default search action
Information Technology and Control, Volume 41
Volume 41, Number 1, 2012
- Povilas Treigys, Virginijus Marcinkevicius, Arturas Kaklauskas:
Analysis of Iris and pupil parameters for stress Recognition. 7-14 - Shirisha Tallapally:
Security enhancement on Simple Three Party PAKE Protocol. 15-22 - Vytautas Stuikys, Robertas Damasevicius, Giedrius Ziberkas:
Understanding of Heterogeneous Multi-Stage Meta-Programs. 23-32 - Eligijus Sakalauskas:
The multivariate quadratic Power Problem over Zn is NP-Complete. 33-39 - Vincas Laurutis, Ingrida Indrijauskiene, Raimondas Zemblys, Saulius Niauronis:
Effects of Muller-Lyer Illusion on the accuracy of Primary saccades and Smooth Pursuit eye movements. 40-45 - Kestutis Jonelis, Kestutis Brazauskas, Donatas Levisauskas:
A System for Dissolved oxygen Control in Industrial aeration tank. 46-52 - Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu:
A Secure Password-Based Remote User Authentication Scheme without Smart Cards. 53-59 - Ya-Fen Chang, Wei-Liang Tai, Chung-Yi Lin:
A Verifiable Proxy Signature Scheme Based on Bilinear Pairings with Identity-Based Cryptographic Approaches. 60-68 - Chun-Ta Li:
A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications. 69-76 - Zorica Stanimirovic, Miroslav Maric, Srdjan Bozovic, Predrag Stanojevic:
An Efficient Evolutionary Algorithm for Locating Long-Term Care Facilities. 77-89
Volume 41, Number 2, 2012
- Ernestas Vysniauskas, Lina Nemuraite, Bronius Paradauskas:
Preserving Semantics of Owl 2 Ontologies in Relational Databases Using Hybrid Approach. 103-115 - Uros Legat, Anton Biasizzo, Franc Novak:
On line self recovery of embedded multi-processor SOC on FPGA using dynamic partial reconfiguration. 116-124 - Saulius Minkevicius, Leonidas Sakalauskas:
Modeling of the Phenomena in Multiserver Networks. 125-135 - Rytis Maskeliunas, Kastytis Ratkevicius:
Hmi Modelling for Multimodal Lithuanian Applications. 136-142 - Haibin Huang, Guangfu Ma, Yufei Zhuang, Yueyong Lv:
Optimal Spacecraft Formation Reconfiguration with Collision Avoidance Using Particle Swarm Optimization. 143-150 - Mao-Lun Chiang, Hui-Ching Hsieh:
A New Approach to the Fault Detection Problem for Mobile P2P Network. 151-161 - Ming Liu, Quan Bing Liu, Chao Yuan Liu, Jie Cheng Sun:
Data Evolvement Analysis Based on Topology Self-Adaptive Clustering algorithm. 162-172 - Yuh-Min Tseng, Chen-Hung Yu, Tsu-Yang Wu:
Towards scalable key management for secure multicast communication. 173-182 - Chien-Fu Cheng, Kuo-Tang Tsai, Hsien-Chun Liao:
Simple and Efficient Signature-based Consensus Protocol in the Asynchronous Distributed System. 183-198
Volume 41, Number 3, 2012
- Darko Brodic, Dragan R. Milivojevic:
An Algorithm for the Estimation of the Initial Text Skew. 211-219 - Chin-Ling Chen, Yu-Cheng Huang, Tzay-Farn Shih:
A Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards. 220-228 - Fang Jin, Qing-Quan Liu:
Quantized Feedback Control Over Packet Dropout Communication Channels. 229-238 - Deividas Kancelkis, Jonas Valantinas:
A New Le Gall Wavelet-Based Approach to Progressive Encoding and Transmission of Image Blocks. 239-247 - Kazys Kazlauskas, Rimantas Pupeikis:
On Speedy Recognition of Non-Aliased Realization after Multifold Downsampling of an Oversampled Bandlimited Signal. 248-257 - Cheng-Chi Lee, Rui-Xiang Chang, Te-Yu Chen, Lung Albert Chen:
An Improved Delegation-Based Authentication Protocol for PCSs. 258-267 - Rasa Lileikyte, Laimutis Telksnys:
Quality Estimation of Speech Recognition Features for Dynamic Time Warping Classifier. 268-273 - Her-Terng Yau, Yu-Chi Pu, Simon Cimin Li:
Application of a Chaotic Synchronization System to Secure Communication. 274-282 - Yifei Zheng, Lixin Jia, Hui Cao:
Multi-Objective Gene Expression Programming for Clustering. 283-294
Volume 41, Number 4, 2012
- Sayed Chhattan Shah, Myong-Soon Park, Wan Sik Choi, Zeeshan Hameed Mir, Sajjad Hussain Chauhdary, Ali Kashif Bashir, Fida Hussain Chandio:
An Adaptive Distance-based Resource Allocation Scheme for Interdependent Tasks in Mobile Ad Hoc Computational Grids. 307-317 - Jurgita Kapociute-Dzikiene, Gailius Raskinis:
Learning a Transferable World Model by Reinforcement Agent in Deterministic Observable Grid-World Environments. 318-327 - Keehang Kwon:
Forward Reasoning via Sequential Queries in Logic Programming. 328-331 - Jonas Mockus, Rimantas Belevicius, Dmitrij Sesok, Juozas Kaunas, Darius Maciunas:
On Bayesian Approach to Grillage Optimization. 332-339 - Heemin Park, Jae Won Lee:
Task Assignment in Wireless Sensor Networks via Task Decomposition. 340-348 - Eligijus Sakalauskas, Kestutis Luksys:
Matrix Power Cipher. 349-355 - Tomas Skersys, Lina Tutkute, Rimantas Butleris, Rita Butkiene:
Extending BPMN Business Process Model with SBVR Business Vocabulary and Rules. 356-367 - Algimantas Venckauskas, Nerijus Jusas, Irena Mikuckiene, Stasys Maciulevicius:
Generation of the Secret Encryption Key Using the Signature of the Embedded System. 368-375 - Robertas Damasevicius, Paulius Paskevicius, Eimutis Karciauskas, Romas Marcinkevicius:
Automatic Extraction of Features and Generation of Feature Models from Java Programs. 376-384 - Giedrius Liutkus, Aleksas Riskus, Arunas Tomkevicius, Antanas Lenkevicius:
Issues with exchange of presentation data among CAD systems. 385-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.