price Auctions and Stochastic Demand. Asia Pac. J. Oper. Res. 33(1): 1650004:1-1650004:22 (2016) - [j39]Zhuofan Yang, Yong Shi, Hong Yan:
Scale, congestion, efficiency and effectiveness in e-commerce firms. Electron. Commer. Res. Appl. 20: 171-182 (2016) - 2013
- [j38]Maoqin Li, Shanlin Li, Hong Yan:
Tower-of-sets analysis for the Kise-Ibaraki-Mine algorithm. Optim. Lett. 7(5): 1017-1026 (2013) - 2012
- [j37]Ping Cao, Jianbin Li, Hong Yan:
Optimal dynamic pricing of inventories with stochastic demand and discounted criterion. Eur. J. Oper. Res. 217(3): 580-588 (2012) - 2011
- [j36]Ci Chen, Hong Yan:
Network DEA model for supply chain performance evaluation. Eur. J. Oper. Res. 213(1): 147-155 (2011) - [j35]Quanling Wei, Hong Yan, Liyong Pang:
Composite Network Data envelopment Analysis Model. Int. J. Inf. Technol. Decis. Mak. 10(4): 613-633 (2011) - [j34]Hong Yan, Quanling Wei:
Data envelopment analysis classification machine. Inf. Sci. 181(22): 5029-5041 (2011) - 2010
- [j33]Jie Wu, Hong Yan:
An effective transformation in ranking using l1-norm in data envelopment analysis. Appl. Math. Comput. 217(8): 4061-4064 (2010) - [j32]Quanling Wei, Hong Yan:
A Data envelopment Analysis (DEA) Evaluation Method Based on Sample Decision Making Units. Int. J. Inf. Technol. Decis. Mak. 9(4): 601-624 (2010) - [j31]Quanling Wei, Hong Yan:
The data envelopment analysis model with intersection form production possibility set. J. Syst. Sci. Complex. 23(6): 1086-1101 (2010) - [j30]Hemant Gogineni, Albert G. Greenberg, David A. Maltz, Tze Sing Eugene Ng, Hong Yan, Hui Zhang:
MMS: An autonomic network-layer foundation for network management. IEEE J. Sel. Areas Commun. 28(1): 15-27 (2010)
2000 – 2009
- 2009
- [j29]Hong Yan, Liying Kang, Guangjun Xu:
The exact domination number of the generalized Petersen graphs. Discret. Math. 309(8): 2596-2607 (2009) - [j28]Jie Wu, Liang Liang, Feng Yang, Hong Yan:
Bargaining game model in the evaluation of decision making units. Expert Syst. Appl. 36(3): 4357-4362 (2009) - 2008
- [j27]Guangjun Xu, Liying Kang, Erfang Shan, Hong Yan:
Proof of a conjecture on k-tuple domination in graphs. Appl. Math. Lett. 21(3): 287-290 (2008) - [j26]Quanling Wei, Hong Yan, Lin Xiong:
A bi-objective generalized data envelopment analysis model and point-to-set mapping projection. Eur. J. Oper. Res. 190(3): 855-876 (2008) - 2007
- [j25]Hong Yan, Xiaoqi Yang, Erfang Shan:
Upper minus total domination in small-degree regular graphs. Discret. Math. 307(21): 2453-2463 (2007) - [c6]Hong Yan, David A. Maltz, T. S. Eugene Ng, Hemant Gogineni, Hui Zhang, Zheng Cai:
Tesseract: A 4D Network Control Plane. NSDI 2007 - 2006
- [j24]Hong Yan, Hui Zhang, Kunwadee Sripanidkulchai, Zon-Yin Shae, Debanjan Saha:
Information leak vulnerabilities in SIP implementations. IEEE Netw. 20(5): 6-13 (2006) - [j23]Bradley R. Schmerl, Jonathan Aldrich, David Garlan, Rick Kazman, Hong Yan:
Discovering Architectures from Running Systems. IEEE Trans. Software Eng. 32(7): 454-466 (2006) - [c5]Quanling Wei, Hong Yan:
Data Envelopment Analysis Assessment Machine. ICDM Workshops 2006: 808-812 - [c4]T. S. Eugene Ng, Hong Yan:
Towards a framework for network control composition. INM@SIGCOMM 2006: 47-51 - 2005
- [j22]June Dong, Ding Zhang, Hong Yan, Anna Nagurney:
Multitiered Supply Chain Networks: Multicriteria Decision - Making Under Uncertainty. Ann. Oper. Res. 135(1): 155-178 (2005) - [j21]Albert G. Greenberg, Gísli Hjálmtýsson, David A. Maltz, Andy Myers, Jennifer Rexford, Geoffrey G. Xie, Hong Yan, Jibin Zhan, Hui Zhang:
A clean slate 4D approach to network control and management. Comput. Commun. Rev. 35(5): 41-54 (2005) - [j20]Gang Li, Shouyang Wang, Hong Yan, Gang Yu:
Information transformation in a supply chain: a simulation study. Comput. Oper. Res. 32: 707-725 (2005) - [c3]Bradley R. Schmerl, David Garlan, Hong Yan:
Dynamically discovering architectures with DiscoTect. ESEC/SIGSOFT FSE 2005: 103-106 - 2004
- [j19]Quanling Wei, Hong Yan:
Congestion and returns to scale in data envelopment analysis. Eur. J. Oper. Res. 153(3): 641-660 (2004) - [c2]Hong Yan, David Garlan, Bradley R. Schmerl, Jonathan Aldrich, Rick Kazman:
DiscoTect: A System for Discovering Architectures from Running Systems. ICSE 2004: 470-479 - 2003
- [j18]Hong Yan, Zhenxin Yu, T. C. Edwin Cheng:
A strategic model for supply chain design with logical constraints: formulation and solution. Comput. Oper. Res. 30(14): 2135-2155 (2003) - [j17]S. J. Li, Hong Yan, Guang-Ya Chen:
Differential and sensitivity properties of gap functions for vector variational inequalities. Math. Methods Oper. Res. 57(3): 377-391 (2003) - 2002
- [j16]Hong Yan, Quanling Wei, Gang Hao:
DEA models for resource reallocation and production input/output estimation. Eur. J. Oper. Res. 136(1): 19-31 (2002) - [j15]Hong Yan, Jiuping Xu:
A class of convex fuzzy mappings. Fuzzy Sets Syst. 129(1): 47-56 (2002) - [j14]Zhenxin Yu, Hong Yan, T. C. Edwin Cheng:
Modelling the benefits of information sharing-based partnerships in a two-level supply chain. J. Oper. Res. Soc. 53(4): 436-446 (2002) - [j13]Hong Yan, Quanling Wei:
Determining compromise weights for group decision making. J. Oper. Res. Soc. 53(6): 680-687 (2002) - [c1]John N. Hooker, Hong Yan:
A Relaxation of the Cumulative Constraint. CP 2002: 686-690 - 2001
- [j12]Zhenxin Yu, Hong Yan, T. C. Edwin Cheng:
Benefits of information sharing with supply chain partnerships. Ind. Manag. Data Syst. 101(3): 114-121 (2001) - [j11]H. Paul Williams, Hong Yan:
Representations of the all_different Predicate of Constraint Satisfaction in Integer Programming. INFORMS J. Comput. 13(2): 96-103 (2001) - 2000
- [j10]Gang Hao, Quanling Wei, Hong Yan:
The generalized DEA model and the convex cone constrained game. Eur. J. Oper. Res. 126(3): 515-525 (2000) - [j9]Hong Yan, Quanling Wei:
A method of transferring cones of intersection form to cones of sum form and its applications in data envelopment analysis models. Int. J. Syst. Sci. 31(5): 629-638 (2000) - [j8]Quanling Wei, Hong Yan, Jian Ma, Zhiping Fan:
A compromise weight for multi-criteria group decision making with individual preference. J. Oper. Res. Soc. 51(5): 625-634 (2000) - [j7]Hong Yan, T. C. Edwin Cheng:
A Reply to Balkhi. J. Oper. Res. Soc. 51(8): 1001-1002 (2000) - [j6]Hong Yan, T. C. Edwin Cheng:
Response to Balkhi's response. J. Oper. Res. Soc. 51(8): 1003 (2000) - [j5]Gang Hao, Quanling Wei, Hong Yan:
A game theoretical model of DEA efficiency. J. Oper. Res. Soc. 51(11): 1319-1329 (2000)
1990 – 1999
- 1999
- [j4]Hong Yan, John N. Hooker:
Tight representation of logical constraints as cardinality rules. Math. Program. 85(2): 363-377 (1999) - 1998
- [j3]Hong Yan, Gerald L. Thompson:
Finding Postal Carrier Walk Paths in Mixed Graphs. Comput. Optim. Appl. 9(3): 229-247 (1998) - [j2]Hong Yan, T. C. Edwin Cheng:
Optimal production stopping and restarting times for an EOQ model with deteriorating items. J. Oper. Res. Soc. 49(12): 1288-1295 (1998) - 1994
- [j1]John N. Hooker, Hong Yan, Ignacio E. Grossmann, Ramesh Raman:
Logic cuts for processing networks with fixed charges. Comput. Oper. Res. 21(3): 265-279 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint