


default search action
Informatica (Lithuanian Academy of Sciences), Volume 17
Volume 17, Number 1, 2006
- Valentina Dagiene, Gintautas Grigas:
Quantitative Evaluation of the Process of Open Source Software Localization. 3-12 - Adam Janiak, Mikhail Y. Kovalyov:
Job Sequencing with Exponential Functions of Processing Times. 13-24 - Arturas Janusauskas, Vaidotas Marozas, Arunas Lukosevicius, Leif Sörnmo:
The Hilbert-Huang Transform for Detection of Otoacoustic Emissions and Time-Frequency Mapping. 25-38 - Ionel Muscalagiu, Vladimir Cretu:
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques. 39-54 - Rimantas Pupeikis:
On the Identification of Hammerstein Systems Having Saturation-like Functions with Positive Slopes. 55-68 - Reza Ravani, Ali Meghdari:
Velocity Distribution Profile for Robot Arm Motion Using Rational Frenet-Serret Curves. 69-84 - Jurate Sakalauskaite:
Sequent Calculi for Temporal Logics of Common Knowledge and Belief. 85-94 - Emmanuel Stefanakis:
Scheduling Trajectories on a Planar Surface with Moving Obstacles. 95-110 - Airenas Vaiciunas, Gailius Raskinis:
Cache-based Statistical Language Models of English and Highly Inflected Lithuanian. 111-124 - Julius Zilinskas:
Estimation of Functional Ranges Using Standard and Inner Interval Arithmetic. 125-136 - Shu-Ching Wang, Kuo-Qin Yan, Mao-Lun Chiang:
Optimal Agreement in a Scale-Free Network Environment. 137-150
Volume 17, Number 2, 2006
- Algis Brazenas, Dainius Vaiciulis, Vytautas Kleiza:
Determination of Stress Strain State Components of Butt Welded Joint with Mild Interlayer Subjected to Elasto-Plastic Tension. 157-176 - Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Identity Based Multisignatures. 177-186 - Aboul Ella Hassanien:
A Copyright Protection using Watermarking Algorithm. 187-198 - Kazys Kazlauskas, Jaunius Kazlauskas:
Iterative Estimation Algorithm of Autoregressive Parameters. 199-206 - Algirdas Maknickas, Arnas Kaceniauskas, Rimantas Kacianauskas, Robertas Balevicius, Algis Dziugys:
Parallel DEM Software for Simulation of Granular Media. 207-224 - Kamal E. Melkemi, Mohamed Batouche, Sebti Foufou:
A Multiresolution Approach Based on MRF and Bak-Sneppen Models for Image Segmentation. 225-236 - Alfonsas Misevicius:
Experiments with Hybrid Genetic Algorithm for the Grey Pattern Problem. 237-258 - Jonas Mockus:
Investigation of Examples of E-Education Environment for Scientific Collaboration and Distance Graduate Studies, Part 1. 259-278 - Gintaras Palubeckis:
Iterated Tabu Search for the Unconstrained Binary Quadratic Optimization Problem. 279-296 - Sarunas Paulikas, Dalius Navakauskas:
Discrimination of Homographs Distorted by a Lengthy Impulsive Noise. 297-304
Volume 17, Number 3, 2006
- Raimondas Ciegis:
Parallel Numerical Algorithms for 3D Parabolic Problem with Nonlocal Boundary Condition. 309-324 - Jelena Gasperovic, Albertas Caplinskas:
Methodology to Evaluate the Functionality of Specification Languages. 325-346 - Zhenjie Huang, Kefei Chen, Yumin Wang:
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. 347-362 - Athanasis Karoulis, Stella Sylaiou, Martin White:
Usability Evaluation of a Virtual Museum Interface. 363-380 - Jong Soo Kim, Sun Hur, Tai Young Kim:
A Multiechelon Repairable Item Inventory System with Lateral Transshipment and a General Repair Time Distribution. 381-392 - Auparajita Krishnaa, Manohar Singh Dulawat:
Algorithms for Inner Magic and Inner Antimagic Labelings of Some Planar Graphs. 393-406 - Sunilkumar S. Manvi, Pallapa Venkataram:
An Agent-Based Best Effort Routing Technique for Load Balancing. 407-426 - Reghunadhan Rajesh, M. Ramachandra Kaimal:
Variable Gain Takagi-Sugeno Fuzzy Logic Controllers. 427-444 - Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang:
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem. 445-462
Volume 17, Number 4, 2006
- Kim-Kwang Raymond Choo:
On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols. 467-480 - Chinnappan Jayakumar, Chenniappan Chellappan:
Optimized on Demand Routing Protocol of Mobile Ad Hoc Network. 481-502 - Kestutis Kapocius, Rimantas Butleris:
Repository for Business Rules Based IS Requirements. 503-518 - Yu Long, Kefei Chen, Shengli Liu:
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing. 519-534 - Rami A. AL-Na'mneh, W. David Pan, Seong-Moo Yoo:
Efficient Adaptive Algorithms for Transposing Small and Large Matrices on Symmetric Multiprocessors. 535-550 - Constantin Popescu:
An Electronic Cash System Based on Group Blind Signatures. 551-564 - Manuel de la Sen:
A Note about Total Stability of a Class of Hybrid Systems. 565-576 - Zuhua Shao:
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys. 577-586 - Mantas Skripkauskas, Laimutis Telksnys:
Automatic Transcription of Lithuanian Text Using Dictionary. 587-600 - Edmundas Kazimieras Zavadskas, Algimantas Zakarevicius, Jurgita Antucheviciene:
Evaluation of Ranking Accuracy in Multi-Criteria Decisions. 601-618

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.