


default search action
Informatica (Lithuanian Academy of Sciences), Volume 16
Volume 16, Number 1, 2005
- Bernhard Anrig, Dalia Baziukaite:

Probabilistic Argumentation Systems with Decision Variables. 3-18 - Eduardas Bareisa, Vacius Jusas, Kestutis Motiejunas, Rimantas Seinauskas:

The Realization-Independent Testing Based on the Black Box Fault Models. 19-36 - Chin-Chen Chang, Iuon-Chang Lin:

Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach. 37-44 - Nedzad Dukic, Zikrija Avdagic:

Fuzzy Functional Dependency and the Resolution Principle. 45-60 - Mindaugas Kavaliauskas, Rimantas Rudzkis:

Multivariate Data Clustering for the Gaussian Mixture Model. 61-74 - Geruta Kazakeviciute, Eugenijus Januskevicius, René Rosenbaum, Heidrun Schumann:

Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure. 75-92 - Jong Soo Kim, Yong Chan Kim, Ki Young Shin:

An Algorithm for Portfolio Optimization Problem. 93-106 - Friedel Peldschus, Edmundas Kazimieras Zavadskas:

Fuzzy Matrix Games Multi-Criteria Model for Decision-Making in Engineering. 107-120 - Constantin Popescu:

An Improvement of the Ateniese's Verifiable Encryption Protocol. 121-130 - Rimantas Pupeikis:

On the Identification of Wiener Systems Having Saturation-like Functions with Positive Slopes. 131-144 - Julius Zilinskas:

Comparison of Packages for Interval Arithmetic. 145-154
Volume 16, Number 2, 2005
- Algis Garliauskas:

An Influence of Nonlinearities to Storage Capacity of Neural Networks. 159-174 - Saulius Gudas, Audrius Lopata, Tomas Skersys:

Approach to Enterprise Modelling for Information Systems Engineering. 175-192 - Pijus Kasparaitis:

Diphone Databases for Lithuanian Text-to-Speech Synthesis. 193-202 - Wei-Chi Ku, Hao-Chuan Tsai:

Weaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme. 203-212 - Mark Sh. Levin, Moshe A. Danieli:

Hierarchical Decision Making Framework for Evaluation and Improvement of Composite Systems (Example for Building). 213-240 - Sabah Mohammed, Jinan Fiaidhi:

Transcoding Aspects for Image Tele-Collaboration. 241-260 - Haifeng Qian, Zhenfu Cao, Qingshui Xue:

Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers. 261-274 - Yuh-Min Tseng:

An Improved Conference-Key Agreement Protocol with Forward Secrecy. 275-284 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:

Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme. 285-294 - Ales Zivkovic, Marjan Hericko, Bostjan Brumen, Simon Beloglavec, Ivan Rozman:

The Impact of Details in the Class Diagram on Software Size Estimation. 295-312
Volume 16, Number 3, 2005
- Raimondas Ciegis:

Analysis of Parallel Preconditioned Conjugate Gradient Algorithms. 317-332 - Yonggang Fu, Ruimin Shen, Liping Shen, Xusheng Lei:

Reliable Information Hiding Based on Support Vector Machine. 333-346 - Danute Krapavickaite, Aleksandras Plikusas:

Estimation of a Ratio in the Finite Population. 347-364 - Stelios E. Papadakis, Panagiotis Tzionas, Vassilis G. Kaburlasos, John B. Theocharis:

A Genetic Based Approach to the Type I Structure Identification Problem. 365-382 - Eligijus Sakalauskas:

One Digital Signature Scheme in Semimodule over Semiring. 383-394 - Manuel de la Sen:

Some Conceptual Links between Dynamic Physical Systems and Operator Theory Issues Concerning Energy Balances and Stability. 395-406 - Daiva Sveikauskiene:

Graph Representation of the Syntactic Structure of the Lithuanian Sentence. 407-418 - Hsien-Wen Tseng, Chin-Chen Chang:

Hiding Data in Halftone Images. 419-430 - Fei Xue, Da-Zhong Zheng, Lu Yan:

Fault Diagnosis of Distributed Discrete Event Systems Using OBDD . 431-448 - Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:

An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications. 449-468
Volume 16, Number 4, 2005
- Karim Bouamrane, Christian Tahon, Marc Sevaux, Bouziane Beldjilali:

Decision Making System for Regulation of a Bimodal Urban Transportation Network, Associating a Classical and a Multi-Agent Approaches. 473-502 - Ya-Fen Chang, Chin-Chen Chang:

Schemes for Digital Gift Certificates with Low Computation Complexity. 503-518 - Albertas Caplinskas, Jelena Gasperovic:

Techniques to Aggregate the Characteristics of Internal Quality of an IS Specification Language. 519-540 - Arturas Janusauskas, Rytis Jurkonis, Arunas Lukosevicius, Skaidra Kurapkiene, Alvydas Paunksnis:

The Empirical Mode Decomposition and the Discrete Wavelet Transform for Detection of Human Cataract in Ultrasound Signals. 541-556 - James K. Ho, Sydney C. K. Chu:

Maximum Resolution Topology for Multi-Attribute Dichotomies. 557-570 - Vytautas Kaminskas, Raimundas Liutkevicius:

Learning Fuzzy Control of Nonlinear Processes. 571-586 - Tomas Kulvicius, Minija Tamosiunaite, Rimas Vaisnys:

{T} Wave Alternans Features for Automated Detection. 587-602 - Hong Zhou, Shahram Rahimi, Raheel Ahmad, Marcin Paprzycki, Yufang Wang, Maria A. Cobb:

ORVPF - the Model and its DNC Implementation. 603-616

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














