{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T15:37:56Z","timestamp":1732030676433},"reference-count":22,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2001,9,1]],"date-time":"2001-09-01T00:00:00Z","timestamp":999302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Fuzzy Sets and Systems"],"published-print":{"date-parts":[[2001,9]]},"DOI":"10.1016\/s0165-0114(00)00076-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T17:40:30Z","timestamp":1027618830000},"page":"195-204","source":"Crossref","is-referenced-by-count":142,"title":["Critical path analysis in the network with fuzzy activity times"],"prefix":"10.1016","volume":"122","author":[{"given":"Stefan","family":"Chanas","sequence":"first","affiliation":[]},{"given":"Pawe\u0142","family":"Zieli\u0144ski","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0165-0114(00)00076-2_BIB1","unstructured":"J.J. Buckley, Fuzzy PERT, in: G.W. Evans, W. Karwowski, M.R. Wilhelm(Eds.), Applications of Fuzzy Set Methodologies in Industrial Engineering, Elsevier,Amsterdam, 1989,, pp. 103\u2013114."},{"key":"10.1016\/S0165-0114(00)00076-2_BIB2","unstructured":"S. Chanas, Fuzzy sets in few classical operational research problems,in: M.M. Gupta, E. Sanchez (Eds,). Approximate Reasoning in Decision Analysis, North-Holland, Amsterdam, 1982,,pp. 351\u2013363."},{"key":"10.1016\/S0165-0114(00)00076-2_BIB3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0165-0114(81)90030-0","article-title":"The use of fuzzy variables in PERT","volume":"5","author":"Chanas","year":"1981","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(00)00076-2_BIB4","unstructured":"S. Chanas, E. Radosi\u0144ski, A model of activity performance time in the light of fuzzy sets theory, Problemy Organizacji 2 (1976) 68\u201376 (in Polish)."},{"key":"10.1016\/S0165-0114(00)00076-2_BIB5","unstructured":"S. Chanas, P. Zieli\u0144ski, Computational complexity of interval critical path method, European J. Oper. Res., submitted."},{"key":"10.1016\/S0165-0114(00)00076-2_BIB6","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/0165-0114(94)00385-4","article-title":"An efficient approach for large scale project planning based on fuzzy Delphi method","volume":"76","author":"Chang","year":"1995","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(00)00076-2_BIB7","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1080\/00207727808941724","article-title":"Operations on fuzzy numbers follows","volume":"30","author":"Dubois","year":"1978","journal-title":"Internat. J. Systems Sci."},{"key":"10.1016\/S0165-0114(00)00076-2_BIB8","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1109\/TR.1983.5221657","article-title":"Fuzzy network planning","volume":"R-32 3","author":"Gazdik","year":"1983","journal-title":"IEEE Trans. Reliability"},{"key":"10.1016\/S0165-0114(00)00076-2_BIB9","unstructured":"J. Kamburowski, Fuzzy activity duration times in critical path analyses, International Symposium on Project Management, New Delhi, 1983, pp. 194\u2013199."},{"key":"10.1016\/S0165-0114(00)00076-2_BIB10","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1287\/opre.9.3.296","article-title":"Critical path planning and scheduling \u2013 Mathematical basis","volume":"9","author":"Kelley","year":"1961","journal-title":"Oper. Res."},{"key":"10.1016\/S0165-0114(00)00076-2_BIB11","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/0377-2217(89)90211-7","article-title":"Stochastic and fuzzy PERT","volume":"43","author":"Lootsma","year":"1989","journal-title":"European J. Oper. Res."},{"key":"10.1016\/S0165-0114(00)00076-2_BIB12","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1287\/opre.7.5.646","article-title":"Application of a technique for research and development project evaluation","volume":"7","author":"Malcolm","year":"1959","journal-title":"Oper. Res."},{"key":"10.1016\/S0165-0114(00)00076-2_BIB13","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/17.277406","article-title":"Using PERT as an approximation of fuzzy project-network analysis","volume":"40","author":"McCahon","year":"1993","journal-title":"IEEE Trans. Eng. Management"},{"key":"10.1016\/S0165-0114(00)00076-2_BIB14","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/0165-0114(94)00309-U","article-title":"Application of fuzzy distributions on project management","volume":"73","author":"Mon","year":"1995","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(00)00076-2_BIB15","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1109\/FUZZY.1993.327366","article-title":"Fuzzy decisions in critical path method","volume":"2","author":"Nasution","year":"1993","journal-title":"Second IEEE Conf. on Fuzzy Systems"},{"key":"10.1016\/S0165-0114(00)00076-2_BIB16","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/21.259685","article-title":"Fuzzy critical path method","volume":"24","author":"Nasution","year":"1994","journal-title":"IEEE Trans. Systems Man Cybernet"},{"year":"1975","series-title":"Applications of Fuzzy Sets to Systems Analysis","author":"Negoit\u0103","key":"10.1016\/S0165-0114(00)00076-2_BIB17"},{"key":"10.1016\/S0165-0114(00)00076-2_BIB18","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/0165-0114(79)90022-8","article-title":"Using fuzzy sets theory in a scheduling problem","volume":"2","author":"Prade","year":"1979","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(00)00076-2_BIB19","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/0165-0114(94)90212-7","article-title":"Network analysis and information flow in fuzzy environment","volume":"67","author":"Rommelfanger","year":"1994","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(00)00076-2_BIB20","first-page":"158","article-title":"Fuzzy critical path method for project network planning and control","volume":"3","author":"Slyeptsov","year":"1997","journal-title":"Cybernet. System Anal."},{"key":"10.1016\/S0165-0114(00)00076-2_BIB21","unstructured":"A.I. Slyeptsov, T.A. Tyshchuk, Synthesis of generalized fuzzy critical path method, Proc. Internat. Conf. ICAD\u201999."},{"key":"10.1016\/S0165-0114(00)00076-2_BIB22","first-page":"76","article-title":"Fuzzy critical path method based on signed distance ranking of fuzzy numbers","volume":"20","author":"Yao","year":"2000","journal-title":"IEEE Trans. Syst. Man Cybernet."}],"container-title":["Fuzzy Sets and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165011400000762?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165011400000762?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T16:28:09Z","timestamp":1556123289000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165011400000762"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,9]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2001,9]]}},"alternative-id":["S0165011400000762"],"URL":"https:\/\/doi.org\/10.1016\/s0165-0114(00)00076-2","relation":{},"ISSN":["0165-0114"],"issn-type":[{"type":"print","value":"0165-0114"}],"subject":[],"published":{"date-parts":[[2001,9]]}}}