default search action
Mohammed Said Radjef
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j26]Mahdi Rahmoune, Mohammed Said Radjef, Tasseda Boukherroub, Margarida Carvalho:
A new integrated cooperative game and optimization model for the allocation of forest resources. Eur. J. Oper. Res. 316(1): 329-340 (2024) - 2023
- [j25]Mohammed Elaroussi, Lhouari Nourine, Mohammed Said Radjef:
Lattice point of view for argumentation framework. Ann. Math. Artif. Intell. 91(5): 691-711 (2023) - [j24]Mohammed Elaroussi, Lhouari Nourine, Mohammed Said Radjef, Simon Vilmin:
On the preferred extensions of argumentation frameworks: Bijections with naive sets. Inf. Process. Lett. 181: 106354 (2023) - 2022
- [j23]Kamel Meziani, Fazia Rahmoune, Mohammed Said Radjef:
Service pricing and customer behaviour strategies of Stackelberg's equilibrium in an unobservable Markovian queue with unreliable server and delayed repairs. Int. J. Math. Oper. Res. 21(3): 281-304 (2022) - [j22]Hichem Mahiout, Nadir Farhi, Mohammed Said Radjef, Cyril Nguyen Van Phu:
Semi-Decentralized Traffic-Responsive Urban Control. Int. J. Intell. Transp. Syst. Res. 20(3): 696-708 (2022) - [j21]Kamel Meziani, Fazia Rahmoune, Mohammed Said Radjef:
The service pricing strategies and the strategic behavior of customers in an unobservable Markovian queue with unreliable server. RAIRO Oper. Res. 56(1): 213-237 (2022) - 2021
- [j20]Sofiane Touati, Mohammed Said Radjef, Lakhdar Sais:
A Bayesian Monte Carlo method for computing the Shapley value: Application to weighted voting and bin packing games. Comput. Oper. Res. 125: 105094 (2021) - 2019
- [j19]Sara Berri, Samson Lasaulce, Mohammed Said Radjef:
Efficient packet transmission in wireless ad hoc networks with partially informed nodes. EURASIP J. Wirel. Commun. Netw. 2019: 148 (2019) - [j18]Kahina Bouchama, Arnaud Lallouet, Mohammed Said Radjef, Lakhdar Sais:
Solving a Potential Clustering Game. Int. J. Artif. Intell. Tools 28(2): 1950006:1-1950006:26 (2019) - [j17]Lahna Idres, Mohammed Said Radjef:
The efficiency of greedy best response algorithm in road traffic assignment. Int. J. Math. Oper. Res. 15(3): 338-363 (2019) - 2018
- [j16]Naouel Yousfi-Halimi, Mohammed Said Radjef, Hachem Slimani:
Refinement of pure Pareto Nash equilibria in finite multicriteria games using preference relations. Ann. Oper. Res. 267(1-2): 607-628 (2018) - [j15]Myria Bouhaddi, Mohammed Said Radjef, Kamel Adi:
An efficient intrusion detection in resource-constrained mobile ad-hoc networks. Comput. Secur. 76: 156-177 (2018) - [j14]Khaled Maafa, Lhouari Nourine, Mohammed Said Radjef:
Algorithms for computing the Shapley value of cooperative games on lattices. Discret. Appl. Math. 249: 91-105 (2018) - [j13]Lahna Idres, Mohammed Said Radjef:
Adaptation of ant supercolony behavior to solve route assignment problem in integers. Int. J. Intell. Comput. Cybern. 11(3): 423-442 (2018) - [j12]Sofiane Ziani, Fazia Rahmoune, Mohammed Said Radjef:
Equilibrium behavioural strategies in an M/M/1 queue. Int. J. Math. Oper. Res. 13(3): 377-400 (2018) - 2017
- [j11]Imen Heloulou, Mohammed Said Radjef, Mohand Tahar Kechadi:
Automatic multi-objective clustering based on game theory. Expert Syst. Appl. 67: 32-48 (2017) - [j10]Imen Heloulou, Mohammed Said Radjef, Mohand Tahar Kechadi:
A multi-act sequential game-based multi-objective clustering approach for categorical data. Neurocomputing 267: 320-332 (2017) - 2016
- [j9]Hachem Slimani, Mohammed Said Radjef:
Generalized Fritz John optimality in nonlinear programming in the presence of equality and inequality constraints. Oper. Res. 16(2): 349-364 (2016) - [j8]Karima Adel-Aissanou, Sara Berri, Myria Bouhaddi, Mohammed Said Radjef:
