


Остановите войну!
for scientists:


default search action
Informatica (Lithuanian Academy of Sciences), Volume 16
Volume 16, Number 1, 2005
- Bernhard Anrig, Dalia Baziukaite:
Probabilistic Argumentation Systems with Decision Variables. 3-18 - Eduardas Bareisa, Vacius Jusas, Kestutis Motiejunas, Rimantas Seinauskas:
The Realization-Independent Testing Based on the Black Box Fault Models. 19-36 - Chin-Chen Chang, Iuon-Chang Lin:
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach. 37-44 - Nedzad Dukic, Zikrija Avdagic:
Fuzzy Functional Dependency and the Resolution Principle. 45-60 - Mindaugas Kavaliauskas, Rimantas Rudzkis:
Multivariate Data Clustering for the Gaussian Mixture Model. 61-74 - Geruta Kazakeviciute, Eugenijus Januskevicius, René Rosenbaum, Heidrun Schumann:
Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure. 75-92 - Jong Soo Kim, Yong Chan Kim, Ki Young Shin:
An Algorithm for Portfolio Optimization Problem. 93-106 - Friedel Peldschus, Edmundas Kazimieras Zavadskas:
Fuzzy Matrix Games Multi-Criteria Model for Decision-Making in Engineering. 107-120 - Constantin Popescu:
An Improvement of the Ateniese's Verifiable Encryption Protocol. 121-130 - Rimantas Pupeikis:
On the Identification of Wiener Systems Having Saturation-like Functions with Positive Slopes. 131-144 - Julius Zilinskas:
Comparison of Packages for Interval Arithmetic. 145-154
Volume 16, Number 2, 2005
- Algis Garliauskas:
An Influence of Nonlinearities to Storage Capacity of Neural Networks. 159-174 - Saulius Gudas, Audrius Lopata, Tomas Skersys:
Approach to Enterprise Modelling for Information Systems Engineering. 175-192 - Pijus Kasparaitis:
Diphone Databases for Lithuanian Text-to-Speech Synthesis. 193-202 - Wei-Chi Ku, Hao-Chuan Tsai:
Weaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme. 203-212 - Mark Sh. Levin, Moshe A. Danieli:
Hierarchical Decision Making Framework for Evaluation and Improvement of Composite Systems (Example for Building). 213-240 - Sabah Mohammed, Jinan Fiaidhi:
Transcoding Aspects for Image Tele-Collaboration. 241-260 - Haifeng Qian, Zhenfu Cao, Qingshui Xue:
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers. 261-274 - Yuh-Min Tseng:
An Improved Conference-Key Agreement Protocol with Forward Secrecy. 275-284 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:
Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme. 285-294 - Ales Zivkovic, Marjan Hericko, Bostjan Brumen, Simon Beloglavec, Ivan Rozman:
The Impact of Details in the Class Diagram on Software Size Estimation. 295-312
Volume 16, Number 3, 2005
- Raimondas Ciegis:
Analysis of Parallel Preconditioned Conjugate Gradient Algorithms. 317-332 - Yonggang Fu, Ruimin Shen, Liping Shen, Xusheng Lei:
Reliable Information Hiding Based on Support Vector Machine. 333-346 - Danute Krapavickaite, Aleksandras Plikusas:
Estimation of a Ratio in the Finite Population. 347-364 - Stelios E. Papadakis, Panagiotis Tzionas, Vassilis G. Kaburlasos, John B. Theocharis:
A Genetic Based Approach to the Type I Structure Identification Problem. 365-382 - Eligijus Sakalauskas:
One Digital Signature Scheme in Semimodule over Semiring. 383-394 - Manuel de la Sen:
Some Conceptual Links between Dynamic Physical Systems and Operator Theory Issues Concerning Energy Balances and Stability. 395-406 - Daiva Sveikauskiene:
Graph Representation of the Syntactic Structure of the Lithuanian Sentence. 407-418 - Hsien-Wen Tseng, Chin-Chen Chang:
Hiding Data in Halftone Images. 419-430 - Fei Xue, Da-Zhong Zheng, Lu Yan:
Fault Diagnosis of Distributed Discrete Event Systems Using OBDD . 431-448 - Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:
An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications. 449-468
Volume 16, Number 4, 2005
- Karim Bouamrane, Christian Tahon, Marc Sevaux, Bouziane Beldjilali:
Decision Making System for Regulation of a Bimodal Urban Transportation Network, Associating a Classical and a Multi-Agent Approaches. 473-502 - Ya-Fen Chang, Chin-Chen Chang:
Schemes for Digital Gift Certificates with Low Computation Complexity. 503-518 - Albertas Caplinskas, Jelena Gasperovic:
Techniques to Aggregate the Characteristics of Internal Quality of an IS Specification Language. 519-540 - Arturas Janusauskas, Rytis Jurkonis, Arunas Lukosevicius, Skaidra Kurapkiene, Alvydas Paunksnis:
The Empirical Mode Decomposition and the Discrete Wavelet Transform for Detection of Human Cataract in Ultrasound Signals. 541-556 - James K. Ho, Sydney C. K. Chu:
Maximum Resolution Topology for Multi-Attribute Dichotomies. 557-570 - Vytautas Kaminskas, Raimundas Liutkevicius:
Learning Fuzzy Control of Nonlinear Processes. 571-586 - Tomas Kulvicius, Minija Tamosiunaite, Rimas Vaisnys:
{T} Wave Alternans Features for Automated Detection. 587-602 - Hong Zhou, Shahram Rahimi, Raheel Ahmad, Marcin Paprzycki, Yufang Wang, Maria A. Cobb:
ORVPF - the Model and its DNC Implementation. 603-616

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.