


default search action
Informatica (Lithuanian Academy of Sciences), Volume 17
Volume 17, Number 1, 2006
- Valentina Dagiene, Gintautas Grigas:

Quantitative Evaluation of the Process of Open Source Software Localization. 3-12 - Adam Janiak, Mikhail Y. Kovalyov:

Job Sequencing with Exponential Functions of Processing Times. 13-24 - Arturas Janusauskas, Vaidotas Marozas, Arunas Lukosevicius, Leif Sörnmo:

The Hilbert-Huang Transform for Detection of Otoacoustic Emissions and Time-Frequency Mapping. 25-38 - Ionel Muscalagiu, Vladimir Cretu:

Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques. 39-54 - Rimantas Pupeikis:

On the Identification of Hammerstein Systems Having Saturation-like Functions with Positive Slopes. 55-68 - Reza Ravani, Ali Meghdari:

Velocity Distribution Profile for Robot Arm Motion Using Rational Frenet-Serret Curves. 69-84 - Jurate Sakalauskaite:

Sequent Calculi for Temporal Logics of Common Knowledge and Belief. 85-94 - Emmanuel Stefanakis:

Scheduling Trajectories on a Planar Surface with Moving Obstacles. 95-110 - Airenas Vaiciunas, Gailius Raskinis:

Cache-based Statistical Language Models of English and Highly Inflected Lithuanian. 111-124 - Julius Zilinskas:

Estimation of Functional Ranges Using Standard and Inner Interval Arithmetic. 125-136 - Shu-Ching Wang, Kuo-Qin Yan, Mao-Lun Chiang:

Optimal Agreement in a Scale-Free Network Environment. 137-150
Volume 17, Number 2, 2006
- Algis Brazenas, Dainius Vaiciulis, Vytautas Kleiza:

Determination of Stress Strain State Components of Butt Welded Joint with Mild Interlayer Subjected to Elasto-Plastic Tension. 157-176 - Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:

Identity Based Multisignatures. 177-186 - Aboul Ella Hassanien:

A Copyright Protection using Watermarking Algorithm. 187-198 - Kazys Kazlauskas, Jaunius Kazlauskas:

Iterative Estimation Algorithm of Autoregressive Parameters. 199-206 - Algirdas Maknickas, Arnas Kaceniauskas, Rimantas Kacianauskas, Robertas Balevicius, Algis Dziugys:

Parallel DEM Software for Simulation of Granular Media. 207-224 - Kamal E. Melkemi, Mohamed Batouche, Sebti Foufou:

A Multiresolution Approach Based on MRF and Bak-Sneppen Models for Image Segmentation. 225-236 - Alfonsas Misevicius:

Experiments with Hybrid Genetic Algorithm for the Grey Pattern Problem. 237-258 - Jonas Mockus:

Investigation of Examples of E-Education Environment for Scientific Collaboration and Distance Graduate Studies, Part 1. 259-278 - Gintaras Palubeckis:

Iterated Tabu Search for the Unconstrained Binary Quadratic Optimization Problem. 279-296 - Sarunas Paulikas, Dalius Navakauskas:

Discrimination of Homographs Distorted by a Lengthy Impulsive Noise. 297-304
Volume 17, Number 3, 2006
- Raimondas Ciegis:

Parallel Numerical Algorithms for 3D Parabolic Problem with Nonlocal Boundary Condition. 309-324 - Jelena Gasperovic, Albertas Caplinskas:

Methodology to Evaluate the Functionality of Specification Languages. 325-346 - Zhenjie Huang, Kefei Chen, Yumin Wang:

Provably Secure Convertible User Designating Confirmer Partially Blind Signatures. 347-362 - Athanasis Karoulis, Stella Sylaiou, Martin White:

Usability Evaluation of a Virtual Museum Interface. 363-380 - Jong Soo Kim, Sun Hur, Tai Young Kim:

A Multiechelon Repairable Item Inventory System with Lateral Transshipment and a General Repair Time Distribution. 381-392 - Auparajita Krishnaa, Manohar Singh Dulawat:

Algorithms for Inner Magic and Inner Antimagic Labelings of Some Planar Graphs. 393-406 - Sunilkumar S. Manvi, Pallapa Venkataram:

An Agent-Based Best Effort Routing Technique for Load Balancing. 407-426 - Reghunadhan Rajesh, M. Ramachandra Kaimal:

Variable Gain Takagi-Sugeno Fuzzy Logic Controllers. 427-444 - Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang:

Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem. 445-462
Volume 17, Number 4, 2006
- Kim-Kwang Raymond Choo:

On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols. 467-480 - Chinnappan Jayakumar, Chenniappan Chellappan:

Optimized on Demand Routing Protocol of Mobile Ad Hoc Network. 481-502 - Kestutis Kapocius, Rimantas Butleris:

Repository for Business Rules Based IS Requirements. 503-518 - Yu Long, Kefei Chen, Shengli Liu:

Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing. 519-534 - Rami A. AL-Na'mneh, W. David Pan, Seong-Moo Yoo:

Efficient Adaptive Algorithms for Transposing Small and Large Matrices on Symmetric Multiprocessors. 535-550 - Constantin Popescu:

An Electronic Cash System Based on Group Blind Signatures. 551-564 - Manuel de la Sen:

A Note about Total Stability of a Class of Hybrid Systems. 565-576 - Zuhua Shao:

Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys. 577-586 - Mantas Skripkauskas, Laimutis Telksnys:

Automatic Transcription of Lithuanian Text Using Dictionary. 587-600 - Edmundas Kazimieras Zavadskas, Algimantas Zakarevicius, Jurgita Antucheviciene:

Evaluation of Ranking Accuracy in Multi-Criteria Decisions. 601-618

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














