default search action
Information Technology and Control, Volume 43
Volume 43, Number 1, 2014
- Jian Zhang:
Synchronization of Nonlinear Continuous-time Systems by Sampled-data Output Feedback Control. 7-13 - Vytautas Stuikys, Kristina Bespalova, Renata Burbaite:
Refactoring of Heterogeneous Meta-Program into k-stage Meta-Program. 14-27 - Uros Kac, Franc Novak:
Practical Considerations in Oscillation Based Test of SC Biquad Filters. 28-36 - Pavel Stefanovic, Olga Kurasova:
Creation of Text Document Matrices and Visualization by Self-Organizing Map. 37-46 - Egidijus Vaskevicius, Ausra Vidugiriene, Vytautas Kaminskas:
Identification of Human Response to Virtual 3D Face Stimuli. 47-56 - Hang Tu, Han Shen, Debiao He, Jianhua Chen:
Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol. 57-63
- Stasys Kazlauskas:
Preface. 64 - Alex Muscar, Costin Badica:
Monadic Foundations for Promises in Jason. 65-72 - Katarzyna Wasielewska, Maria Ganzha, Marcin Paprzycki, Pawel Szmeja, Michal Drozdowicz, Ivan Lirkov, Costin Badica:
Applying Saaty's Multicriterial Decision Making Approach in Grid Resource Management. 73-87 - Dejan Mitrovic, Mirjana Ivanovic, Zoltan Geler:
Agent-Based Distributed Computing for Dynamic Networks. 88-97 - Gabriel Iuhasz, Viorel Negru, Daniela Zaharie:
Neuroevolution Based Multi-Agent System with Ontology Based Template Creation for Micromanagement in Real-Time Strategy Games. 98-109
Volume 43, Number 2, 2014
- Loreta Savulioniene, Leonidas Sakalauskas:
A Stochastic Algorithm of Frequent Set Search for Mining Association Rules. 121-132 - Henrikas Pranevicius, Mindaugas Pranevicius, Osvaldas Pranevicius, Mindaugas Snipas, Nerijus Paulauskas, Feliksas F. Bukauskas:
Continuous Time Markov Chain Models of Voltage Gating of Gap Junction Channels. 133-142 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari:
An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems. 143-150 - Wen-Chung Kuo, Hong-Ji Wei, Jiin-Chiou Cheng:
Enhanced Secure Authentication Scheme with Anonymity for Roaming in Mobility Networks. 151-156 - P. Teppa-Garran, G. Garcia:
ADRC Tuning Employing the LQR Approach for Decoupling Uncertain MIMO Systems. 157-165 - Ugur Erkin Kocamaz, Yilmaz Uyaroglu:
Non-Identical Synchronization, Anti-Synchronization and Control of Single-Machine Infinite-Bus Power System via Active Control. 166-174 - Yueying Wang, Pingfang Zhou, Quanbao Wang, Dengping Duan:
Reliable Robust Sampled-Data H∞ Output Tracking Control with Application to Flight Control. 175-182 - C.-P. Chu, C.-Y. Yeh, S.-H. Hwang:
An Efficient Search Strategy for ACELP Algebraic Codebook by Means of Reduced Candidate Mechanism and Iteration-Free Pulse Replacement. 183-187 - Azita Azarfar, H. T. Shandiz, Masoud Shafiee:
Adaptive Control for Nonlinear Singular Systems. 188-198 - Namita Tiwari, Sahadeo Padhye, Debiao He:
Provably Secure Proxy Multi-Signature Scheme Based on ECC. 199-204
Volume 43, Number 3, 2014
- Majid Abdolrazzagh-Nezhad, Salwani Abdullah:
A Robust Intelligent Construction Procedure for Job-Shop Scheduling. 217-229 - Rok Zontar, Ivan Rozman, Vili Podgorelec:
Mapping Ontologies to Objects using a Transformation based on Description Logics. 230-243 - Raed T. Al-Zubi, Khalid A. Darabkh, Yaser Jararweh:
A Powerful Yet Efficient Iris Recognition Based on Local Binary Quantization. 244-251 - Han-Yu Lin:
Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its Extension. 252-263 - Ying-Hao Hung, Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang:
Strongly Secure Revocable ID-based Signature without Random Oracles. 264-276 - Min-Shiang Hwang, Shih-Ting Hsu, Cheng-Chi Lee:
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme. 277-288 - Jaroslav Karpovic, Gintare Krisciuniene, Linas Ablonskis, Lina Nemuraite:
The Comprehensive Mapping of Semantics of Business Vocabulary and Business Rules (SBVR) to OWL 2 Ontologies. 289-302 - Hui Cao, Yanbin Zhang, Lixin Jia, Gangquan Si:
A Fuzzy Sequential Pattern Mining Algorithm Based on Independent Pruning Strategy for Parameters Optimization of Ball Mill Pulverizing System. 303-314 - Wojciech P. Hunek, Piotr Dzierwa:
New Results in Generalized Minimum Variance Control of Computer Networks. 315-320 - Jurgita Kapociute-Dzikiene, Algis Krupavicius:
Predicting Party Group from the Lithuanian Parliamentary Speeches. 321-332 - Summaries. 333-338
Volume 43, Number 4, 2014
- Vicente Alarcón Aquino, Juan Manuel Ramírez-Cortés, Pilar Gómez-Gil, Oleg Starostenko, Y. Garcia-Gonzalez:
Network Intrusion Detection Using Self-Recurrent Wavelet Neural Network with Multidimensional Radial Wavelons. 347-358 - J. Apolinar Muñoz Rodríguez:
Improving the Modeling of the Plantar Surface via Bezier Networks and Laser Projection. 359-370 - Safdar Zaman, Wolfgang Slany:
Smartphone-Based Online and Offline Speech Recognition System for ROS-Based Robots. 371-380 - Chien-Lung Hsu, Yu-Hao Chuang, Pei-Ling Tsai, Atif Alamri, Sk. Md. Mizanur Rahman:
Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions. 381-389 - Yuanyuan Zhang, Jianhua Chen, Baojun Huang, Cong Peng:
An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography. 390-401 - Daiva Sveikauskiene, Laimutis Telksnys:
Accuracy of the Parsing of Lithuanian Simple Sentences. 402-413 - Mitja Trampus, Dunja Mladenic:
Constructing Domain Templates with Concept Hierarchy as Background Knowledge. 414-432 - Metin Turan, Coskun Sönmez, Murat Can Ganiz:
The Benchmark of Paragraph and Sentence Extraction Summaries on Outlier Document Filtering Applied Multi-Document Summarizer. 433-439 - Vacius Jusas, Tomas Neverdauskas:
Stimuli generation framework for testing multiple processes in VHDL. 440-446 - Vytautas Kaminskas, Gediminas Liaucius:
Predictor-based Self-tuning Control of Pressure Plants. 447-454 - Summaries. 455-459
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.