


default search action
Melike Baykal-Gursoy
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j29]Abdolmajid Yolmeh, Melike Baykal-Gürsoy
, Vicki M. Bier:
A decomposable resource allocation model with generalized overarching protections. Ann. Oper. Res. 320(1): 493-507 (2023) - [j28]Zhifan Xu
, Melike Baykal-Gürsoy
:
Power Allocation for Cooperative Jamming Against a Strategic Eavesdropper Over Parallel Channels. IEEE Trans. Inf. Forensics Secur. 18: 846-858 (2023) - 2022
- [j27]Pedro Cesar Lopes Gerum
, Melike Baykal-Gürsoy:
How incidents impact congestion on roadways: A queuing network approach. EURO J. Transp. Logist. 11: 100067 (2022) - [j26]Melike Baykal-Gürsoy
, Andrew Reed Benton, Pedro Cesar Lopes Gerum
, Marcelo Figueroa Candia:
How Random Incidents Affect Travel-Time Distributions. IEEE Trans. Intell. Transp. Syst. 23(8): 13000-13010 (2022) - 2021
- [j25]Abdolmajid Yolmeh, Melike Baykal-Gürsoy
:
Weighted network search games with multiple hidden objects and multiple search teams. Eur. J. Oper. Res. 289(1): 338-349 (2021) - [j24]Abdolmajid Yolmeh, Melike Baykal-Gürsoy:
Corrigendum to "Weighted Network Search Games with Multiple Hidden Objects and Multiple Search Teams" [European Journal of Operational Research, Vol. 289 (1) 2021, 338-349]. Eur. J. Oper. Res. 292(3): 1209 (2021) - [c6]Zhifan Xu, Melike Baykal-Gürsoy
, Predrag Spasojevic:
A Game-Theoretic Approach for Probabilistic Cooperative Jamming Strategies over Parallel Wireless Channels. CNS 2021: 47-55 - [c5]Zhifan Xu
, Melike Baykal-Gürsoy:
Efficient Network Protection Games Against Multiple Types Of Strategic Attackers. ICASSP 2021: 2620-2624 - 2020
- [j23]Javier Rubio-Herrero, Melike Baykal-Gürsoy
:
Mean-variance analysis of the newsvendor problem with price-dependent, isoelastic demand. Eur. J. Oper. Res. 283(3): 942-953 (2020) - [c4]Zhifan Xu
, Melike Baykal-Gürsoy:
A Friendly Interference Game in Wireless Secret Communication Networks. NetGCooP 2020: 25-37 - [c3]Zhifan Xu
, Melike Baykal-Gürsoy:
A Cooperative Jamming Game in Wireless Networks Under Uncertainty. SecureComm (1) 2020: 233-254
2010 – 2019
- 2019
- [j22]Abdolmajid Yolmeh
, Melike Baykal-Gürsoy
:
Two-Stage Invest-Defend Game: Balancing Strategic and Operational Decisions. Decis. Anal. 16(1): 46-66 (2019) - [j21]Pedro Cesar Lopes Gerum
, Andrew Reed Benton, Melike Baykal-Gürsoy
:
Traffic density on corridors subject to incidents: models for long-term congestion management. EURO J. Transp. Logist. 8(5): 795-831 (2019) - 2018
- [j20]Javier Rubio-Herrero
, Melike Baykal-Gürsoy
:
On the unimodality of the price-setting newsvendor problem with additive demand under risk considerations. Eur. J. Oper. Res. 265(3): 962-974 (2018) - 2017
- [j19]Abdolmajid Yolmeh
, Melike Baykal-Gürsoy
:
A robust approach to infrastructure security games. Comput. Ind. Eng. 110: 515-526 (2017) - 2016
- [j18]Andrey Garnaev
, Melike Baykal-Gursoy
, H. Vincent Poor
:
Security Games With Unknown Adversarial Strategies. IEEE Trans. Cybern. 46(10): 2291-2299 (2016) - [j17]Andrey Garnaev
, Melike Baykal-Gursoy
, H. Vincent Poor
:
A Game Theoretic Analysis of Secret and Reliable Communication With Active and Passive Adversarial Modes. IEEE Trans. Wirel. Commun. 15(3): 2155-2163 (2016) - 2015
- [j16]Andrey Garnaev
, Melike Baykal-Gursoy
, H. Vincent Poor
:
How to deal with an intelligent adversary. Comput. Ind. Eng. 90: 352-360 (2015) - [j15]Javier Rubio-Herrero
, Melike Baykal-Gürsoy
, Anna Jaskiewicz
:
A price-setting newsvendor problem under mean-variance criteria. Eur. J. Oper. Res. 247(2): 575-587 (2015) - 2014
- [j14]Zhe Duan, Melike Baykal-Gürsoy
:
A note on Infinite-Server Markov modulated and Single-Server retrial Queues. Asia Pac. J. Oper. Res. 31(2) (2014) - [j13]Melike Baykal-Gürsoy
, Zhe Duan, H. Vincent Poor
, Andrey Garnaev
:
Infrastructure security games. Eur. J. Oper. Res. 239(2): 469-478 (2014) - [j12]Andrey Garnaev
, Melike Baykal-Gursoy
, H. Vincent Poor
:
Incorporating Attack-Type Uncertainty Into Network Protection. IEEE Trans. Inf. Forensics Secur. 9(8): 1278-1287 (2014) - [c2]Shridatt Sugrim, Melike Baykal-Gursoy
, Predrag Spasojevic
:
Background Spectrum Classification for Cognitive Radio. MILCOM 2014: 737-742 - 2013
- [j11]Kaan Özbay, Cem Iyigun, Melike Baykal-Gursoy
, Weihua Xiao:
Probabilistic programming models for traffic incident management operations planning. Ann. Oper. Res. 203(1): 389-406 (2013) - [j10]Burak Kocuk
, Özgür Emre Sivrikaya
, Melike Baykal-Gürsoy
:
Maintenance of infinite-server service systems subjected to random shocks. Comput. Ind. Eng. 66(1): 86-94 (2013)
2000 – 2009
- 2009
- [j9]Melike Baykal-Gürsoy
, Weihua Xiao, Kaan Özbay:
Modeling traffic flow interrupted by incidents. Eur. J. Oper. Res. 195(1): 127-138 (2009) - 2006
- [j8]Zeynep Müge Avsar
, Melike Baykal-Gursoy
:
A note on two-person zero-sum communicating stochastic games. Oper. Res. Lett. 34(4): 412-420 (2006) - [c1]Melike Baykal-Gursoy
, Zhe Duan:
M/M/C queues with Markov modulated service processes. VALUETOOLS 2006: 38 - 2004
- [j7]Melike Baykal-Gursoy
, Weihua Xiao:
Stochastic Decomposition in M/M/infinity Queues with Markov Modulated Service Rates. Queueing Syst. Theory Appl. 48(1-2): 75-88 (2004)
1990 – 1999
- 1999
- [j6]Zeynep Müge Avsar
, Melike Baykal-Gürsoy
:
A decomposition approach for undiscounted two-person zero-sum stochastic games. Math. Methods Oper. Res. 49(3): 483-500 (1999) - 1998
- [j5]Tayfur Alfok, C. Vu Duy, Melike Baykal-Gursoy:
Two load sharing processors with failures. Comput. Oper. Res. 25(3): 183-189 (1998) - 1995
- [j4]Bruno Gaujal, Mohsen A. Jafari, Melike Baykal-Gürsoy
, Gülgün Alpan
:
Allocation sequences of two processes sharing a resource. IEEE Trans. Robotics Autom. 11(5): 748-753 (1995) - 1994
- [j3]Melike Baykal-Gürsoy
, Tayfur Altiok, H. Danhong:
Look-back policies for two-stage, pull-type production/inventory systems. Ann. Oper. Res. 48(4): 381-400 (1994) - 1992
- [j2]Melike Baykal-Gürsoy
, Keith W. Ross:
Variability Sensitive Markov Decision Processes. Math. Oper. Res. 17(3): 558-571 (1992) - 1991
- [j1]Joseph Y. Hui, Melike Baykal-Gursoy
, Nader Moayeri, Roy D. Yates:
A Layered Broadband Switching Architecture with Physical or Virtual Path Configurations. IEEE J. Sel. Areas Commun. 9(9): 1416-1426 (1991)
1980 – 1989
- 1988
- [b1]Melike Baykal-Gursoy:
A sample-path approach to time-average Markov decision processes. University of Pennsylvania, Turkey, 1988
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint