


default search action
Information Technology and Control, Volume 41
Volume 41, Number 1, 2012
- Povilas Treigys, Virginijus Marcinkevicius

, Arturas Kaklauskas
:
Analysis of Iris and pupil parameters for stress Recognition. 7-14 - Shirisha Tallapally:

Security enhancement on Simple Three Party PAKE Protocol. 15-22 - Vytautas Stuikys

, Robertas Damasevicius, Giedrius Ziberkas:
Understanding of Heterogeneous Multi-Stage Meta-Programs. 23-32 - Eligijus Sakalauskas:

The multivariate quadratic Power Problem over Zn is NP-Complete. 33-39 - Vincas Laurutis

, Ingrida Indrijauskiene, Raimondas Zemblys
, Saulius Niauronis:
Effects of Muller-Lyer Illusion on the accuracy of Primary saccades and Smooth Pursuit eye movements. 40-45 - Kestutis Jonelis, Kestutis Brazauskas, Donatas Levisauskas:

A System for Dissolved oxygen Control in Industrial aeration tank. 46-52 - Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu:

A Secure Password-Based Remote User Authentication Scheme without Smart Cards. 53-59 - Ya-Fen Chang, Wei-Liang Tai, Chung-Yi Lin:

A Verifiable Proxy Signature Scheme Based on Bilinear Pairings with Identity-Based Cryptographic Approaches. 60-68 - Chun-Ta Li

:
A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications. 69-76 - Zorica Stanimirovic

, Miroslav Maric, Srdjan Bozovic, Predrag Stanojevic
:
An Efficient Evolutionary Algorithm for Locating Long-Term Care Facilities. 77-89
Volume 41, Number 2, 2012
- Ernestas Vysniauskas, Lina Nemuraite, Bronius Paradauskas:

Preserving Semantics of Owl 2 Ontologies in Relational Databases Using Hybrid Approach. 103-115 - Uros Legat, Anton Biasizzo, Franc Novak:

On line self recovery of embedded multi-processor SOC on FPGA using dynamic partial reconfiguration. 116-124 - Saulius Minkevicius, Leonidas Sakalauskas:

Modeling of the Phenomena in Multiserver Networks. 125-135 - Rytis Maskeliunas

, Kastytis Ratkevicius:
Hmi Modelling for Multimodal Lithuanian Applications. 136-142 - Haibin Huang, Guangfu Ma, Yufei Zhuang, Yueyong Lv:

Optimal Spacecraft Formation Reconfiguration with Collision Avoidance Using Particle Swarm Optimization. 143-150 - Mao-Lun Chiang

, Hui-Ching Hsieh:
A New Approach to the Fault Detection Problem for Mobile P2P Network. 151-161 - Ming Liu, Quan Bing Liu, Chao Yuan Liu, Jie Cheng Sun:

Data Evolvement Analysis Based on Topology Self-Adaptive Clustering algorithm. 162-172 - Yuh-Min Tseng, Chen-Hung Yu, Tsu-Yang Wu

:
Towards scalable key management for secure multicast communication. 173-182 - Chien-Fu Cheng, Kuo-Tang Tsai, Hsien-Chun Liao:

Simple and Efficient Signature-based Consensus Protocol in the Asynchronous Distributed System. 183-198
Volume 41, Number 3, 2012
- Darko Brodic, Dragan R. Milivojevic:

An Algorithm for the Estimation of the Initial Text Skew. 211-219 - Chin-Ling Chen, Yu-Cheng Huang, Tzay-Farn Shih:

A Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards. 220-228 - Fang Jin, Qing-Quan Liu:

Quantized Feedback Control Over Packet Dropout Communication Channels. 229-238 - Deividas Kancelkis, Jonas Valantinas:

A New Le Gall Wavelet-Based Approach to Progressive Encoding and Transmission of Image Blocks. 239-247 - Kazys Kazlauskas, Rimantas Pupeikis:

On Speedy Recognition of Non-Aliased Realization after Multifold Downsampling of an Oversampled Bandlimited Signal. 248-257 - Cheng-Chi Lee

, Rui-Xiang Chang, Te-Yu Chen, Lung Albert Chen:
An Improved Delegation-Based Authentication Protocol for PCSs. 258-267 - Rasa Lileikyte, Laimutis Telksnys:

Quality Estimation of Speech Recognition Features for Dynamic Time Warping Classifier. 268-273 - Her-Terng Yau

, Yu-Chi Pu, Simon Cimin Li:
Application of a Chaotic Synchronization System to Secure Communication. 274-282 - Yifei Zheng

, Lixin Jia, Hui Cao:
Multi-Objective Gene Expression Programming for Clustering. 283-294
Volume 41, Number 4, 2012
- Sayed Chhattan Shah

, Myong-Soon Park, Wan Sik Choi, Zeeshan Hameed Mir, Sajjad Hussain Chauhdary
, Ali Kashif Bashir
, Fida Hussain Chandio:
An Adaptive Distance-based Resource Allocation Scheme for Interdependent Tasks in Mobile Ad Hoc Computational Grids. 307-317 - Jurgita Kapociute-Dzikiene, Gailius Raskinis:

Learning a Transferable World Model by Reinforcement Agent in Deterministic Observable Grid-World Environments. 318-327 - Keehang Kwon:

Forward Reasoning via Sequential Queries in Logic Programming. 328-331 - Jonas Mockus, Rimantas Belevicius

, Dmitrij Sesok
, Juozas Kaunas, Darius Maciunas
:
On Bayesian Approach to Grillage Optimization. 332-339 - Heemin Park, Jae Won Lee:

Task Assignment in Wireless Sensor Networks via Task Decomposition. 340-348 - Eligijus Sakalauskas, Kestutis Luksys:

Matrix Power Cipher. 349-355 - Tomas Skersys

, Lina Tutkute, Rimantas Butleris
, Rita Butkiene:
Extending BPMN Business Process Model with SBVR Business Vocabulary and Rules. 356-367 - Algimantas Venckauskas

, Nerijus Jusas, Irena Mikuckiene, Stasys Maciulevicius:
Generation of the Secret Encryption Key Using the Signature of the Embedded System. 368-375 - Robertas Damasevicius, Paulius Paskevicius, Eimutis Karciauskas, Romas Marcinkevicius:

Automatic Extraction of Features and Generation of Feature Models from Java Programs. 376-384 - Giedrius Liutkus, Aleksas Riskus, Arunas Tomkevicius, Antanas Lenkevicius:

Issues with exchange of presentation data among CAD systems. 385-391

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














