{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:45:09Z","timestamp":1760424309630},"reference-count":18,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2002,2,1]],"date-time":"2002-02-01T00:00:00Z","timestamp":1012521600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["European Journal of Operational Research"],"published-print":{"date-parts":[[2002,2]]},"DOI":"10.1016\/s0377-2217(01)00048-0","type":"journal-article","created":{"date-parts":[[2002,10,14]],"date-time":"2002-10-14T15:56:01Z","timestamp":1034610961000},"page":"541-550","source":"Crossref","is-referenced-by-count":69,"title":["The computational complexity of the criticality problems in a network with interval activity times"],"prefix":"10.1016","volume":"136","author":[{"given":"Stefan","family":"Chanas","sequence":"first","affiliation":[]},{"given":"Pawe\u0142","family":"Zieli\u0144ski","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0377-2217(01)00048-0_BIB1","series-title":"The Design and Analysis of Computer Algorithms","author":"Aho","year":"1974"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB2","unstructured":"J.J. Buckley, Fuzzy PERT, in: G.W. Evans, W. Karwowski, M.R. Wilhelm (Eds.), Applications of Fuzzy Set Methodologies in Industrial Engineering, Elsevier, Amsterdam 1989, pp. 103\u2013114"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0165-0114(81)90030-0","article-title":"The use of fuzzy variables in PERT","volume":"5","author":"Chanas","year":"1981","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB4","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/S0165-0114(00)00076-2","article-title":"Critical path analysis in the network with fuzzy activity times","volume":"122","author":"Chanas","year":"2001","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB5","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1016\/S0377-2217(99)00483-X","article-title":"On criticality and sensitivity in activity networks","volume":"127","author":"Elmaghraby","year":"2000","journal-title":"European Journal of Operational Research"},{"issue":"4","key":"10.1016\/S0377-2217(01)00048-0_BIB6","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1145\/322077.322090","article-title":"Strong NP-completeness results: motivation, examples, and implications","volume":"25","author":"Garey","year":"1978","journal-title":"Journal of the ACM"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB7","series-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"Garey","year":"1979"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB8","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1109\/TR.1983.5221657","article-title":"Fuzzy network planning","volume":"R-32 3","author":"Gazdik","year":"1983","journal-title":"IEEE Transactions on Reliability"},{"issue":"4","key":"10.1016\/S0377-2217(01)00048-0_BIB9","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1145\/322092.322097","article-title":"Lower bounds for selection in X+Y and other multisets","volume":"25","author":"Johnson","year":"1978","journal-title":"Journal of the ACM"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB10","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1016\/0377-2217(85)90032-3","article-title":"An upper bound on the expected completion time of PERT networks","volume":"21","author":"Kamburowski","year":"1985","journal-title":"European Journal of Operational Research"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB11","doi-asserted-by":"crossref","unstructured":"J. Kamburowski, Normally distributed activity durations in networks, Journal of Operational Research Society 36 (1985) 1051-1057; corrigendum 37 (1986) 529","DOI":"10.1057\/jors.1985.184"},{"issue":"4","key":"10.1016\/S0377-2217(01)00048-0_BIB12","first-page":"167","article-title":"On the computational complexity of the shortest route and maximum flow problems in stochastic networks","volume":"11","author":"Kamburowski","year":"1986","journal-title":"Foundations of Control Engineering"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB13","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1287\/opre.9.3.296","article-title":"Critical path planning and scheduling \u2013 mathematical basis","volume":"9","author":"Kelley","year":"1961","journal-title":"Operations Research"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB14","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/0377-2217(89)90211-7","article-title":"Stochastic and fuzzy PERT","volume":"43","author":"Loostma","year":"1989","journal-title":"European Journal of Operational Research"},{"issue":"5","key":"10.1016\/S0377-2217(01)00048-0_BIB15","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1287\/opre.7.5.646","article-title":"Application of a technique for research and development project evaluation","volume":"7","author":"Malcolm","year":"1959","journal-title":"Operations Research"},{"issue":"1","key":"10.1016\/S0377-2217(01)00048-0_BIB16","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/21.259685","article-title":"Fuzzy critical path method","volume":"24","author":"Nasution","year":"1994","journal-title":"IEEE Transactions on Systems Man and Cybernetics"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB17","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/0165-0114(79)90022-8","article-title":"Using fuzzy sets theory in a scheduling problem: A case study","volume":"2","author":"Prade","year":"1979","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0377-2217(01)00048-0_BIB18","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/0165-0114(94)90212-7","article-title":"Network analysis and information flow in fuzzy environment","volume":"67","author":"Rommelfanger","year":"1994","journal-title":"Fuzzy Sets and Systems"}],"container-title":["European Journal of Operational Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221701000480?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0377221701000480?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T12:52:20Z","timestamp":1556887940000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0377221701000480"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,2]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,2]]}},"alternative-id":["S0377221701000480"],"URL":"https:\/\/doi.org\/10.1016\/s0377-2217(01)00048-0","relation":{},"ISSN":["0377-2217"],"issn-type":[{"value":"0377-2217","type":"print"}],"subject":[],"published":{"date-parts":[[2002,2]]}}}