Security modeling of an ad hoc network under the constraint of energy by an approach in two steps: Clustering-Evolutionary game. RAIRO Oper. Res. 50(2): 285-296 (2016) - 2015
- [j7]Sofiane Ziani, Fazia Rahmoune, Mohammed Said Radjef:
Customers' strategic behavior in batch arrivals M2/M/1 queue. Eur. J. Oper. Res. 247(3): 895-903 (2015) - [j6]Karima Fahem, Mohammed Said Radjef:
Properly efficient Nash equilibrium in multicriteria noncooperative games. Math. Methods Oper. Res. 82(2): 175-193 (2015) - [j5]Hachem Slimani, Mohammed Said Radjef:
Fritz John type optimality and duality in nonlinear programming under weak pseudo-invexity. RAIRO Oper. Res. 49(3): 451-472 (2015) - 2013
- [j4]Mohamed Maiza, Abdenour Labed, Mohammed Said Radjef:
Efficient algorithms for the offline variable sized bin-packing problem. J. Glob. Optim. 57(3): 1025-1038 (2013) - 2011
- [j3]F. Laib, Mohammed Said Radjef:
Automated traders in commodities markets: Case of producer-consumer institution. Expert Syst. Appl. 38(12): 15134-15142 (2011) - 2010
- [j2]Hachem Slimani, Mohammed Said Radjef:
Nondifferentiable multiobjective programming under generalized dI-invexity. Eur. J. Oper. Res. 202(1): 32-41 (2010) - 2008
- [j1]Mohammed Said Radjef, Karima Fahem:
A note on ideal Nash equilibrium in multicriteria games. Appl. Math. Lett. 21(11): 1105-1111 (2008)
Conference and Workshop Papers
- 2017
- [c9]Sara Berri, Vineeth S. Varma, Samson Lasaulce, Mohammed Said Radjef, Jamal Daafouz:
Studying Node Cooperation in Reputation Based Packet Forwarding Within Mobile Ad Hoc Networks. UNet 2017: 3-13 - 2016
- [c8]Sara Berri, Samson E. Lasaulce, Mohammed Said Radjef:
Power control with partial observation in wireless ad hoc networks. EUSIPCO 2016: 1833-1837 - [c7]Kahina Bouchama, Mohammed Said Radjef, Lakhdar Sais:
Z-Equilibrium For a CSP Game. ISAIM 2016 - [c6]Myria Bouhaddi, Kamel Adi, Mohammed Said Radjef:
Evolutionary Game-Based Defense Mechanism in the MANETs. SIN 2016: 88-95 - 2015
- [c5]Aicha Anzi, Mohammed Said Radjef:
A DC Algorithm for Solving Quadratic-linear Bilevel Optimization Problems. MCO (1) 2015: 119-129 - 2014
- [c4]Imen Heloulou, Mohammed Said Radjef, Mohand Tahar Kechadi:
Clustering Based on Sequential Multi-Objective Games. DaWaK 2014: 369-381 - [c3]Myria Bouhaddi, Mohammed Said Radjef, Kamel Adi:
A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks. FPS 2014: 131-146 - 2011
- [c2]Soheil Sabri, Mohammed Said Radjef, M. Tahar Kechadi:
Evaluation of a clustering technique based on game theory. ICSDM 2011: 71-76 - 1993
- [c1]Mohammed Said Radjef:
The α-core of the positional differential cooperative game. System Modelling and Optimization 1993: 527-537
Informal and Other Publications
- 2022
- [i5]Mohammed Elaroussi, Lhouari Nourine, Mohammed Said Radjef, Simon Vilmin:
On the preferred extensions of argumentation frameworks: bijections with naive extensions. CoRR abs/2202.05506 (2022) - 2020
- [i4]Sara Berri, Vineeth S. Varma, Samson Lasaulce, Mohammed Said Radjef, Jamal Daafouz:
Studying Node Cooperation in Reputation Based Packet Forwarding within Mobile Ad hoc Networks. CoRR abs/2012.01476 (2020) - [i3]Sara Berri, Vineeth S. Varma, Samson Lasaulce, Mohammed Said Radjef:
Correlated Equilibria in Wireless Power Control Games. CoRR abs/2012.01498 (2020) - [i2]Sara Berri, Samson Lasaulce, Mohammed Said Radjef:
Power control with partial observation in wireless ad hoc networks. CoRR abs/2012.01507 (2020) - [i1]Sara Berri, Samson Lasaulce, Mohammed Said Radjef:
Efficient Packet Transmission in Wireless Ad Hoc Networks with Partially Informed Nodes. CoRR abs/2012.01517 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint