


default search action
Informatica (Lithuanian Academy of Sciences), Volume 23
Volume 23, Number 1, 2012
- Willem Karel M. Brauers, Edmundas Kazimieras Zavadskas:

Robustness of MULTIMOORA: A Method for Multi-Objective Optimization. 1-25 - Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, Zhongmei Wan:

Identity-Based Key-Insulated Signcryption. 27-45 - Bogdan Lipus, Borut Zalik:

Efficient Reconstruction of Images with Deliberately Corrupted Pixels. 47-63 - Kazys Kazlauskas, Rimantas Pupeikis:

A Forward-Backward Approach for Instantaneous Frequency Estimation of Frequency Modulated Signals in Noisy Environment. 65-76 - Jonas Mockus:

On Simulation of the Nash Equilibrium in the Stock Exchange Contest. 77-104 - Vidas Raudonis, Agne Paulauskaite-Taraseviciene, Laura Kizauskiene:

The Gaze Tracking System with Natural Head Motion Compensation. 105-124 - Milan S. Savic, Zoran H. Peric, Milan R. Dincic:

Coding Algorithm for Grayscale Images Based on Piecewise Uniform Quantizers. 125-140 - Dragisa Stanujkic, Nedeljko Magdalinovic, Sanja Stojanovic, Rodoljub Jovanovic:

Extension of Ratio System Part of MOORA Method for Solving Decision-Making Problems with Interval Data. 141-154 - Eun-Jun Yoon, Kee-Young Yoo:

An Improvement of the User Identification and Key Agreement Protocol with User Anonymity. 155-172
Volume 23, Number 2, 2012
- Alvydas Balezentis, Tomas Balezentis, Willem Karel M. Brauers:

MULTIMOORA-FG: A Multi-Objective Decision Making Method for Linguistic Reasoning with an Application to Personnel Selection. 173-190 - Jérémy Besson, Audrone Lupeikiene, Viktor Medvedev:

Comparing Real and Intended System Usages: A Case for Web Portal. 191-201 - Dragan Djuric, Vladan Devedzic:

Incorporating the Ontology Paradigm into a Mainstream Programming Environment. 203-224 - Jong Soo Kim, Won Chan Jeong:

A Coordination Model Under an Order-Up-To Policy. 225-246 - Pavel Loupal, Irena Mlýnková, Martin Necaský, Karel Richta, Pavel Strnad:

Storing XML Data - The ExDB and CellStore Way in the Context of Current Approaches. 247-282 - Jozef Vörös:

Parametric Identification of Systems with General Backlash. 283-298 - Xu An Wang, Xiaoyuan Yang, Minqing Zhang, Yong Yu:

Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model. 299-314 - Tsu-Yang Wu, Yuh-Min Tseng:

Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants. 315-334
Volume 23, Number 3, 2012
- Dovile Buteikiene, Alvydas Paunksnis, Valerijus Barzdziukas, Jolita Bernataviciene, Virginijus Marcinkevicius, Povilas Treigys:

Assessment of the Optic Nerve Disc and Excavation Parameters of Interactive and Automated Parameterization Methods. 335-355 - James K. Ho:

Spreadsheet-Based Simulation Models for Decision Support: Case of Strategic Pairings in Sport Tournaments with Match Play for Team Competition. 357-368 - Diana Kalibatiene, Olegas Vasilecas:

Application of the Ontology Axioms for the Development of OCL Constraints from PAL Constraints. 369-390 - Mark Sh. Levin:

Towards Clique-Based Fusion of Graph Streams in Multi-Function System Testing. 391-404 - Jonas Mockus, Lina Pupeikiene:

On Multi-Start Algorithms for Optimization of High School Timetables. 405-425 - Henrikas Pranevicius, Stanislovas Norgela:

Applications of Finite Linear Temporal Logic to Piecewise Linear Aggregates. 427-441 - Haifeng Qian, Xiangxue Li, Xinli Huang:

Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model. 443-460 - Ayeley P. Tchangani, Yasmina Bouzarour-Amokrane, François Pérès:

Evaluation Model in Decision Analysis: Bipolar Approach. 461-485 - Tung-Tso Tsai, Yuh-Min Tseng, Tsu-Yang Wu:

A Fully Secure Revocable ID-Based Encryption in the Standard Model. 487-505
Volume 23, Number 4, 2012
- Romualdas Bausys, Arturas Kriukovas:

Pixel-Wise Tamper Detection Under Generic Blur/Sharpen Attacks. 507-520 - Bostjan Brumen, Marko Hölbl, Katja Harej Pulko, Tatjana Welzer, Marjan Hericko, Matjaz B. Juric, Hannu Jaakkola:

Learning Process Termination Criteria. 521-536 - Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:

Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages. 537-562 - Albertas Caplinskas, Gintautas Dzemyda, Ferenc Kiss, Audrone Lupeikiene:

Processing of Undesirable Business Events in Advanced Production Planning Systems. 563-579 - Ganesh R. Naik:

Measure of Quality of Source Separation for Sub- and Super-Gaussian Audio Mixtures. 581-599 - Juana López Redondo, Pilar Martínez Ortigosa, Julius Zilinskas:

Multimodal Evolutionary Algorithm for Multidimensional Scaling with City-Block Distances. 601-620 - Mohammadreza Sadeghi, Mohammad Ali Rashidzadeh, Mohammad Ali Soukhakian:

Using Analytic Network Process in a Group Decision-Making for Supplier Selection. 621-643 - Smiljan Sinjur, Damjan Zazula, Borut Zalik:

Fast Convex Layers Algorithm for Near-Duplicate Image Detection. 645-663 - Shouzhen Zeng, Tomas Balezentis, Chonghui Zhang:

A Method Based on OWA Operator and Distance Measures for Multiple Attribute Decision Making with 2-Tuple Linguistic Information. 665-681

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














