Vicky Mak-Hau
Vicky Mak-Hau
Professor, School of Information Technology, Deakin University
Verified email at - Homepage
Cited by
Cited by
On the kidney exchange problem: cardinality constrained cycle and chain problems on directed graphs: a survey of integer programming approaches
V Mak-Hau
Journal of combinatorial optimization 33, 35-59, 2017
Optimal radio labellings of complete m-ary trees
X Li, V Mak, S Zhou
Discrete Applied Mathematics 158 (5), 507-515, 2010
Heuristic approaches to the asymmetric travelling salesman problem with replenishment arcs
V Mak, N Boland
International Transactions in Operational Research 7 (4‐5), 431-447, 2000
New cutting-planes for the time-and/or precedence-constrained ATSP and directed VRP
V Mak, AT Ernst
Mathematical Methods of Operations Research 66 (1), 69-98, 2007
Comparison study of portable bladder scanner versus cone‐beam CT scan for measuring bladder volumes in post‐prostatectomy patients undergoing radiotherapy
KA Ung, R White, M Mathlum, V Mak‐Hau, R Lynch
Journal of Medical Imaging and Radiation Oncology 58 (3), 377-383, 2014
A unified mixed-integer programming model for simultaneous fluence weight and aperture optimization in VMAT, Tomotherapy, and Cyberknife
K Akartunalı, V Mak-Hau, T Tran
Computers & Operations Research 56, 134-150, 2015
An exact method for the minimum cardinality problem in the treatment planning of intensity-modulated radiotherapy
AT Ernst, VH Mak, LR Mason
INFORMS Journal on Computing 21 (4), 562-574, 2009
Branch-and-cut-and-price for the cardinality-constrained multi-cycle problem in kidney exchange
E Lam, V Mak-Hau
Computers & Operations Research 115, 104852, 2020
On the Asymmetric Travellin Salesman Problem with Replenishment Arcs
VH Mak
University of Melbourne, Department of Mathematics and Statistics, 2001
Polyhedral results and exact algorithms for the asymmetric travelling salesman problem with replenishment arcs
V Mak, N Boland
Discrete Applied Mathematics 155 (16), 2093-2110, 2007
Packet faking attack: A novel attack and detection mechanism in OppNets
M Alajeely, R Doss, V Mak-Hau
2014 Tenth International Conference on Computational Intelligence and …, 2014
Information discovery in mission-critical wireless sensor networks
R Doss, G Li, V Mak, M Tissera
Computer Networks 54 (14), 2383-2399, 2010
Defense against packet collusion attacks in opportunistic networks
M Alajeely, R Doss, V Mak-Hau
Computers & Security 65, 269-282, 2017
A simultaneous sequencing and allocation problem for military pilot training: Integer programming approaches
V Mak-Hau, B Hill, D Kirszenblat, B Moran, V Nguyen, A Novak
Computers & Industrial Engineering 154, 107161, 2021
The L(2,1)-labelling problem for cubic Cayley graphs on dihedral groups
X Li, V Mak-Hau, S Zhou
Journal of Combinatorial Optimization 25, 716-736, 2013
The multiphase course timetabling problem
R Esmaeilbeigi, V Mak-Hau, J Yearwood, V Nguyen
European Journal of Operational Research 300 (3), 1098-1119, 2022
Iterative variable aggregation and disaggregation in IP: An application
V Mak
Operations research letters 35 (1), 36-44, 2007
Using autonomous mobile agents for efficient data collection in sensor networks
T Black, V Mak, PN Pathirana, S Nahavandi
2006 World Automation Congress, 1-6, 2006
Catabolism attack and anabolism defense: A novel attack and traceback mechanism in opportunistic networks
M Alajeely, R Doss, V Mak-Hau
Computer Communications 71, 111-118, 2015
Improving the QoS for information discovery in autonomic wireless sensor networks
R Doss, G Li, V Mak, S Yu, M Chowdhury
Pervasive and Mobile Computing 5 (4), 334-349, 2009
The system can't perform the operation now. Try again later.
Articles 1–20