Stop the war!
Остановите войну!
for scientists:
default search action
Informatica (Lithuanian Academy of Sciences), Volume 18
Volume 18, Number 1, 2007
- Eduardas Bareisa, Vacius Jusas, Kestutis Motiejunas, Rimantas Seinauskas:
Functional Test Generation Based on Combined Random and Deterministic Search Methods. 3-26 - Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu:
A Secure YS-Like User Authentication Scheme. 27-36 - Vytautas Cyras:
Composition of Loop Modules in the Structural Blanks Approach to Programming with Recurrences: A Task of Synthesis of Nested Loops. 37-54 - Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzonelih Hwang:
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes. 55-60 - Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee:
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem. 61-66 - Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao:
A New ID-Based Deniable Authentication Protocol. 67-78 - Athanasios Margaris, Stavros Souravlas, Efthimios Kotsialos, Manos Roumeliotis:
Design and Implementation of Parallel Counterpropagation Networks Using MPI. 79-102 - Jurate Sakalauskaite:
Sequent Calculi for Branching Time Temporal Logics of Knowledge and Belief. 103-114 - Eligijus Sakalauskas, Povilas Tvarijonas, Andrius Raulynaitis:
Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level. 115-124 - Yuh-Min Tseng:
An Efficient Two-Party Identity-Based Key Exchange Protocol. 125-136 - Chih-Chia Yao, Pao-Ta Yu:
Oblique Support Vector Machines. 137-157
Volume 18, Number 2, 2007
- Baghdad Atmani, Bouziane Beldjilali:
Neuro-IG: A Hybrid System for Selection and Elimination of Predictor Variables and non Relevant Individuals. 163-186 - Jolita Bernataviciene, Gintautas Dzemyda, Virginijus Marcinkevicius:
Conditions for Optimal Efficiency of Relative MDS. 187-202 - Algis Garliauskas:
Information Conveyed by the Neural Network Systems and its Applied Significance. 203-216 - Jingyu Hou:
A Matrix-Based Model for Web Page Community Construction and More. 217-238 - Phani Kumar Kancharla, Shailaja Gummadidala, Ashutosh Saxena:
Identity Based Strong Designated Verifier Signature Scheme. 239-252 - Jonas Kleiza, Mifodijus Sapagovas, Vytautas Kleiza:
The Extension of the Van Der Pauw Method to Anisotropic Media. 253-266 - Alvydas Paunksnis, Skaidra Kurapkiene, Audris Maciulis, Audris Kopustinskas, Marija-Liucija Paunksniene:
Ultrasound Quantitative Evaluation of Human Eye Cataract. 267-278 - Zoran H. Peric, Jelena Nikolic:
An Effective Method for Initialization of Lloyd-Max's Algorithm of Optimal Scalar Quantization for Laplacian Source. 279-288 - Junyan Qian, Baowen Xu:
Formal Verification for C Program. 289-304 - Chunyu Yang, Qingling Zhang, Linna Zhou:
Strongly Absolute Stability Problem of Descriptor Systems. 305-320
Volume 18, Number 3, 2007
- Salem M. Al-Yakoob, Hanif D. Sherali:
Multiple Shift Scheduling of Hierarchical Workforce with Multiple Work Centers. 325-342 - Bostjan Brumen, Matjaz B. Juric, Tatjana Welzer, Ivan Rozman, Hannu Jaakkola, Apostolos Papadopoulos:
Assessment of Classification Models with Small Amounts of Data. 343-362 - Valentina Dagiene, Rimgaudas Laucius:
Internationalization of Compilers. 363-374 - Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huang:
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. 375-394 - Sigita Laurinciukaite, Antanas Lipeika:
Framework for Choosing a Set of Syllables and Phonemes for Lithuanian Speech Recognition. 395-406 - Arvydas Martinkenas, Vytautas Kaminskas, Giedrius Varoneckas:
Forecast Model of Impact of Meteorological Factors on Coronary Artery Disease Patients. 407-418 - Athanasios D. Styliadis:
E-Learning Documentation of Historical Living Systems with 3-D Modeling Functionality. 419-446 - Ching-Liang Su:
Overlapped Finger Geometry Signal Processing and Finger Shape Comparisons for Person Identification. 447-456 - Mihai Talmaciu, Elena Nechita:
Recognition Algorithm for Diamond-Free Graphs. 457-462 - Jonas Valantinas, Tomas Zumbakis:
On the Application of Invariant Image Parameters to Fractal Encoding of Bi-Level Images. 463-478
Volume 18, Number 4, 2007
- Omara Abdul Hamid, Muhammad Abdul Qadir, Nadeem Iftikhar, Mohib ur Rehman, Mobin Uddin Ahmed, Imran Ihsan:
Generic Multimedia Database Architecture Based upon Semantic Libraries. 483-510 - Sidi Mohamed Benslimane, Mimoun Malki, Mustapha Kamal Rahmouni, Djamal Benslimane:
Extracting Personalised Ontology from Data-Intensive Web Application: an HTML Forms-Based Reverse Engineering Approach. 511-534 - Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin:
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys. 535-546 - Kim-Kwang Raymond Choo:
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker. 547-568 - Chunlin Li, Layuan Li:
Fabric Level and Application Level QoS Guarantees in Grid Computing. 569-584 - Donatas Ciuksys, Albertas Caplinskas:
Reusing Ontological Knowledge about Business Processes in IS Engineering: Process Configuration Problem. 585-602 - Darius Grigaitis, Vaida Bartkute, Leonidas Sakalauskas:
An Optimization of System for Automatic Recognition of Ischemic Stroke Areas in Computed Tomography Images. 603-614 - Jeng-Shyang Pan, Hao Luo, Zhe-Ming Lu:
Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images. 615-628
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.