


default search action
Informatica (Lithuanian Academy of Sciences), Volume 18
Volume 18, Number 1, 2007
- Eduardas Bareisa, Vacius Jusas, Kestutis Motiejunas, Rimantas Seinauskas:

Functional Test Generation Based on Combined Random and Deterministic Search Methods. 3-26 - Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu:

A Secure YS-Like User Authentication Scheme. 27-36 - Vytautas Cyras:

Composition of Loop Modules in the Structural Blanks Approach to Programming with Recurrences: A Task of Synthesis of Nested Loops. 37-54 - Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzonelih Hwang:

On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes. 55-60 - Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee:

Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem. 61-66 - Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao:

A New ID-Based Deniable Authentication Protocol. 67-78 - Athanasios Margaris, Stavros Souravlas, Efthimios Kotsialos, Manos Roumeliotis:

Design and Implementation of Parallel Counterpropagation Networks Using MPI. 79-102 - Jurate Sakalauskaite:

Sequent Calculi for Branching Time Temporal Logics of Knowledge and Belief. 103-114 - Eligijus Sakalauskas, Povilas Tvarijonas, Andrius Raulynaitis:

Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level. 115-124 - Yuh-Min Tseng:

An Efficient Two-Party Identity-Based Key Exchange Protocol. 125-136 - Chih-Chia Yao, Pao-Ta Yu:

Oblique Support Vector Machines. 137-157
Volume 18, Number 2, 2007
- Baghdad Atmani, Bouziane Beldjilali:

Neuro-IG: A Hybrid System for Selection and Elimination of Predictor Variables and non Relevant Individuals. 163-186 - Jolita Bernataviciene, Gintautas Dzemyda, Virginijus Marcinkevicius:

Conditions for Optimal Efficiency of Relative MDS. 187-202 - Algis Garliauskas:

Information Conveyed by the Neural Network Systems and its Applied Significance. 203-216 - Jingyu Hou:

A Matrix-Based Model for Web Page Community Construction and More. 217-238 - Phani Kumar Kancharla, Shailaja Gummadidala, Ashutosh Saxena:

Identity Based Strong Designated Verifier Signature Scheme. 239-252 - Jonas Kleiza, Mifodijus Sapagovas, Vytautas Kleiza:

The Extension of the Van Der Pauw Method to Anisotropic Media. 253-266 - Alvydas Paunksnis, Skaidra Kurapkiene, Audris Maciulis, Audris Kopustinskas, Marija-Liucija Paunksniene:

Ultrasound Quantitative Evaluation of Human Eye Cataract. 267-278 - Zoran H. Peric, Jelena Nikolic:

An Effective Method for Initialization of Lloyd-Max's Algorithm of Optimal Scalar Quantization for Laplacian Source. 279-288 - Junyan Qian, Baowen Xu

:
Formal Verification for C Program. 289-304 - Chunyu Yang, Qingling Zhang, Linna Zhou:

Strongly Absolute Stability Problem of Descriptor Systems. 305-320
Volume 18, Number 3, 2007
- Salem M. Al-Yakoob, Hanif D. Sherali:

Multiple Shift Scheduling of Hierarchical Workforce with Multiple Work Centers. 325-342 - Bostjan Brumen, Matjaz B. Juric, Tatjana Welzer, Ivan Rozman, Hannu Jaakkola, Apostolos Papadopoulos:

Assessment of Classification Models with Small Amounts of Data. 343-362 - Valentina Dagiene, Rimgaudas Laucius:

Internationalization of Compilers. 363-374 - Zhenjie Huang, Kefei Chen, Xuanzhi Lin, Rufen Huang:

Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes. 375-394 - Sigita Laurinciukaite, Antanas Lipeika:

Framework for Choosing a Set of Syllables and Phonemes for Lithuanian Speech Recognition. 395-406 - Arvydas Martinkenas, Vytautas Kaminskas, Giedrius Varoneckas:

Forecast Model of Impact of Meteorological Factors on Coronary Artery Disease Patients. 407-418 - Athanasios D. Styliadis:

E-Learning Documentation of Historical Living Systems with 3-D Modeling Functionality. 419-446 - Ching-Liang Su:

Overlapped Finger Geometry Signal Processing and Finger Shape Comparisons for Person Identification. 447-456 - Mihai Talmaciu, Elena Nechita:

Recognition Algorithm for Diamond-Free Graphs. 457-462 - Jonas Valantinas, Tomas Zumbakis:

On the Application of Invariant Image Parameters to Fractal Encoding of Bi-Level Images. 463-478
Volume 18, Number 4, 2007
- Omara Abdul Hamid, Muhammad Abdul Qadir, Nadeem Iftikhar, Mohib ur Rehman, Mobin Uddin Ahmed, Imran Ihsan:

Generic Multimedia Database Architecture Based upon Semantic Libraries. 483-510 - Sidi Mohamed Benslimane, Mimoun Malki, Mustapha Kamal Rahmouni, Djamal Benslimane:

Extracting Personalised Ontology from Data-Intensive Web Application: an HTML Forms-Based Reverse Engineering Approach. 511-534 - Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin:

A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys. 535-546 - Kim-Kwang Raymond Choo:

An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker. 547-568 - Chunlin Li, Layuan Li:

Fabric Level and Application Level QoS Guarantees in Grid Computing. 569-584 - Donatas Ciuksys, Albertas Caplinskas:

Reusing Ontological Knowledge about Business Processes in IS Engineering: Process Configuration Problem. 585-602 - Darius Grigaitis, Vaida Bartkute, Leonidas Sakalauskas:

An Optimization of System for Automatic Recognition of Ischemic Stroke Areas in Computed Tomography Images. 603-614 - Jeng-Shyang Pan, Hao Luo, Zhe-Ming Lu:

Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images. 615-628

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














