


default search action
Informatica (Lithuanian Academy of Sciences), Volume 28
Volume 28, Number 1, 2017
- Matej Antol, Vlastislav Dohnal:

Popularity-Based Ranking for Fast Approximate kNN Search. 1-21 - Valentina Dagiene, Sue Sentance, Gabriele Stupuriene:

Developing a Two-Dimensional Categorization System for Educational Tasks in Informatics. 23-44 - Stephen J. Hegner, M. Andrea Rodríguez:

A Model for Multigranular Data and Its Integrity. 45-78 - Mehdi Keshavarz-Ghorabaee, Maghsoud Amiri, Zenonas Turskis:

A New Approach for Solving Bi-Objective Redundancy Allocation Problem Using DOE, Simulation and ε-Constraint Method. 79-104 - Tianrun Li, Thomas Heinis, Wayne Luk:

ADvaNCE - Efficient and Scalable Approximate Density-Based Clustering Based on Hashing. 105-130 - Yutaka Ohsawa, Htoo Htoo, Tin Nilar Win:

Safe-Region Generation Methods for Continuous Trip Route Planning Queries. 131-154 - Florian Stahl, Gottfried Vossen:

Name Your Own Price on Data Marketplaces. 155-180 - Dragisa Stanujkic, Edmundas Kazimieras Zavadskas, Florentin Smarandache, Willem Karel M. Brauers, Darjan Karabasevic:

A Neutrosophic Extension of the MULTIMOORA Method. 181-192 - Tung-Tso Tsai, Sen-Shan Huang, Yuh-Min Tseng:

SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices. 193-214
Volume 28, Number 2, 2017
- Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:

Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security. 215-235 - Jian Guan, Dao Zhou, Fanyong Meng:

Distance Measure and Correlation Coefficient for Linguistic Hesitant Fuzzy Sets and Their Application. 237-268 - Sevil Sentürk, Jurgita Antucheviciene:

Interval Type-2 Fuzzy c-Control Charts: An Application in a Food Company. 269-283 - Vahid Shah-Mansouri, Seshadhri Srinivasan, Valentina Emilia Balas:

Optimal Access Class Barring in Machine to Machine Systems with Random Activation Time. 285-302 - Haojun Sun, Rongbo Chen, Yong Qin, Shengrui Wang:

Holo-Entropy Based Categorical Data Hierarchical Clustering. 303-328 - Chunqiao Tan, Yuan Jia, Xiaohong Chen:

2-Tuple Linguistic Hesitant Fuzzy Aggregation Operators and Its Application to Multi-Attribute Decision Making. 329-358 - Julius Venskus, Povilas Treigys, Jolita Bernataviciene, Viktor Medvedev, Miroslav Voznák, Mindaugas Kurmis, Violeta Bulbenkiene:

Integration of a Self-Organizing Map and a Virtual Pheromone for Real-Time Abnormal Movement Detection in Marine Traffic. 359-374 - Jen-Ho Yang, Iuon-Chang Lin, Po-Ching Chien:

Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery. 375-386 - Jun Ye:

Some Weighted Aggregation Operators of Trapezoidal Neutrosophic Numbers and Their Multiple Attribute Decision Making Method. 387-402 - Ming-Che Yeh, Cheng-Yu Yeh, Shaw-Hwa Hwang:

An Improved Version of Algebraic Codebook Search Algorithm for an AMR-WB Speech Coder. 403-414
Volume 28, Number 3, 2017
- Bekir Afsar, Dogan Aydin, Aybars Ugur, Serdar Korukoglu:

Self-Adaptive and Adaptive Parameter Control in Improved Artificial Bee Colony Algorithm. 415-438 - Mykolas J. Bilinskas, Gintautas Dzemyda, Mantas Trakymas:

Feature-Based Registration of Thorax CT Scan Slices. 439-452 - Changping Liu, Bo Peng:

A Method for Group Decision Making Based on Interval-Valued Intuitionistic Fuzzy Geometric Distance Measures. 453-470 - Chandrashekhar Meshram, Yuh-Min Tseng, Cheng-Chi Lee, Sarita Gajbhiye Meshram:

An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP. 471-484 - Morteza Mostamand, Seyed Hossein Razavi Hajiagha, Maryam Daneshvar:

Selecting Strategies by Considering Budget Limitation: A Hybrid Algorithm of SWOT-DEMATEL-ANP and Binary Programming with Grey Information. 485-503 - V. B. Surya Prasath:

Quantum Noise Removal in X-Ray Images with Adaptive Total Variation Regularization. 505-515 - Eligijus Sakalauskas, Aleksejus Mihalkovich:

Improved Asymmetric Cipher Based on Matrix Power Function Resistant to Linear Algebra Attack. 517-524 - Marcin Szpyrka, Grzegorz J. Nalepa

, Krzysztof Kluza:
From Process Models to Concurrent Systems in Alvis Language. 525-545 - Guiwu Wei:

Some Cosine Similarity Measures for Picture Fuzzy Sets and Their Applications to Strategic Decision Making. 547-564 - Xiaolu Zhang:

A Closeness Index-Based TODIM Method for Hesitant Qualitative Group Decision Making. 565-581
Volume 28, Number 4, 2017
- Salem M. Al-Yakoob, Hanif D. Sherali:

A Column Generation Mathematical Model for a Teaching Assistant Workload Assignment Problem. Informatica 28(4): 583-608 (2017) - Ali Fahmi, Cengiz Kahraman:

Fuzzy Evaluation of Examinees Through Multiple Choice Questions. Informatica 28(4): 609-628 (2017) - Jan Sher Khan, Muazzam Ali Khan, Jawad Ahmad, Seong Oun Hwang, Waqas Ahmed:

An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes. Informatica 28(4): 629-649 (2017) - Rongling Lang, Fei Zhao, Yongtang Shi:

A Support Vector Machine for Regression in Complex Field. Informatica 28(4): 651-664 (2017) - Peide Liu, Xiyun Qin:

An Extended VIKOR Method for Decision Making Problem with Interval-Valued Linguistic Intuitionistic Fuzzy Numbers Based on Entropy. Informatica 28(4): 665-685 (2017) - Titas Savickas, Olegas Vasilecas:

Decision Support Using Belief Network Constructed from Business Process Event Log. Informatica 28(4): 687-701 (2017) - Nikola Simic, Zoran H. Peric, Milan S. Savic:

Coding Algorithm for Grayscale Images - Design of Piecewise Uniform Quantizer with Golomb-Rice Code and Novel Analytical Model for Performance Analysis. Informatica 28(4): 703-724 (2017) - Dragisa Stanujkic, Edmundas Kazimieras Zavadskas, Darjan Karabasevic, Snezana Urosevic, Mladjan Maksimovic:

An Approach for Evaluating Website Quality in Hotel Industry Based on Triangular Intuitionistic Fuzzy Numbers. Informatica 28(4): 725-748 (2017) - Snejana Yordanova, Alexandar Ichtev:

A Model-Free Neuro-Fuzzy Predictive Controller for Compensation of Nonlinear Plant Inertia and Time Delay. Informatica 28(4): 749-766 (2017)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














