{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T05:13:42Z","timestamp":1774674822546,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T00:00:00Z","timestamp":1572048000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T00:00:00Z","timestamp":1572048000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61822304"],"award-info":[{"award-number":["61822304"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61673058"],"award-info":[{"award-number":["61673058"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017054","name":"NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization","doi-asserted-by":"crossref","award":["U1609214"],"award-info":[{"award-number":["U1609214"]}],"id":[{"id":"10.13039\/100017054","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012659","name":"Foundation for Innovative Research Groups of the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61621063"],"award-info":[{"award-number":["61621063"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Projects of Major International (Regional) Joint Research Program NSFC","award":["61720106011"],"award-info":[{"award-number":["61720106011"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s10479-019-03435-4","type":"journal-article","created":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T14:04:32Z","timestamp":1572098672000},"page":"639-666","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Solving bi-objective uncertain stochastic resource allocation problems by the CVaR-based risk measure and decomposition-based multi-objective evolutionary algorithms"],"prefix":"10.1007","volume":"296","author":[{"given":"Juan","family":"Li","sequence":"first","affiliation":[]},{"given":"Bin","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Panos M.","family":"Pardalos","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,26]]},"reference":[{"issue":"6","key":"3435_CR1","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1287\/opre.1070.0440","volume":"55","author":"RK Ahuja","year":"2007","unstructured":"Ahuja, R. K., Kumar, A., Jha, K. C., & Orlin, J. B. (2007). Exact and heuristic algorithms for the weapon-target assignment problem. Operations Research, 55(6), 1136\u20131146.","journal-title":"Operations Research"},{"issue":"2","key":"3435_CR2","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1023\/A:1022525529778","volume":"9","author":"DE Blodgett","year":"2003","unstructured":"Blodgett, D. E., Gendreau, M., & Potvin, J. Y. (2003). A Tabu search heuristic for resource management in naval warfare. Journal of Heuristics, 9(2), 145\u2013169.","journal-title":"Journal of Heuristics"},{"key":"3435_CR3","unstructured":"Braford, J. C.: Determination of optimal assignment of a weapon system to several targets,. Tech. rep., Vought Aeronautics, Dallas, Texas (1961, AEREITM-9)."},{"issue":"4","key":"3435_CR4","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TSMCB.2002.804372","volume":"32","author":"D Buche","year":"2002","unstructured":"Buche, D., Stoll, P., Dornberger, R., & Koumoutsakos, P. (2002). Multiobjective evolutionary algorithm for the optimization of noisy combustion processes. IEEE Transactions on Systems Man and Cybernetics: Part C, 32(4), 460\u2013473.","journal-title":"IEEE Transactions on Systems Man and Cybernetics: Part C"},{"key":"3435_CR5","unstructured":"Cai, H. P. (2010). Study on firepower optimal distribution of artillery group based on NSGA-II. Ph.D. thesis, Changsha, Hunan, P. R. China: National University of Defense Technology."},{"issue":"3","key":"3435_CR6","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1016\/S1004-4132(06)60097-2","volume":"17","author":"H Cai","year":"2006","unstructured":"Cai, H., Liu, J., Chen, Y., & Wang, H. (2006). Survey of the research on dynamic weapon-target assignment problem. Journal of Systems Engineering and Electronics, 17(3), 559\u2013565.","journal-title":"Journal of Systems Engineering and Electronics"},{"issue":"4","key":"3435_CR7","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s10732-014-9265-y","volume":"22","author":"M Caserta","year":"2016","unstructured":"Caserta, M., & Vo\u00df, S. (2016). A corridor method based hybrid algorithm for redundancy allocation. Journal of Heuristics, 22(4), 405\u2013429.","journal-title":"Journal of Heuristics"},{"issue":"5","key":"3435_CR8","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1109\/TEVC.2017.2683489","volume":"21","author":"J Chen","year":"2017","unstructured":"Chen, J., Li, J., & Xin, B. (2017). DMOEA-$\\varepsilon {\\rm C}$: Decomposition-based multi-objetive evolutionary algorithm with the $\\varepsilon $-constraint framework. IEEE Transactions on Evolutionary Computation, 21(5), 714\u2013730.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"3435_CR9","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.compind.2004.06.002","volume":"56","author":"TC Chen","year":"2005","unstructured":"Chen, T. C., & You, P. S. (2005). Immune algorithms-based approach for redundant reliability problems with multiple component choices. Computers in Industry, 56, 195\u2013205.","journal-title":"Computers in Industry"},{"issue":"5","key":"3435_CR10","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/0167-6377(92)90008-Q","volume":"11","author":"M Chern","year":"1992","unstructured":"Chern, M. (1992). On the computational complexity of reliability redundancy allocation in a series system. Operations Research Letters, 11(5), 309\u2013315.","journal-title":"Operations Research Letters"},{"issue":"8","key":"3435_CR11","doi-asserted-by":"crossref","first-page":"082301","DOI":"10.1007\/s11432-015-5434-3","volume":"59","author":"HY Chu","year":"2016","unstructured":"Chu, H. Y., Xu, P. P., & Yang, C. C. (2016). Joint relay selection and power control for robust cooperative multicast in mmWave WPANs. Science China-Information Sciences, 59(8), 082301.","journal-title":"Science China-Information Sciences"},{"issue":"6","key":"3435_CR12","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1287\/opre.14.6.992","volume":"14","author":"RH Day","year":"1966","unstructured":"Day, R. H. (1966). Allocating weapons to target complexes by means of nonlinear programming. Operations Research, 14(6), 992\u20131013.","journal-title":"Operations Research"},{"issue":"2\u20134","key":"3435_CR13","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/S0045-7825(99)00389-8","volume":"186","author":"K Deb","year":"2000","unstructured":"Deb, K. (2000). An efficient constraint handling method for genetic algorithms. Computer Methods in Applied Mechanics and Engineering, 186(2\u20134), 311\u2013338.","journal-title":"Computer Methods in Applied Mechanics and Engineering"},{"issue":"1","key":"3435_CR14","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10479-017-2447-x","volume":"254","author":"N Dehghan Hardoroudi","year":"2017","unstructured":"Dehghan Hardoroudi, N., Keshvari, A., Kallio, M., & Korhonen, P. (2017). Solving cardinality constrained mean-variance portfolio problems via milp. Annals of Operations Research, 254(1), 47\u201359.","journal-title":"Annals of Operations Research"},{"issue":"3","key":"3435_CR15","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1287\/opre.7.3.322","volume":"7","author":"GG denBroeder Jr","year":"1959","unstructured":"denBroeder, G. G, Jr., Ellison, R. E., & Emerling, L. (1959). On optimum target assignments. Operations Research, 7(3), 322\u2013326.","journal-title":"Operations Research"},{"key":"3435_CR16","unstructured":"Gomes\u00a0de Mattos, R., Oliveira, F., Leiras, A., Baptista\u00a0de Paula\u00a0Filho, A., & Gon\u00e7alves, P. (2018). Robust optimization of the insecticide-treated bed nets procurement and distribution planning under uncertainty for malaria prevention and control. Annals of Operations Research."},{"key":"3435_CR17","unstructured":"Hosein, P. A., Walton, J. T., & Athans, M. (1988). Dynamic weapon-target assignment problems with vulnerable C2 nodes. Massachusetts Inst of Tech Cambridge Lab for Information and Decision Systems: Tech. rep."},{"key":"3435_CR18","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.ress.2015.06.002","volume":"142","author":"CL Huang","year":"2015","unstructured":"Huang, C. L. (2015). A particle-based simplified swarm optimization algorithm for reliability redundancy allocation problems. Reliability Engineering and System Safety, 142, 221\u2013230.","journal-title":"Reliability Engineering and System Safety"},{"key":"3435_CR19","doi-asserted-by":"crossref","unstructured":"Hughes, E. J. (2001). Evolutionary multi-objective ranking with uncertainty and noise. In Proceedings of IEEE international conference on evolutionary multi-criterion optimization (pp. 329\u2013343).","DOI":"10.1007\/3-540-44719-9_23"},{"key":"3435_CR20","unstructured":"Jiang, S. W., Cai, Z. H., Zhang, J., & Ong, Y. S. (2011). Multiobjective optimization by decomposition with Pareto-adaptive weight vectors Pareto-adaptive weight vectors. In Proceedings of IEEE international conference on natural computation (pp. 1260\u20131264)."},{"key":"3435_CR21","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s10479-018-2940-x","volume":"275","author":"BL Johnson","year":"2018","unstructured":"Johnson, B. L., Porter, A. T., King, J. C., & Newman, A. M. (2018). Optimally configuring a measurement system to detect diversions from a nuclear fuel cycle. Annals of Operations Research, 275, 393\u2013420.","journal-title":"Annals of Operations Research"},{"issue":"4","key":"3435_CR22","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.ress.2012.03.006","volume":"103","author":"K Khalili-Damghani","year":"2012","unstructured":"Khalili-Damghani, K., & Amiri, M. (2012). Solving binary-state multi-objective reliability redundancy allocation series-parallel problem using efficient epsilon-constraint, multi-start partial bound enumeratio nalgorithm, and DEA. Reliability Engineering and System Safety, 103(4), 35\u201344.","journal-title":"Reliability Engineering and System Safety"},{"key":"3435_CR23","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.cor.2018.10.015","volume":"105","author":"A Kline","year":"2019","unstructured":"Kline, A., Ahner, D., & Hill, R. (2019). The weapon-target assignment problem. Computers and Operations Research, 105, 226\u2013236.","journal-title":"Computers and Operations Research"},{"key":"3435_CR24","first-page":"225","volume-title":"Use of conditional value-at-risk in stochastic programs with poorly defined distributions","author":"P Krokhmal","year":"2004","unstructured":"Krokhmal, P., Murphey, R., Pardalos, P., & Uryasev, S. (2004). Use of conditional value-at-risk in stochastic programs with poorly defined distributions (pp. 225\u2013241). Boston: Springer."},{"key":"3435_CR25","unstructured":"Leboucher, C., Shin, H. S., Siarry, P., Chelouah, R., Menec, S. L., & Tsourdos, A. (2013). A two-step optimisation method for dynamic weapon target assignment problem. IntechOpen: Tech. rep."},{"issue":"1","key":"3435_CR26","first-page":"198","volume":"40","author":"MZ Lee","year":"2010","unstructured":"Lee, M. Z. (2010). Constrained weapon-target assignment: Enhanced very large scale neighborhood search algorithm. IEEE Transactions on Systems Man and Cybernetics Part A, 40(1), 198\u2013204.","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part A"},{"key":"3435_CR27","first-page":"E627-A","volume":"84","author":"CY Lee","year":"2002","unstructured":"Lee, C. Y., Gen, M., & Kuo, W. (2002). Reliability optimization design using hybridized genetic algorithm with a neural network technique. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 84, E627-A\u2013637.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"3435_CR28","doi-asserted-by":"crossref","unstructured":"Li, J., Chen, J., Xin, B., & Dou, L. H. (2015). Solving multi-objective multi-stage weapon target assignment problem via Adaptive NSGA-II and Adaptive MOEA\/D: A comparison study. In Proceedings of IEEE congress on evolutionary computation (pp 3132\u20133139).","DOI":"10.1109\/CEC.2015.7257280"},{"key":"3435_CR29","doi-asserted-by":"crossref","unstructured":"Li, J., Chen, J., Xin, B., Dou, L. H., & Peng, Z. H. (2016). Solving the uncertain multi-objective multi-stage weapon target assignment problem via MOEA\/D-AWA. In Proceedings of IEEE congress on evolutionary computation (pp 4934\u20134941).","DOI":"10.1109\/CEC.2016.7744423"},{"issue":"8","key":"3435_CR30","doi-asserted-by":"crossref","first-page":"082401","DOI":"10.1007\/s11432-015-0471-4","volume":"59","author":"MH Li","year":"2016","unstructured":"Li, M. H., Huang, G. M., & Zhou, D. (2016). A yield-enhanced global optimization methodology for analog circuit based on extreme value theory. Science China-Information Sciences, 59(8), 082401.","journal-title":"Science China-Information Sciences"},{"issue":"1","key":"3435_CR31","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.ejor.2009.05.003","volume":"202","author":"X Li","year":"2010","unstructured":"Li, X., Qin, Z., & Kar, S. (2010). Mean-variance-skewness model for portfolio selection with fuzzy returns. European Journal of Operational Research, 202(1), 239\u2013247.","journal-title":"European Journal of Operational Research"},{"issue":"10","key":"3435_CR32","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1016\/j.ress.2009.02.022","volume":"94","author":"ZJ Li","year":"2009","unstructured":"Li, Z. J., Liao, H. T., & Coit, D. W. (2009). A two-stage approach for multi-objective decision making with applications to system reliability optimization. Reliability Engineering and System Safety, 94(10), 1585\u20131592.","journal-title":"Reliability Engineering and System Safety"},{"key":"3435_CR33","doi-asserted-by":"crossref","unstructured":"Liefooghe, A., Basseur, M., Jourdan, L., & Talbi, E. G. (2007). Combinatorial optimization of stochastic multi-objective problems: An application to the flow-shop scheduling problem. In Proceedings of IEEE international conference on evolutionary multi-criterion optimization (pp 457\u2013471).","DOI":"10.1007\/978-3-540-70928-2_36"},{"key":"3435_CR34","volume-title":"Theory and practice of uncertain programming","author":"BD Liu","year":"2009","unstructured":"Liu, B. D. (2009). Theory and practice of uncertain programming. Berlin: Springer."},{"key":"3435_CR35","unstructured":"Lloyd, S. P., & Witsenhausen, H. S. (1986). Weapons allocation is NP-complete. In Proceedings of IEEE summer conference on simulation (pp. 1054\u20131058)."},{"issue":"3","key":"3435_CR36","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1287\/opre.6.3.346","volume":"6","author":"AS Manne","year":"1958","unstructured":"Manne, A. S. (1958). A target-assignment problem. Operations Research, 6(3), 346\u2013351.","journal-title":"Operations Research"},{"issue":"12","key":"3435_CR37","first-page":"1","volume":"18","author":"XL Ma","year":"2014","unstructured":"Ma, X. L., Qi, Y. T., Li, L. L., Liu, F., Jiao, L. C., & Wu, J. S. (2014). MOEA\/D with uniform decomposition measurement for many-objective problems. Soft Computing, 18(12), 1\u201324.","journal-title":"Soft Computing"},{"key":"3435_CR38","volume-title":"Nonlinear multiobjective optimization","author":"K Miettinen","year":"1999","unstructured":"Miettinen, K. (1999). Nonlinear multiobjective optimization. Boston: Kluwer Academic Publishers."},{"key":"3435_CR39","volume-title":"Design and analysis of experiments","author":"DC Montgomery","year":"2005","unstructured":"Montgomery, D. C. (2005). Design and analysis of experiments. Arizona: Wiley."},{"key":"3435_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ress.2004.02.007","volume":"87","author":"N Nahas","year":"2005","unstructured":"Nahas, N., & Nourelfath, M. (2005). Ant system for reliability optimization of a series system with multiple-choice and budget constraints. Reliability Engineering and System Safety, 87, 1\u201312.","journal-title":"Reliability Engineering and System Safety"},{"issue":"1","key":"3435_CR41","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s10479-017-2732-8","volume":"262","author":"K Pavlikov","year":"2018","unstructured":"Pavlikov, K., & Uryasev, S. (2018). Cvar distance between univariate probability distributions and approximation problems. Annals of Operations Research, 262(1), 67\u201388.","journal-title":"Annals of Operations Research"},{"key":"3435_CR42","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1109\/24.914551","volume":"49","author":"VR Prasad","year":"2000","unstructured":"Prasad, V. R., & Kuo, W. (2000). Reliability optimization of coherent systems. IEEE Transactions on Reliability, 49, 323\u2013330.","journal-title":"IEEE Transactions on Reliability"},{"issue":"2","key":"3435_CR43","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1162\/EVCO_a_00109","volume":"22","author":"YT Qi","year":"2014","unstructured":"Qi, Y. T., Ma, X. L., Liu, F., Jiao, L. C., Sun, J. Y., & Wu, J. S. (2014). MOEA\/D with adaptive weight adjustment. Evolutionary Computation, 22(2), 231\u2013264.","journal-title":"Evolutionary Computation"},{"key":"3435_CR44","volume-title":"A Primer on the Taguchi method","author":"RK Roy","year":"2010","unstructured":"Roy, R. K. (2010). A Primer on the Taguchi method. Dearborn: Society of Manufacturing Engineers."},{"key":"3435_CR45","doi-asserted-by":"crossref","unstructured":"Sulieman, D., Jourdan, L., & Talbi, E. (2010). Using multiobjective metaheuristics to solve VRP with uncertain demands. In Proceedings of IEEE international conference on evolutionary computation (pp. 1\u20138).","DOI":"10.1109\/CEC.2010.5586538"},{"key":"3435_CR46","first-page":"158","volume":"127","author":"CS Sung","year":"2000","unstructured":"Sung, C. S., & Cho, Y. K. (2000). Reliability optimization of a series system with multiple-choice and budget constraints. European Journal of Operational Research, 127, 158\u2013171.","journal-title":"European Journal of Operational Research"},{"issue":"3","key":"3435_CR47","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.ress.2006.04.014","volume":"92","author":"HA Taboada","year":"2007","unstructured":"Taboada, H. A., Baheranwala, F., Coit, D. W., & Wattanapongsakorn, N. (2007). Practical solutions for multi-objective optimization: An application to system reliability design problems. Reliability Engineering and System Safety, 92(3), 314\u2013332.","journal-title":"Reliability Engineering and System Safety"},{"key":"3435_CR48","doi-asserted-by":"crossref","unstructured":"Teich, J. (2001). Pareto-front exploration with uncertain objectives. In Proceedings of IEEE international conference on evolutionary multi-criterion optimization (pp. 314\u2013328).","DOI":"10.1007\/3-540-44719-9_22"},{"key":"3435_CR49","volume-title":"Optimization of system reliability","author":"FA Tillman","year":"1980","unstructured":"Tillman, F. A., Hwuang, C. L., & Kuo, W. (1980). Optimization of system reliability. New York: Marcel Dekker."},{"issue":"1","key":"3435_CR50","doi-asserted-by":"crossref","first-page":"13","DOI":"10.3934\/jimo.2015.11.13","volume":"11","author":"ZT Wang","year":"2014","unstructured":"Wang, Z. T., Guo, J. S., Zheng, M. F., & Yang, Y. S. (2014). A new approach for uncertain multiobjective programming problem based on ${P_E}$ principle. Journal of Industrial and Management Optimization, 11(1), 13\u201326.","journal-title":"Journal of Industrial and Management Optimization"},{"key":"3435_CR51","unstructured":"Wu, L., Wang, H. Y., Lu, F. X., & Jia, P. F. (2008). An anytime algorithm based on modified GA for dynamic weapon-target allocation problem. In Proceedings of IEEE congress on computational intelligence (pp. 2020\u20132025)."},{"issue":"3","key":"3435_CR52","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1109\/TSMCA.2010.2089511","volume":"41","author":"B Xin","year":"2011","unstructured":"Xin, B., Chen, J., Peng, Z. H., Dou, L. H., & Zhang, J. (2011). An efficient rule-based constructive heuristic to solve dynamic weapon-target assignment problem. IEEE Transactions on Systems Man and Cybernetics: Part A Systems and Humans, 41(3), 598\u2013606.","journal-title":"IEEE Transactions on Systems Man and Cybernetics: Part A Systems and Humans"},{"issue":"6","key":"3435_CR53","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSMCC.2010.2049261","volume":"40","author":"B Xin","year":"2010","unstructured":"Xin, B., Chen, J., Zhang, J., Dou, L. H., & Peng, Z. H. (2010). Efficient decision makings for dynamic weapon-target assignment by virtual permutation and tabu search heuristics. IEEE Transactions on Systems Man and Cybernetics: Part C, 40(6), 649\u2013662.","journal-title":"IEEE Transactions on Systems Man and Cybernetics: Part C"},{"issue":"2","key":"3435_CR54","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1007\/s11277-013-1396-1","volume":"75","author":"L Xu","year":"2014","unstructured":"Xu, L., Yang, Y. W., & Li, Y. P. (2014). Resource allocation of limited feedback in clustered wireless mesh networks. Wireless Personal Communications, 75(2), 901\u2013913.","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"3435_CR55","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1109\/TEVC.2007.892759","volume":"11","author":"Q Zhang","year":"2007","unstructured":"Zhang, Q., & Li, H. (2007). MOEA\/D: A multiobjective evolutionary algorithm based on decomposition. IEEE Transactions on Evolutionary Computation, 11(6), 712\u2013731.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"3435_CR56","unstructured":"Zhou, A., Zhang, Q., Jin, Y., Tsang, E., & Okabe, T. (2005). A model-based evolutionary algorithm for bi-objective optimization. In Proceedings of the IEEE congress on evolutionary computation (pp. 2568\u20132575)."},{"issue":"1","key":"3435_CR57","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s10479-012-1127-0","volume":"212","author":"X Zhu","year":"2014","unstructured":"Zhu, X., & Kuo, W. (2014). Importance measures in reliability and mathematical programming. Annals of Operations Research, 212(1), 241\u2013267.","journal-title":"Annals of Operations Research"},{"issue":"4","key":"3435_CR58","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/4235.797969","volume":"3","author":"E Zitzler","year":"1999","unstructured":"Zitzler, E., & Thiele, L. (1999). Multiobjective evolutionary algorithm: A comparative case study and strength pareto approach. IEEE Transactions on Evolutionary Computation, 3(4), 257\u2013271.","journal-title":"IEEE Transactions on Evolutionary Computation"}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-019-03435-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10479-019-03435-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-019-03435-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T17:48:59Z","timestamp":1609868939000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10479-019-03435-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,26]]},"references-count":58,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["3435"],"URL":"https:\/\/doi.org\/10.1007\/s10479-019-03435-4","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,26]]},"assertion":[{"value":"26 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}