{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:07:45Z","timestamp":1770844065929,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Glob Optim"],"published-print":{"date-parts":[[2005,1]]},"DOI":"10.1007\/s10898-004-4273-3","type":"journal-article","created":{"date-parts":[[2005,4,27]],"date-time":"2005-04-27T10:32:01Z","timestamp":1114597921000},"page":"17-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Dynamic Generalized Assignment Problems with Stochastic Demands and Multiple Agent--Task Relationships"],"prefix":"10.1007","volume":"31","author":[{"given":"Konstantin","family":"Kogan","sequence":"first","affiliation":[]},{"given":"Eugene","family":"Khmelnitsky","sequence":"additional","affiliation":[]},{"given":"Toshihide","family":"Ibaraki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,15]]},"reference":[{"key":"4273_CR1","volume-title":"Network Flows: Theory, Algorithms, and Applications","author":"R.K. Ahuja","year":"1993"},{"key":"4273_CR2","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/TIT.1969.1054286","volume":"15","author":"V.R. Algazi","year":"1969","journal-title":"IEEE Transactions on Information Theory"},{"key":"4273_CR3","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1287\/opre.24.4.742","volume":"24","author":"V. Balachandran","year":"1976","journal-title":"Operations Research"},{"key":"4273_CR4","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1287\/opre.28.5.1130","volume":"28","author":"E. Balas","year":"1980","journal-title":"Operations Research"},{"key":"4273_CR5","first-page":"6","volume-title":"Methods of Theory of Extremum Problems in Economy","author":"A.Y. Dubovitsky","year":"1981"},{"issue":"2","key":"4273_CR6","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1137\/1037043","volume":"37","author":"R.F. Hartl","year":"1995","journal-title":"SIAM Review"},{"key":"4273_CR7","unstructured":"Hillier F.S. and Lieberman, G.J. (1995), Introduction to Operations Research, McGraw-Hill."},{"key":"4273_CR8","volume-title":"Computers and Intractability: A guide to the Theory of NP-Completeness","author":"M.R. Garey","year":"1991"},{"issue":"7","key":"4273_CR9","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1109\/TC.1986.1676799","volume":"35","author":"B. Gavish","year":"1986","journal-title":"IEEE Transactions on Computers"},{"issue":"6","key":"4273_CR10","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1287\/mnsc.37.6.695","volume":"37","author":"B. Gavish","year":"1991","journal-title":"Management Science"},{"key":"4273_CR11","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/0305-0548(79)90028-5","volume":"6","author":"T.D. Klastorin","year":"1979","journal-title":"Computers and Operations Research"},{"key":"4273_CR12","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/BF01439152","volume":"5","author":"E. Khmelnitsky","year":"1995","journal-title":"Discrete Events Dynamic Systems"},{"key":"4273_CR13","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1023\/A:1018933012422","volume":"69","author":"K. Kogan","year":"1997","journal-title":"Annals of Operations Research"},{"key":"4273_CR14","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/0377-2217(77)90024-8","volume":"1","author":"S. Martello","year":"1977","journal-title":"European Journal of Operational Research"},{"issue":"4","key":"4273_CR15","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1287\/opre.34.4.560","volume":"34","author":"J.B. Mazzola","year":"1986","journal-title":"Operations Research"},{"key":"4273_CR16","unstructured":"Murphy, R.A. (1986), A Private Fleet Model with Multi-Stop Backhaul, Working Paper, 103, Optimal Decision Systems, Green Bay, WI."},{"key":"4273_CR17","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1287\/mnsc.23.1.27","volume":"23","author":"R.M. Nauss","year":"1976","journal-title":"Management Science"},{"key":"4273_CR18","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/BF01580430","volume":"8","author":"G.T. Ross","year":"1975","journal-title":"Math. Programming"},{"key":"4273_CR19","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1287\/mnsc.24.3.345","volume":"24","author":"G.T. Ross","year":"1977","journal-title":"Management Science"},{"key":"4273_CR20","doi-asserted-by":"crossref","unstructured":"Sousa, J.B. and Pereira, F.L. (1992), A hierarchical framework for the optimal flow control in manufacturing systems. In: Proceedings of the Third International Conference on Computer Integrated Manufacturing , Troy, pp. 278\u2013286.","DOI":"10.1109\/CIM.1992.639114"},{"key":"4273_CR21","unstructured":"Van Trees, H.L. (1968), Detection, Estimation and Modulation Theory, Part I, John Wiley Sons."},{"key":"4273_CR22","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/978-1-4615-5775-3_31","volume-title":"Meta-heuristics: Advances and Trends in Local Search Paradigms for Optimization","author":"M. Yagiura","year":"1999"},{"key":"4273_CR23","doi-asserted-by":"crossref","unstructured":"Youla, D.C. (1957), The solution of a homogeneous Wiener\u2013Hopf integral equation occurring in the expansion of second-order stationary random functions, IEEE Transactions on Information Theory, 187\u2013193.","DOI":"10.1109\/TIT.1957.1057414"}],"container-title":["Journal of Global Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10898-004-4273-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10898-004-4273-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10898-004-4273-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T08:12:02Z","timestamp":1559290322000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10898-004-4273-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,1]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,1]]}},"alternative-id":["4273"],"URL":"https:\/\/doi.org\/10.1007\/s10898-004-4273-3","relation":{},"ISSN":["0925-5001","1573-2916"],"issn-type":[{"value":"0925-5001","type":"print"},{"value":"1573-2916","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,1]]}}}