default search action
Informatica (Lithuanian Academy of Sciences), Volume 14
Volume 14, Number 1, 2003
- Robertas Damasevicius, Vytautas Stuikys:
Wrapping of Soft IPs for Interface-based Design Using Heterogeneous Metaprogramming. 3-18 - Eyas El-Qawasmeh:
Scene Change Detection Schemes for Video Indexing in Uncompressed Domain. 19-36 - Renata Mansini, Wlodzimierz Ogryczak, Maria Grazia Speranza:
On LP Solvable Models for Portfolio Selection. 37-62 - Henrikas Pranevicius, Germanas Budnikas:
Creation of ESTELLE/Ag Specifications Using Knowledge Bases. 63-74 - Gailius Raskinis, Danute Raskiniene:
Building Medium-Vocabulary Isolated-Word Lithuanian HMM Speech Recognition System. 75-84 - Hung-Min Sun, Her-Tyan Yeh, Tzonelih Hwang:
On the Linkability of Some Group Signature Schemes. 85-94 - Ji-Zong Wang, Xi-Juan Wang, Hong-Guang Ni:
An Algorithm of Neural Network and Application to Data Processing in Concrete Engineering. 95-110 - Chou Chen Yang, Ting Yi Chang, Jian Wei Li, Min-Shiang Hwang:
Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem. 111-120 - Antanas Zilinskas, Aurelija Podlipskyte:
On Multimodality of the SSTRESS Criterion for Metric Multidimensional Scaling. 121-130
Volume 14, Number 2, 2003
- Eduardas Bareisa, Kestutis Motiejunas, Rimantas Seinauskas:
Identifying Legal and Illegal States in Synchronous Sequential Circuits Using Test Generation. 135-154 - Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
Partially Blind Threshold Signature Based on RSA. 155-166 - Raimondas Ciegis, Vadimas Starikovicius:
Realistic Performance Prediction Tool for the Parallel Block LU Factorization Algorithm. 167-180 - Algis Garliauskas:
Artificial Neural Networks Models with Fuzziness and Chaos Phenomena. 181-194 - Bin-Tsan Hsieh, Hung-Min Sun, Tzonelih Hwang:
On the Security of Some Password Authentication Protocols. 195-204 - Shin-Jia Hwang, Chiu-Chin Chen:
Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers. 205-212 - Kazys Kazlauskas:
Optimal Estimation of the Parameters of Linear Periodically Time-varying Systems. 213-222 - Arthur Pchelkin:
Efficient Exploration in Reinforcement Learning Based on Utile Suffix Memory. 237-250 - Ravinder Krishna Raina, Indu Bala Bapna:
Certain Integral Means Inequalities Involving Fractional Calculus Operators of Analytic Functions. 251-258 - Edmundas Kazimieras Zavadskas, Leonas Ustinovichius, Friedel Peldschus:
Development of Software for Multiple Criteria Evaluation. 259-272
Volume 14, Number 3, 2003
- Bostjan Brumen, Izidor Golob, Tatjana Welzer, Ivan Rozman, Marjan Druzovec, Hannu Jaakkola:
An Algorithm for Protecting Knowledge Discovery Data. 277-288 - Chin-Chen Chang, Kuo-Feng Hwang:
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards. 289-294 - Nikolas Dyomin, Irina Dyomin, Irina Safronova, Svetlana Rozhkova:
Information Amount Determination for Joint Problem of Filtering and Generalized Extrapolation of Stochastic Processes with Respect to the Set of Continuous and Discrete Memory Observations. 295-322 - Raimundas Liutkevicius:
Coupled Adaptive Fuzzy Control of Nonlinear, Time-Varying Plant. 323-336 - Algirdas Mykolas Montvilas:
Features of Sequential Nonlinear Mapping. 337-348 - Sarunas Paulikas, Dalius Navakauskas:
New Implementation Scheme for the Restoration of Voiced Speech Signals. 349-356 - Manuel de la Sen:
Absolute Stability of Single-Input Single-Output Systems with Constant Internal Point Time Delays. 357-374 - Athanasios D. Styliadis, Petros G. Patias, Nikos C. Zestas:
3-D Computer Modeling with Intra-Component, Geometric, Quality and Topological Constraints. 375-392 - Chwei-Shyong Tsai, Shiang-Feng Tzeng, Min-Shiang Hwang:
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers. 393-402 - Julius Zilinskas, Ian David Lockhart Bogle:
Evaluation Ranges of Functions using Balanced Random Interval Arithmetic. 403-416
Volume 14, Number 4, 2003
- George E. Antoniou:
A DFT-Based Algorithm for n-Order Singular State Space Systems. 421-430 - Chin-Chen Chang, Chi-Shiang Chan:
A Watermarking Scheme Based on Principal Component Analysis Technique. 431-444 - Hung-Yu Chien:
Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function. 445-454 - Albertas Caplinskas, Audrone Lupeikiene, Olegas Vasilecas:
The Role of Ontologies in Reusing Domain and Enterprise Engineering Assets. 455-470 - Dale Dzemydiene, Vitalija Rudzkiene:
Data Analysis Strategy for Revealing Multivariate Structures in Social-Economic Data Warehouses. 471-486 - Antanas Lipeika, Joana Lipeikiene:
Word Endpoint Detection Using Dynamic Programming. 487-496 - Alfonsas Misevicius:
A Modified Simulated Annealing Algorithm for the Quadratic Assignment Problem. 497-514 - Branka Nikolic, Petar Hotomski:
Comparison of H-Logical Norm with some t-Norms. 515-528 - Alvydas Paunksnis, Skaidra Kurapkiene, Audris Maciulis, Marija-Liucija Paunksniene:
Evaluation of Ultrasound Attenuation Characteristics of Human Cataract. 529-540 - Leonardas Vilkauskas, Abdonas Tamosiunas, Regina Reklaitiene, Algirdas Juozulynas:
Application of Survival Models for the Population Studies. 541-550 - Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang:
Security of Improvement on Methods for Protecting Password Transmission. 551-558
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.