default search action
Simon Miller
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j6]Timothy W. Simpson, Simon Miller, Elliott B. Tibor, Michael A. Yukish, Gary Stump, Hanumanthrao Kannan, Bryan Mesmer, Eliot H. Winer, Christina L. Bloebaum:
Adding Value to Trade Space Exploration When Designing Complex Engineered Systems. Syst. Eng. 20(2): 131-146 (2017) - 2016
- [j5]Simon Miller, Christian Wagner, Uwe Aickelin, Jonathan M. Garibaldi:
Modelling cyber-security experts' decision making processes using aggregation operators. Comput. Secur. 62: 229-245 (2016) - [i2]Simon Miller, Christian Wagner, Uwe Aickelin, Jonathan M. Garibaldi:
Modelling Cyber-Security Experts' Decision Making Processes using Aggregation Operators. CoRR abs/1608.08497 (2016) - 2015
- [j4]Christian Wagner, Simon Miller, Jonathan M. Garibaldi, Derek T. Anderson, Timothy C. Havens:
From Interval-Valued Data to General Type-2 Fuzzy Sets. IEEE Trans. Fuzzy Syst. 23(2): 248-269 (2015) - [c13]Seda Türk, Simon Miller, Ender Özcan, Robert Ivor John:
A simulated annealing approach to supplier selection aware inventory planning. CEC 2015: 1799-1806 - 2014
- [c12]Simon Miller, Christian Wagner, Jonathan M. Garibaldi:
Exploring statistical attributes obtained from fuzzy agreement models. FUZZ-IEEE 2014: 792-799 - [c11]Shabbar Naqvi, Simon Miller, Jonathan M. Garibaldi:
A general type-II similarity based model for breast cancer grading with FTIR spectral data. FUZZ-IEEE 2014: 834-841 - [c10]Amir Pourabdollah, Christian Wagner, Simon Miller, Michael Smith, Ken Wallace:
Towards data-driven environmental planning and policy design-leveraging fuzzy logic to operationalize a planning framework. FUZZ-IEEE 2014: 2230-2237 - 2013
- [j3]Simon Miller, Susan Appleby, Jonathan M. Garibaldi, Uwe Aickelin:
Towards a More Systematic Approach to Secure Systems Design and Analysis. Int. J. Secur. Softw. Eng. 4(1): 11-30 (2013) - [c9]Simon Miller, Jonathan M. Garibaldi, Susan Appleby:
Evolving OWA operators for cyber security decision making problems. CICS 2013: 15-22 - [c8]Christian Wagner, Simon Miller, Jonathan M. Garibaldi:
Similarity based applications for data-driven concept and word models based on type-1 and type-2 fuzzy sets. FUZZ-IEEE 2013: 1-9 - [i1]Simon Miller, Susan Appleby, Jonathan M. Garibaldi, Uwe Aickelin:
Towards a More Systematic Approach to Secure Systems Design and Analysis. CoRR abs/1305.7467 (2013) - 2012
- [j2]Simon Miller, Mario Gongora, Jonathan M. Garibaldi, Robert I. John:
Interval type-2 fuzzy modelling and stochastic search for real-world inventory management. Soft Comput. 16(8): 1447-1459 (2012) - [c7]Simon Miller, Christian Wagner, Jonathan M. Garibaldi, Susan Appleby:
Constructing General Type-2 fuzzy sets from interval-valued data. FUZZ-IEEE 2012: 1-8 - 2011
- [c6]Christian Wagner, Simon Miller, Jonathan M. Garibaldi:
A fuzzy toolbox for the R programming language. FUZZ-IEEE 2011: 1185-1192 - [c5]Simon Miller, Mario Gongora, Robert I. John:
Interval Type-2 Fuzzy Modelling and Simulated Annealing for Real-World Inventory Management. HAIS (1) 2011: 231-238 - 2010
- [j1]Simon Miller, Robert I. John:
An Interval Type-2 Fuzzy multiple echelon supply chain model. Knowl. Based Syst. 23(4): 363-368 (2010) - [c4]Simon Miller, Mario Gongora, Robert I. John:
Inventory optimisation with an Interval Type-2 Fuzzy model. FUZZ-IEEE 2010: 1-7 - [c3]Simon Miller, Mario Gongora, Viara Popova:
Optimising resource plans using an Interval Type-2 Fuzzy model. GEFS 2010: 45-50
2000 – 2009
- 2009
- [c2]Simon Miller, Viara Popova, Robert I. John, Mario Gongora:
An Interval Type-2 Fuzzy Distribution Network. IFSA/EUSFLAT Conf. 2009: 697-702 - [c1]Simon Miller, Robert I. John:
An Interval Type-2 Fuzzy Multiple Echelon Supply Chain Model. SGAI Conf. 2009: 407-420
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint