default search action
Informatica (Lithuanian Academy of Sciences), Volume 23
Volume 23, Number 1, 2012
- Willem Karel M. Brauers, Edmundas Kazimieras Zavadskas:
Robustness of MULTIMOORA: A Method for Multi-Objective Optimization. 1-25 - Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, Zhongmei Wan:
Identity-Based Key-Insulated Signcryption. 27-45 - Bogdan Lipus, Borut Zalik:
Efficient Reconstruction of Images with Deliberately Corrupted Pixels. 47-63 - Kazys Kazlauskas, Rimantas Pupeikis:
A Forward-Backward Approach for Instantaneous Frequency Estimation of Frequency Modulated Signals in Noisy Environment. 65-76 - Jonas Mockus:
On Simulation of the Nash Equilibrium in the Stock Exchange Contest. 77-104 - Vidas Raudonis, Agne Paulauskaite-Taraseviciene, Laura Kizauskiene:
The Gaze Tracking System with Natural Head Motion Compensation. 105-124 - Milan S. Savic, Zoran H. Peric, Milan R. Dincic:
Coding Algorithm for Grayscale Images Based on Piecewise Uniform Quantizers. 125-140 - Dragisa Stanujkic, Nedeljko Magdalinovic, Sanja Stojanovic, Rodoljub Jovanovic:
Extension of Ratio System Part of MOORA Method for Solving Decision-Making Problems with Interval Data. 141-154 - Eun-Jun Yoon, Kee-Young Yoo:
An Improvement of the User Identification and Key Agreement Protocol with User Anonymity. 155-172
Volume 23, Number 2, 2012
- Alvydas Balezentis, Tomas Balezentis, Willem Karel M. Brauers:
MULTIMOORA-FG: A Multi-Objective Decision Making Method for Linguistic Reasoning with an Application to Personnel Selection. 173-190 - Jérémy Besson, Audrone Lupeikiene, Viktor Medvedev:
Comparing Real and Intended System Usages: A Case for Web Portal. 191-201 - Dragan Djuric, Vladan Devedzic:
Incorporating the Ontology Paradigm into a Mainstream Programming Environment. 203-224 - Jong Soo Kim, Won Chan Jeong:
A Coordination Model Under an Order-Up-To Policy. 225-246 - Pavel Loupal, Irena Mlýnková, Martin Necaský, Karel Richta, Pavel Strnad:
Storing XML Data - The ExDB and CellStore Way in the Context of Current Approaches. 247-282 - Jozef Vörös:
Parametric Identification of Systems with General Backlash. 283-298 - Xu An Wang, Xiaoyuan Yang, Minqing Zhang, Yong Yu:
Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model. 299-314 - Tsu-Yang Wu, Yuh-Min Tseng:
Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants. 315-334
Volume 23, Number 3, 2012
- Dovile Buteikiene, Alvydas Paunksnis, Valerijus Barzdziukas, Jolita Bernataviciene, Virginijus Marcinkevicius, Povilas Treigys:
Assessment of the Optic Nerve Disc and Excavation Parameters of Interactive and Automated Parameterization Methods. 335-355 - James K. Ho:
Spreadsheet-Based Simulation Models for Decision Support: Case of Strategic Pairings in Sport Tournaments with Match Play for Team Competition. 357-368 - Diana Kalibatiene, Olegas Vasilecas:
Application of the Ontology Axioms for the Development of OCL Constraints from PAL Constraints. 369-390 - Mark Sh. Levin:
Towards Clique-Based Fusion of Graph Streams in Multi-Function System Testing. 391-404 - Jonas Mockus, Lina Pupeikiene:
On Multi-Start Algorithms for Optimization of High School Timetables. 405-425 - Henrikas Pranevicius, Stanislovas Norgela:
Applications of Finite Linear Temporal Logic to Piecewise Linear Aggregates. 427-441 - Haifeng Qian, Xiangxue Li, Xinli Huang:
Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model. 443-460 - Ayeley P. Tchangani, Yasmina Bouzarour-Amokrane, François Pérès:
Evaluation Model in Decision Analysis: Bipolar Approach. 461-485 - Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu:
A Fully Secure Revocable ID-Based Encryption in the Standard Model. 487-505
Volume 23, Number 4, 2012
- Romualdas Bausys, Arturas Kriukovas:
Pixel-Wise Tamper Detection Under Generic Blur/Sharpen Attacks. 507-520 - Bostjan Brumen, Marko Hölbl, Katja Harej Pulko, Tatjana Welzer, Marjan Hericko, Matjaz B. Juric, Hannu Jaakkola:
Learning Process Termination Criteria. 521-536 - Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages. 537-562 - Albertas Caplinskas, Gintautas Dzemyda, Ferenc Kiss, Audrone Lupeikiene:
Processing of Undesirable Business Events in Advanced Production Planning Systems. 563-579 - Ganesh R. Naik:
Measure of Quality of Source Separation for Sub- and Super-Gaussian Audio Mixtures. 581-599 - Juana López Redondo, Pilar Martínez Ortigosa, Julius Zilinskas:
Multimodal Evolutionary Algorithm for Multidimensional Scaling with City-Block Distances. 601-620 - Mohammadreza Sadeghi, Mohammad Ali Rashidzadeh, Mohammad Ali Soukhakian:
Using Analytic Network Process in a Group Decision-Making for Supplier Selection. 621-643 - Smiljan Sinjur, Damjan Zazula, Borut Zalik:
Fast Convex Layers Algorithm for Near-Duplicate Image Detection. 645-663 - Shouzhen Zeng, Tomas Balezentis, Chonghui Zhang:
A Method Based on OWA Operator and Distance Measures for Multiple Attribute Decision Making with 2-Tuple Linguistic Information. 665-681
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.