


default search action
Information Technology and Control, Volume 45
Volume 45, Number 1, 2016
- Grazina Korvel

, Virginija Simonyte, Vytautas Slivinskas:
A Phoneme Harmonic Generator. 7-12 - Caixue Zhou:

Identity Based Generalized Proxy Signcryption Scheme. 13-26 - Algirdas Sukys, Linas Ablonskis, Lina Nemuraite, Bronius Paradauskas:

A Grammar for ADVANCED SBVR Editor. 27-41 - Robert Piotrowski, Karol Blaszkiewicz, Kazimierz Duzinkiewicz

:
Analysis the Parameters of the Adaptive Controller for Quality Control of Dissolved Oxygen Concentration. 42-51 - Darko Brodic

, Zoran N. Milivojevic:
Text Line Segmentation with the Parametric Water Flow Algorithm. 52-61 - Fushan Wei, Jianfeng Ma, Qi Jiang

, Jian Shen, Chuangui Ma:
Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks. 62-70 - Han-Yu Lin:

Secure Certificateless Two-Party Key Agreement with Short Message. 71-76 - Dan Komosny, Miroslav Voznák

, Sergey Bezzateev, Kathiravelu Ganeshan:
The Use of European Internet Communication Properties for IP Geolocation. 77-85 - Daniel Ceferino Gandolfo

, Lucio Rafael Salinas
, Alexandre Santos Brandão
, Juan Marcos Toibero:
Path Following for Unmanned Helicopter: An Approach on Energy Autonomy Improvement. 86-98 - Jonas Ceponis, Algimantas Venckauskas

, Lina Ceponiene, Andrius Zonys:
Extending Rule Set for Static Code Analysis in .NET Platform. 99-108 - Summaries. 109-113

Volume 45, Number 2, 2016
- Jack Fernando Bravo-Torres

, Yolanda Blanco-Fernández
, Martín López Nores, José Juan Pazos-Arias, Manuel Ramos Cabrer, Alberto Gil-Solla
:
Proactive Discovery and Management of Ride-Sharing Opportunities in Smart Vehicular Ad-Hoc Networks. 121-135 - Lei Chen:

A novel clustering algorithm for large-scale text collection and its incremental version. 136-147 - Mindaugas Gvardinskas, Minija Tamosiunaite:

Approximation of unbiased convex classification error rate estimator. 148-155 - Bahia Yahya-Zoubir

, Latifa Hamami, Llies Saadaoui, Rafik Ouared:
Automatic 3D Mesh-Based Centerline Extraction from a Tubular Geometry Form. 156-163 - Dejan Mitrovic, Mirjana Ivanovic

, Milan Vidakovic, Zoran Budimac
:
Siebog: An Enterprise-Scale Multiagent Middleware. 164-174 - Juri Belikov

, Ülle Kotta
, Aleksei Tepljakov
:
Algebraic Approach for Analysis and Control of a Water Tank System. 175-183 - Rafal Brociek

, Damian Slota
:
Application and comparison of intelligent algorithms to solve the fractional heat conduction inverse problem. 184-194 - Jaroslav Karpovic, Linas Ablonskis, Lina Nemuraite, Bronius Paradauskas:

Experimental investigation of transformations from SBVR business vocabularies and business rules to owl 2 ontologies. 195-207 - Wen-Chung Kuo, Chi-Sheng Lin, Chen-Tsun Chuang, Ming-Chih Kao:

Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps. 208-213 - Gintare Vaideliene, Jonas Valantinas, Petras Razanskas:

On the Use of Discrete Wavelets in Implementing Defect Detection System for. 214-222
Volume 45, Number 3, 2016
- Narjes Khalifa, Rania Linda Filali, Mohamed Benrejeb:

A Fast Selective Image Encryption Using Discrete Wavelet Transform And Chaotic Systems Synchronization. 235-242 - Ying-Hao Hung, Sen-Shan Huang, Yuh-Min Tseng:

A Short Certificate-based Signature Scheme with Provable Security. 243-253 - Aleksas Riskus, Armantas Ostreika

, Antanas Lenkevicius, Vytautas Buksnaitis:
A simple centerline extraction approach for 2D polygons. 254-260 - Luka Filipovic, Bozo Krstajic:

Combined load balancing algorithm in distributed computing environment. 261-266 - Yiwei Yuan, Hui Cao, Yanbin Zhang, Qian Xie, Rui Yao:

Outlier Mining Based on Neighbor-Density-Deviation with Minimum Hyper-Sphere. 267-277 - Hong Xiang, Xiaofeng Xia, Haibo Hu, Sheng Wang, Jun Sang, Chunxiao Ye:

Approaches to access control policy comparison and the inter-domain role mapping problem. 278-288 - Cheng-Chi Lee

, Chun-Ta Li
, Chin-Ling Chen, Shih-Ting Chiu:
A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services. 289-299 - Vytautas Jakstys, Virginijus Marcinkevicius

, Povilas Treigys, Jevgenij Tichonov:
Detection of the Road Pothole Contour in Raster Images. 300-307 - Andrius Krisciunas

, Rimantas Barauskas:
Highly convergent finite elements with diagonal mass matrix for short wave pulse propagation simulation. 308-320 - Stefan Miskovic, Zorica Stanimirovic

:
Hybrid metaheuristic method for solving a multi-period emergency service location problem. 321-337
Volume 45, Number 4, 2016
- Shu-Ching Wang, Shun-Sheng Wang, Kuo-Qin Yan:

New Anatomy of Trustworthy Mobile Cloud Computing. 349-357 - Guo-Qiang Zeng

, Haiyang Liu, Di Wu, Li-Min Li, Lie Wu, Yu-Xing Dai
, Kang-Di Lu
:
A Real-coded Extremal Optimization Method with Multi-non-uniform Mutation for the Design of Fractional Order PID Controllers. 358-375 - Lingfei Xiao:

Uncertainty and Disturbance Estimator based Control of Active Suspensions with a Hydraulic Actuator. 376-383 - Xinghe Ma, Xuhui Bu:

A novel iterative learning control design for linear discrete time systems based on a 2D Roesser system. 384-392 - Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:

An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol. 393-400 - Alireza Ahangarani

, Abbas Dideban
:
Continuous-Time Delay-Petri Nets as a new tool to Design State Space Controller. 401-411 - Tairen Sun

:
Trajectory-linearization Based Robust Model Predictive Control for Unmanned Surface Vessels with System Constraints. 412-418 - Mindaugas Gvardinskas:

Combined classification error rate estimator for the Fisher linear classifier. 419-429 - Vida Drasute, Renata Burbaite, Vytautas Stuikys, Kristina Bespalova, Sigitas Drasutis, Giedrius Ziberkas:

Personal Generative Library of Educational Resources: A Framework, Model and Implementation. 430-442 - Rimantas Butleris

, Egle Mickeviciute, Lina Nemuraite:
Improving BPMN2 Business Process Model to SBVR Business Vocabulary and Business Rules Transformation with BPMN2 Event Naming Patterns. 443-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














