Publications (78) Publications in which a researcher has participated

2014

  1. (m, q)-isometries on metric spaces

    Journal of Operator Theory, Vol. 72, Núm. 2, pp. 313-329

  2. A MIP-based approach to solve the prize-collecting local access network design problem

    European Journal of Operational Research, Vol. 235, Núm. 3, pp. 727-739

  3. A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems

    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT)

  4. A Study of Rescheduling Strategies for the Quay Crane Scheduling Problem under Random Disruptions

    Inteligencia artificial: Revista Iberoamericana de Inteligencia Artificial, Vol. 17, Núm. 54, pp. 35-47

  5. A Widder's Type Theorem for the Heat Equation with Nonlocal Diffusion

    Archive for Rational Mechanics and Analysis, Vol. 213, Núm. 2, pp. 629-650

  6. A bi-objective vehicle routing problem with time windows: A real case in Tenerife

    Applied Soft Computing Journal, Vol. 17, pp. 140-152

  7. A branch-and-cut algorithm for the hub location and routing problem

    Computers and Operations Research, Vol. 50, pp. 161-174

  8. A comparison of AMF- and Krylov-methods in Matlab for large stiff ODE systems

    Journal of Computational and Applied Mathematics, Vol. 262, pp. 292-303

  9. A completion construction for continuous dynamical systems

    Topological Methods in Nonlinear Analysis, Vol. 44, Núm. 2, pp. 497-526

  10. A domain-specific knowledge-based heuristic for the Blocks Relocation Problem

    Advanced Engineering Informatics

  11. A new multicriteria approach for the analysis of efficiency in the Spanish olive oil sector by modelling decision maker preferences

    European Journal of Operational Research, Vol. 234, Núm. 1, pp. 241-252

  12. A newsvendor inventory model with an emergency order to supply a non-increasing fraction of shortage

    Applied Mathematics and Computation, Vol. 237, pp. 560-570

  13. A polynomial time attack against algebraic geometry code based public key cryptosystems

    IEEE International Symposium on Information Theory - Proceedings

  14. A tabular methodology to identify minimal row degrees for Matrix Padé Approximants

    Journal of Computational and Applied Mathematics, Vol. 261, pp. 30-38

  15. Abundance, biomass and diversity of ground-beetles (Col. Carabidae) as indicators of climatic change effects over elevation strata in Tenerife (Canary Islands)

    Ecological Indicators, Vol. 46, pp. 504-513

  16. An inventory model for deteriorating items with shortages and time-varying demand

    International Journal of Production Economics, Vol. 155, pp. 155-162

  17. Approaches to solve the fleet-assignment, aircraft-routing, crew-pairing and crew-rostering problems of a regional carrier

    Omega (United Kingdom), Vol. 43, pp. 71-82

  18. Approximation in weighted p-mean by RBF networks of Delsarte translates

    Journal of Mathematical Analysis and Applications, Vol. 414, Núm. 1, pp. 450-460

  19. Biased random key genetic algorithm for the Tactical Berth Allocation Problem

    Applied Soft Computing Journal, Vol. 22, pp. 60-76

  20. Bootstrap regularity for integro-differential operators and its application to nonlocal minimal surfaces

    Annali della Scuola normale superiore di Pisa - Classe di scienze , Vol. 13, Núm. 3, pp. 609-639