Informatica Logo

INFORMATICA
International Journal

Main Page
Editorial Board
Abstracting/Indexing
Instructions to Authors
Subscription Information


Contents
Author Index
Papers in Production

Author Index

ÇELEN, Aydin
Comparative Analysis of Normalization Procedures in TOPSIS Method: With an Application to Turkish Deposit Banking Market (, Vol. 25, No. 2)
ABDUL HAMID, Omara
Generic Multimedia Database Architecture Based upon Semantic Libraries (2007, Vol. 18, No. 4)
ABDUL QADIR, Muhammad
Generic Multimedia Database Architecture Based upon Semantic Libraries (2007, Vol. 18, No. 4)
ABU-GHAZALEH, Nayef
Quick Matrix Multiplication on Clusters of Workstations (2004, Vol. 15, No. 2)
ADOMENAS, Petras Gailutis
Data Aggregation Sets in Adaptive Data Model (2002, Vol. 13, No. 4)
AHMAD, Raheel
ORVPF - the Model and its DNC Implementation (2005, Vol. 16, No. 4)
AKTEKE-OZTURK, Basak
On a Minimal Spanning Tree Approach in the Cluster Validation Problem (2009, Vol. 20, No. 2)
AL-AYYOUB, Abdel-Elah
Quick Matrix Multiplication on Clusters of Workstations (2004, Vol. 15, No. 2)
AL-BADARNEH, Amer
Efficient Adaptive In-Place Radix Sorting (2004, Vol. 15, No. 3)
AL-YAKOOB, Salem M.
Multiple Shift Scheduling of Hierarchical Workforce with Multiple Work Centers (2007, Vol. 18, No. 3)
ALARCON-AQUINO, Vicente
A Biometric System Based on Neural Networks and SVM Using Morphological Feature Extraction from Hand-Shape Images (2011, Vol. 22, No. 2)
ALCOVER, Pedro María
A New Randomness Test for Bit Sequences (, Vol. 24, No. 3)
ALI, Jafar M.H.
Rough Set Approach for Generation of Classification Rules of Breast Cancer Data (2004, Vol. 15, No. 1)
ALIAKBARI NOURI, Fahimeh
A Hybrid MCDM Approach Based on Fuzzy ANP and Fuzzy TOPSIS for Technology Selection (, Vol. 26, No. 3)
ALMANSA, Ana
Logical Formal Description of Expert Systems (2002, Vol. 13, No. 2)
Adaptive Stable Control of Manipulators with Improved Adaptation Transients by Using On-line Supervision of the Free-Parameters of the Adaptation Algorithm and Sampling Rate (2002, Vol. 13, No. 3)
ALONDERIS, Romas
Decidability of Logic of Correlated Knowledge (, Vol. 25, No. 4)
ALONSO-QUESADA, Santiago
Robust Adaptive Tracking with Pole Placement of First-Oreder Potentially Inversely Unstable Continuous-Time Systems (1998, Vol. 9, No. 3)
On the Equilibrium Points, Boundedness and Positivity of a Sveirs Epidemic Model under Constant Regular Constrained Vaccination (2011, Vol. 22, No. 3)
ALUMÄE, Tanel
Limited-Vocabulary Estonian Continuous Speech Recognition System using Hidden Markov Models (2004, Vol. 15, No. 3)
ALVAREZ, Susana
Hypothesis of Normality in the Context of the Market Model (2001, Vol. 12, No. 4)
AMATO, Alba
A Distributed Cloud Brokering Service (, Vol. 26, No. 1)
AMIRI, Maghsoud
Decision Making with Unknown Data: Development of ELECTRE Method Based on Black Numbers (, Vol. 25, No. 1)
A New Approach for Solving Bi-Objective Redundancy Allocation Problem Using DOE, Simulation and \varepsilon-Constraint Method (, Vol. 28, No. 1)
ANBINDERIS, Tomas
Building Text Corpus for Unit Selection Synthesis (, Vol. 25, No. 4)
ANDONOFF, Eric
An Agent-Based Model for Autonomic Coordination of Inter-Organizational Business Processes (2009, Vol. 20, No. 3)
ANDZIULIS, Arunas
Recognition of Human Emotions in Reasoning Algorithms of Wheelchair Type Robots (2010, Vol. 21, No. 4)
ANIDO, Ricardo de Oliveira
Brazilian Olympiad in Informatics (, Vol. 1, No. )
ANITHA, J.
Performance Improved Modified Fuzzy C-Means Algorithm for Image Segmentation Applications (, Vol. 26, No. 4)
ANRIG, Bernhard
Probabilistic Argumentation Systems with Decision Variables (2005, Vol. 16, No. 1)
ANSKAITIS, Aurimas
An Investigation of the Perceptual Value of Voice Frames (2009, Vol. 20, No. 4)
ANTAMOSHKIN, Alexander
Local Search Efficiency when Optimizing Unimodal Pseudoboolean Functions (1998, Vol. 9, No. 3)
ANTOL, Matej
Popularity-Based Ranking for Fast Approximate kNN Search (, Vol. 28, No. 1)
ANTONIOU, George E.
A DFT-Based Algorithm for n-Order Singular State Space Systems (2003, Vol. 14, No. 4)
PDA-based Boolean Function Simplification: a Useful Educational Tool (2004, Vol. 15, No. 3)
ANTUCHEVICIENE, Jurgita
Evaluation of Ranking Accuracy in Multi-Criteria Decisions (2006, Vol. 17, No. 4)
Measuring Congruence of Ranking Results Applying Particular MCDM Methods (2011, Vol. 22, No. 3)
A Hybrid MCDM Approach Based on Fuzzy ANP and Fuzzy TOPSIS for Technology Selection (, Vol. 26, No. 3)
An Integrated Grey-Based Approach for Multi FMSs Combination Selection (, Vol. 27, No. 4)
Interval Type-2 Fuzzy c-Control Charts: An Application in a Food Company (, Vol. 28, No. 2)
APARICIO, Guillermo
On the Minimum Number of Simplex Shapes in Longest Edge Bisection Refinement of a Regular n-Simplex (, Vol. 26, No. 1)
ARIF, Muhammad
Sensorless Estimation of Wind Speed by Soft Computing Methodologies: A Comparative Study (, Vol. 26, No. 3)
ASERIS, Vytautas
Computational Modeling of Bienzyme Biosensor with Different Initial and Boundary Conditions (, Vol. 24, No. 4)
ASIMAKOPOULOU, Eleana
Cloud Scheduling Optimization: A Reactive Model to Enable Dynamic Deployment of Virtual Machines Instantiations (, Vol. 24, No. 3)
ASKAN, Aysegul
A Hybrid Computational Method Based on Convex Optimization for Outlier Problems: Application to Earthquake Ground Motion Prediction (, Vol. 27, No. 4)
ATANASOV, Nasko
On Recursive Calculation of M- and GM-Estimates by Direct Identification in LQG Control Systems (2009, Vol. 20, No. 1)
Closed-Loop System Identification with Recursive Modifications of the Instrumental Variable Method (2011, Vol. 22, No. 2)
Closed-Loop System Identification with Modifications of the Instrumental Variable Method (2010, Vol. 21, No. 2)
ATMANI, Baghdad
Neuro-IG: A Hybrid System for Selection and Elimination of Predictor Variables and non Relevant Individuals (2007, Vol. 18, No. 2)
AUGUTIS, Juozas
Parameters Estimation in Modelling of Gas-Gap in RBMK Type Reactor Using Bayesian Approach (2010, Vol. 21, No. 2)
AVDAGIC, Zikrija
Fuzzy Functional Dependency and the Resolution Principle (2005, Vol. 16, No. 1)
AZAR, Jean-Marie HAUGLUSTAINE, Sleiman AZAR, Jean-Marie
Multicriteria and Multiple Actors Tool Aiding to Optimise Building Envelope at the Architectural Sketch Design (2001, Vol. 12, No. 1)
AZHMYAKOV, Vadim
Optimal Control of a Well-Stirred Bioreactor in the Presence of Stochastic Perturbations (2002, Vol. 13, No. 2)
BABARSKAS, Justas
Measuring the Efficiency of Capital Market Regulations (2001, Vol. 12, No. 4)
BACAUSKIENE, Marija
The Evidence Theory Based Post-Processing of Colour Images (2004, Vol. 15, No. 3)
A Serial-Parallel Panoramic Filter Bank as a Model of Frequency Decomposition of Complex Sounds in the Human Inner Ear (2011, Vol. 22, No. 2)
BAEZ-LOPEZ, David
A Biometric System Based on Neural Networks and SVM Using Morphological Feature Extraction from Hand-Shape Images (2011, Vol. 22, No. 2)
BAIXAULI, Samuel
Hypothesis of Normality in the Context of the Market Model (2001, Vol. 12, No. 4)
BAJEC, Marko
A Framework and Tool-Support for Reengineering Software Development Methods (2008, Vol. 19, No. 3)
General Context-Aware Data Matching and Merging Framework (, Vol. 24, No. 1)
BAKSHAEV, Aleksej
Goodness of Fit Tests Based on Kernel Density Estimators (, Vol. 24, No. 3)
BALAS, Valentina E.
Optimal Access Class Barring in Machine to Machine Systems with Random Activation Time (, Vol. 28, No. 2)
BALAS, Valentina Emilia
Performance Improved Modified Fuzzy C-Means Algorithm for Image Segmentation Applications (, Vol. 26, No. 4)
BALEVICIUS, Robertas
Parallel DEM Software for Simulation of Granular Media (2006, Vol. 17, No. 2)
BALEZENTIS, Alvydas
MULTIMOORA-FG: a Multi-Objective Decision Making Method for Linguistic Reasoning with an Application to Personnel Selection (2012, Vol. 23, No. 2)
BALEZENTIS, Tomas
MULTIMOORA-FG: a Multi-Objective Decision Making Method for Linguistic Reasoning with an Application to Personnel Selection (2012, Vol. 23, No. 2)
A Method Based on OWA Operator and Distance Measures for Multiple Attribute Decision Making with 2-Tuple Linguistic Information (2012, Vol. 23, No. 4)
A Projection Method for Multiple Attribute Group Decision Making with Intuitionistic Fuzzy Information (, Vol. 24, No. 3)
BALYS, Vaidas
Statistical Classification of Scientific Publications (2010, Vol. 21, No. 4)
BANI-HANI, Ehab Hussein
Sensorless Estimation of Wind Speed by Soft Computing Methodologies: A Comparative Study (, Vol. 26, No. 3)
BAO, Haiyong
A New ID-Based Deniable Authentication Protocol (2007, Vol. 18, No. 1)
BAPNA, Indu Bala
Certain Integral Means Inequalities Involving Fractional Calculus Operators of Analytic Functions (2003, Vol. 14, No. 2)
BARAVYKAITE, Milda
One Application of the Parallelization Tool of Master-Slave Algorithms (2002, Vol. 13, No. 4)
BARCHIESI, Dominique
A New Pseudo-Random Number Generator Based on Two Chaotic Maps (, Vol. 24, No. 2)
BAREISA, Eduardas
Identifying Legal and Illegal States in Synchronous Sequential Circuits Using Test Generation (2003, Vol. 14, No. 2)
The Realization-Independent Testing Based on the Black Box Fault Models (2005, Vol. 16, No. 1)
Functional Test Generation Based on Combined Random and Deterministic Search Methods (2007, Vol. 18, No. 1)
BARGELIS, Algirdas
Intelligent Functional Model for Costs Minimization in Hybrid Manufacturing Systems (2004, Vol. 15, No. 1)
BAROLLI, Admir
Performance Evaluation of WMN-GA System in Node Placement in WMNs for Different Distributions of Mesh Clients and Different Selection and Mutation Operators (, Vol. 27, No. 3)
BAROLLI, Leonard
Performance Evaluation of WMN-GA System in Node Placement in WMNs for Different Distributions of Mesh Clients and Different Selection and Mutation Operators (, Vol. 27, No. 3)
BARONAS, Darius
Optimization-Based Evaluation of Concentrations in Modeling the Biosensor-Aided Measurement (2011, Vol. 22, No. 4)
BARONAS, Romas
Reliability of One Dimensional Model of Moisture Diffusion in Wood ^* (2002, Vol. 13, No. 4)
Computational Modeling of Bienzyme Biosensor with Different Initial and Boundary Conditions (, Vol. 24, No. 4)
BARTKUTE, Vaida
An Optimization of System for Automatic Recognition of Ischemic Stroke Areas in Computed Tomography Images (2007, Vol. 18, No. 4)
BARTKUTE-NORKUNIENE, Vaida
Stochastic Optimization Algorithms for Support Vector Machines Classification (2009, Vol. 20, No. 2)
BARZDZIUKAS, Valerijus
Application of Data Mining Technique for Diagnosis of Posterior Uveal Melanoma (2002, Vol. 13, No. 4)
Automated Optic Nerve Disc Parameterization (2008, Vol. 19, No. 3)
Digital Model of Blood Circulation Analysis System (2009, Vol. 20, No. 4)
Assessment of the Optic Nerve Disc and Excavation Parameters of Interactive and Automated Parameterization Methods (2012, Vol. 23, No. 3)
BARZILY, Zeev
On a Minimal Spanning Tree Approach in the Cluster Validation Problem (2009, Vol. 20, No. 2)
BASEVICIUS, Algidas
Analysis of Thermovisual Data of the Radio-Frequency Impact on the Myocardium Damage (2010, Vol. 21, No. 3)
BASOV, Igor
A Possibility of Taking into Consideration of Insulin "Age Structure" for Modeling Blood Glucose Dynamics (2000, Vol. 11, No. 1)
BASTYS, Algirdas
The Use of Group Delay Features of Linear Prediction Model for Speaker Recognition (2010, Vol. 21, No. 1)
BAT, Aleksandra
The Competitiveness of Industrial Sectors in CEECs Countries as the Base for their Successful Economic Integration to the EU (2001, Vol. 12, No. 1)
BATOUCHE, Mohamed
A Multiresolution Approach Based on MRF and Bak-Sneppen Models for Image Segmentation (2006, Vol. 17, No. 2)
BATSYN, Mikhail
Improved Infra-Chromatic Bound for Exact Maximum Clique Search (, Vol. 27, No. 2)
BATTITI, Roberto
CoRSO (Collaborative Reactive Search Optimization): Blending Combinatorial and Continuous Local Search (, Vol. 27, No. 2)
BAUSYS, Romualdas
Intelligent Initial Finite Element Mesh Generation for Solutions of 2D Problems (2002, Vol. 13, No. 2)
Pixel-Wise Tamper Detection Under Generic Blur/Sharpen Attacks (2012, Vol. 23, No. 4)
BAVAFAYE HAGHIGHI, Elham
Learning Inductive Riemannian Manifold in Abstract Form by Modeling Embedded Dynamical System (, Vol. 25, No. 3)
BAZIUKAITE, Dalia
Probabilistic Argumentation Systems with Decision Variables (2005, Vol. 16, No. 1)
BELDJILALI, Bouziane
Decision Making System for Regulation of a Bimodal Urban Transportation Network, Associating a Classical and a Multi-Agent Approaches (2005, Vol. 16, No. 4)
Neuro-IG: A Hybrid System for Selection and Elimination of Predictor Variables and non Relevant Individuals (2007, Vol. 18, No. 2)
BELEVICIUS, Rimantas
One Application of the Parallelization Tool of Master-Slave Algorithms (2002, Vol. 13, No. 4)
BELOGLAVEC, Simon
The Impact of Details in the Class Diagram on Software Size Estimation (2005, Vol. 16, No. 2)
BENIUSE, Margarita
Automatic Parameters Estimation of the D. Klatt Phoneme Duration Model (, Vol. 27, No. 3)
BENSLIMANE, Djamal
Extracting Personalised Ontology from Data-Intensive Web Application: an HTML Forms-Based Reverse Engineering Approach (2007, Vol. 18, No. 4)
BENSLIMANE, Sidi Mohamed
Extracting Personalised Ontology from Data-Intensive Web Application: an HTML Forms-Based Reverse Engineering Approach (2007, Vol. 18, No. 4)
BERNATAVICIENE, Jolita
Conditions for Optimal Efficiency of Relative MDS (2007, Vol. 18, No. 2)
Assessment of the Optic Nerve Disc and Excavation Parameters of Interactive and Automated Parameterization Methods (2012, Vol. 23, No. 3)
Integration of a Self-Organizing Map and a Virtual Pheromone for Real-Time Abnormal Movement Detection in Marine Traffic (, Vol. 28, No. 2)
BERTULIS, Algis
Visual Image Filtering at the Level of Cortical Input (2004, Vol. 15, No. 4)
BESSIS, Nik
Cloud Scheduling Optimization: A Reactive Model to Enable Dynamic Deployment of Virtual Machines Instantiations (, Vol. 24, No. 3)
BESSON, Jérémy
Comparing Real and Intended System Usages: A Case for Web Portal (2012, Vol. 23, No. 2)
BESSON, Jeremy
QOS-Aware Composition of Enterprise System`s Components: Constraint Logic Programming Approach (2010, Vol. 21, No. 4)
BIELSKIS, Antanas Andrius
Recognition of Human Emotions in Reasoning Algorithms of Wheelchair Type Robots (2010, Vol. 21, No. 4)
BIERLAIRE, Michel
Robust Optimization for Strategic Energy Planning (, Vol. 27, No. 3)
BITINCKA, Ledion
PDA-based Boolean Function Simplification: a Useful Educational Tool (2004, Vol. 15, No. 3)
BLAKE, Richard E.
Indices and Data Structures in Information Systems (1999, Vol. 10, No. 1)
BLAZEVIC, Mario
Theoretical Foundations of an Environment-Based Multiparadigm Language (2000, Vol. 11, No. 1)
BLOM, Martin
Semantic Integrity of Switching Sections with Contracts: Discussion of a Case Study (1999, Vol. 10, No. 2)
BOGLE, Ian David Lockhart
Evaluation Ranges of Functions using Balanced Random Interval Arithmetic (2003, Vol. 14, No. 3)
BORISOV, Arkady
Advantages of Deferred Approach for Time-Critical Tasks (, Vol. 25, No. 3)
BOUAMRANE, Karim
Decision Making System for Regulation of a Bimodal Urban Transportation Network, Associating a Classical and a Multi-Agent Approaches (2005, Vol. 16, No. 4)
BOUAZIZ, Wassim
An Agent-Based Model for Autonomic Coordination of Inter-Organizational Business Processes (2009, Vol. 20, No. 3)
BOUGEARD, Stéphanie
From Multiblock Partial Least Squares to Multiblock Redundancy Analysis. A Continuum Approach (2011, Vol. 22, No. 1)
BOUVRY, Pascal
Metaheuristics for the Virtual Machine Mapping Problem in Clouds (, Vol. 26, No. 1)
BOUZAROUR-AMOKRANE, Yasmina
Evaluation Model in Decision Analysis: Bipolar Approach (2012, Vol. 23, No. 3)
BOUZGUENDA, Lotfi
An Agent-Based Model for Autonomic Coordination of Inter-Organizational Business Processes (2009, Vol. 20, No. 3)
BRAUERS, Willem K.M.
MULTIMOORA-FG: a Multi-Objective Decision Making Method for Linguistic Reasoning with an Application to Personnel Selection (2012, Vol. 23, No. 2)
A Neutrosophic Extension of the MULTIMOORA Method (, Vol. 28, No. 1)
BRAUERS, Willem Karel M.
Robustness of MULTIMOORA: A Method for Multi-Objective Optimization (2012, Vol. 23, No. 1)
BRAZENAS, Algis
Determination of Stress Strain State Components of Butt Welded Joint with Mild Interlayer Subjected to Elasto-Plastic Tension (2006, Vol. 17, No. 2)
BREGAR, Andrej
Interactive Aggregation/Disaggregation Dichotomic Sorting Procedure for Group Decision Analysis Based on the Threshold Model (2008, Vol. 19, No. 2)
BREST, Janez
Reduction of Morpho-Syntactic Features in Statistical Machine Translation of Highly Inflective Language (2010, Vol. 21, No. 1)
BROSALINA, Anna
Commutation in Global Supermonoid of Free Monoids (2000, Vol. 11, No. 4)
BRUMEN, Bostjan
An Algorithm for Protecting Knowledge Discovery Data (2003, Vol. 14, No. 3)
The Impact of Details in the Class Diagram on Software Size Estimation (2005, Vol. 16, No. 2)
Assessment of Classification Models with Small Amounts of Data (2007, Vol. 18, No. 3)
Learning Process Termination Criteria (2012, Vol. 23, No. 4)
Best-Fit Learning Curve Model for the C4.5 Algorithm (, Vol. 25, No. 3)
BRUNATO, Mauro
CoRSO (Collaborative Reactive Search Optimization): Blending Combinatorial and Continuous Local Search (, Vol. 27, No. 2)
BUDA, Sigitas
Research of Neural Network Methods for Compound Stock Exchange Indices Analysis (2002, Vol. 13, No. 4)
BUDIMAC, Zoran
Theoretical Foundations of an Environment-Based Multiparadigm Language (2000, Vol. 11, No. 1)
BUDNIKAS, Germanas
Creation of ESTELLE/Ag Specifications Using Knowledge Bases (2003, Vol. 14, No. 1)
BUGAJEV, Andrej
On Efficiency Analysis of the OpenFOAM-Based Parallel Solver for Simulation of Heat Transfer in and Around the Electrical Power Cables (, Vol. 27, No. 1)
BULATOV, Aleksandr
Visual Image Filtering at the Level of Cortical Input (2004, Vol. 15, No. 4)
BULBENKIENE, Violeta
Integration of a Self-Organizing Map and a Virtual Pheromone for Real-Time Abnormal Movement Detection in Marine Traffic (, Vol. 28, No. 2)
BURBAITE, Renata
Semantic Web Technologies for e-Learning: Models and Implementation (, Vol. 26, No. 2)
BUTEIKIENE, Dovile
Digital Model of Blood Circulation Analysis System (2009, Vol. 20, No. 4)
Assessment of the Optic Nerve Disc and Excavation Parameters of Interactive and Automated Parameterization Methods (2012, Vol. 23, No. 3)
BUTKIENE, Rita
Verification Rules of Computerized Information System Model with Respect to Data Resource Processing (2001, Vol. 12, No. 3)
BUTLERIS, Rimantas
Verification Rules of Computerized Information System Model with Respect to Data Resource Processing (2001, Vol. 12, No. 3)
Repository for Business Rules Based IS Requirements (2006, Vol. 17, No. 4)
Bieliková, Mária
Use of Program Schemata in Lisp Programming: an Evaluation of its Impact on Learning (1998, Vol. 9, No. 1)
CÂMPAN, Alina
Hierarchical Adaptive Clustering (2008, Vol. 19, No. 1)
C.K. CHU, Sydney
Maximum Resolution Topology for Multi-Attribute Dichotomies (2005, Vol. 16, No. 4)
CALVIN, James
An Adaptive Univariate Global Optimization Algorithm and Its Convergence Rate under the Wiener Measure (2011, Vol. 22, No. 4)
CALVIN, James M.
Probability Models in Global Optimization (, Vol. 27, No. 2)
CALVO-ROLLE, José Luis
Adaptive Inverse Control Using an Online Learning Algorithm for Neural Networks (, Vol. 25, No. 3)
CALVO-ROLLE, Jose Luis
A Hybrid Regression System Based on Local Models for Solar Energy Prediction (, Vol. 25, No. 2)
CAO, Jianfang
Trust-Based Scheduling Strategy for Cloud Workflow Applications (, Vol. 26, No. 1)
CAO, Zhenfu
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers (2005, Vol. 16, No. 2)
A New ID-Based Deniable Authentication Protocol (2007, Vol. 18, No. 1)
CAPLINSKAS, Albertas
Guest Editorial: Special Issue on Programming Theory, Information System Engineering, Software Engineering, and Artificial Intelligence (1998, Vol. 9, No. 1)
Guest Editorial: Special Issue on Programming Theory, Information System Engineering, Software Engineering, and Artificial Intelligence (1999, Vol. 10, No. 1)
The Role of Ontologies in Reusing Domain and Enterprise Engineering Assets (2003, Vol. 14, No. 4)
Techniques to Aggregate the Characteristics of Internal Quality of an IS Specification Language (2005, Vol. 16, No. 4)
Methodology to Evaluate the Functionality of Specification Languages (2006, Vol. 17, No. 3)
Reusing Ontological Knowledge about Business Processes in IS Engineering: Process Configuration Problem (2007, Vol. 18, No. 4)
Software Engineering Paradigm Independent Design Problems, GoF 23 Design Patterns, and Aspect Design (2011, Vol. 22, No. 2)
Requirements Elicitation in the Context of Enterprise Engineering: A Vision Driven Approach (2009, Vol. 20, No. 3)
Guest Editorial: Special Issue on Enterprise Systems (2009, Vol. 20, No. 3)
QOS-Aware Composition of Enterprise System`s Components: Constraint Logic Programming Approach (2010, Vol. 21, No. 4)
Processing of Undesirable Business Events in Advanced Production Planning Systems (2012, Vol. 23, No. 4)
A Model of View-Based Enterprise Business Service Quality Evaluation Framework (, Vol. 24, No. 4)
Advanced Planning and Scheduling Systems: Modeling and Implementation Challenges (, Vol. 25, No. 4)
CARLSSON, Sten
The Concept of Object and its Relation to Human Thinking: Some Misunderstandings Concerning the Connection between Object-Orientation and Human Thinking (1999, Vol. 10, No. 2)
CASADO, Leocadio G.
On the Minimum Number of Simplex Shapes in Longest Edge Bisection Refinement of a Regular n-Simplex (, Vol. 26, No. 1)
On Bisecting the Unit Simplex Using Various Distance Norms (, Vol. 27, No. 2)
CASTRO, Elena
From XML to Relational Models (2010, Vol. 21, No. 4)
CAVALLO, Anna
GIS and Multicriteria Analysis to Evaluate and Map Erosion and Landslide Hazards (2001, Vol. 12, No. 1)
CERNEZEL, Ales
Best-Fit Learning Curve Model for the C4.5 Algorithm (, Vol. 25, No. 3)
CESNULEVICIUS, Aurimas
Intelligent Functional Model for Costs Minimization in Hybrid Manufacturing Systems (2004, Vol. 15, No. 1)
CHAKRABORTY, Shankar
Applications of WASPAS Method in Manufacturing Decision Making (, Vol. 25, No. 1)
Selection of Material Handling Equipment Using Fuzzy Axiomatic Design Principles (, Vol. 26, No. 2)
CHAN, Chi-Shiang
A Watermarking Scheme Based on Principal Component Analysis Technique (2003, Vol. 14, No. 4)
CHANG, Chen-Sung
Energy Cost Optimization by Adequate Transmission Rate Dividing in Wireless Communication System (2008, Vol. 19, No. 2)
An Improved Differential Evolution Scheme for the Solution of Large-Scale Unit Commitment Problems (2010, Vol. 21, No. 2)
CHANG, Chin-Chen
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards (2003, Vol. 14, No. 3)
High Capacity Data Hiding in JPEG-Compressed Images (2004, Vol. 15, No. 1)
A Watermarking Scheme Based on Principal Component Analysis Technique (2003, Vol. 14, No. 4)
VQ-Based Image Watermarking Using Anti-Gray Coding (2004, Vol. 15, No. 2)
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach (2005, Vol. 16, No. 1)
Hiding Data in Halftone Images (2005, Vol. 16, No. 3)
Schemes for Digital Gift Certificates with Low Computation Complexity (2005, Vol. 16, No. 4)
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys (2007, Vol. 18, No. 4)
A Reversible Data Hiding Scheme for SMVQ Indices (, Vol. 25, No. 4)
CHANG, Kuei-Lun
The Use of a Hybrid MCDM Model for Public Relations Personnel Selection (, Vol. 26, No. 3)
CHANG, Te-Jen
An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications (2005, Vol. 16, No. 3)
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem (2006, Vol. 17, No. 3)
CHANG, Ting-Yi
Security of Improvement on Methods for Protecting Password Transmission (2003, Vol. 14, No. 4)
Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem (2003, Vol. 14, No. 1)
Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks (2004, Vol. 15, No. 2)
An Computation-Efficient Generalized Group-Oriented Cryptosystem (2010, Vol. 21, No. 3)
Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages (2012, Vol. 23, No. 4)
CHANG, Ya-Fen
Schemes for Digital Gift Certificates with Low Computation Complexity (2005, Vol. 16, No. 4)
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys (2007, Vol. 18, No. 4)
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices (, Vol. 24, No. 1)
Flexible Access Control over Verifiable Cloud Computing Services with Provable Security (, Vol. 26, No. 2)
CHE, Haoyang
An Algebraic Framework for Schema Matching (2008, Vol. 19, No. 3)
CHELLAPPAN, Chenniappan
Optimized on Demand Routing Protocol of Mobile Ad Hoc Network (2006, Vol. 17, No. 4)
CHEN, Chia-Chen
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices (, Vol. 24, No. 1)
CHEN, Chia-Meng
Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks (2004, Vol. 15, No. 2)
CHEN, Chiu-Chin
Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers (2003, Vol. 14, No. 2)
CHEN, Gongliang
Delegatability of an Identity Based Strong Designated Verifier Signature Scheme (2010, Vol. 21, No. 1)
CHEN, Hon-Chan
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update (2010, Vol. 21, No. 3)
CHEN, Huayou
Generalized Ordered Weighted Proportional Averaging Operator and Its Application to Group Decision Making (, Vol. 25, No. 2)
CHEN, Ji
A Projection Method for Multiple Attribute Group Decision Making with Intuitionistic Fuzzy Information (, Vol. 24, No. 3)
CHEN, Jianhong
Identity-Based Key-Insulated Signcryption (2012, Vol. 23, No. 1)
CHEN, Kefei
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures (2006, Vol. 17, No. 3)
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing (2006, Vol. 17, No. 4)
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes (2007, Vol. 18, No. 3)
Identity-Based Key-Insulated Signcryption (2012, Vol. 23, No. 1)
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security (, Vol. 28, No. 2)
CHEN, Reu-Ching
Energy Cost Optimization by Adequate Transmission Rate Dividing in Wireless Communication System (2008, Vol. 19, No. 2)
CHEN, Rongbo
Holo-Entropy Based Categorical Data Hierarchical Clustering (, Vol. 28, No. 2)
CHEN, Tzung-Her
A Secure YS-Like User Authentication Scheme (2007, Vol. 18, No. 1)
Public Key Authentication Schemes for Local Area Networks (2008, Vol. 19, No. 1)
CHEN, Xiaohong
An Approach to Interval-Valued Hesitant Fuzzy Multi-Attribute Decision Making with Incomplete Weight Information Based on Hybrid Shapley Operators (, Vol. 25, No. 4)
Some Generalized Interval-Valued 2-Tuple Linguistic Correlated Aggregation Operators and Their Application in Decision Making (, Vol. 27, No. 1)
An Approach to Hesitant Fuzzy Group Decision Making with Multi-Granularity Linguistic Information (, Vol. 27, No. 4)
2-Tuple Linguistic Hesitant Fuzzy Aggregation Operators and Its Application to Multi-Attribute Decision Making (, Vol. 28, No. 2)
CHEN, Yang
Minimum Mean Square Error Estimators for the Exponential SSALT Model (, Vol. 27, No. 4)
CHEN, Yehua
Optimal Congestion Control and Routing for Multipath Networks with Random Losses (, Vol. 26, No. 2)
CHEN, Yen-Cheng
Proxy Confirmation Signatures (2004, Vol. 15, No. 3)
CHEN, Yubao
Some Single Valued Neutrosophic Number Heronian Mean Operators and Their Application in Multiple Attribute Group Decision Making (, Vol. 27, No. 1)
CHIANG, Mao-Lun
Optimal Agreement in a Scale-Free Network Environment (2006, Vol. 17, No. 1)
CHIEN, Hung-Yu
On the Security of Methods for Protecting Password Transmission (2001, Vol. 12, No. 3)
Partially Blind Threshold Signature Based on RSA (2003, Vol. 14, No. 2)
Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function (2003, Vol. 14, No. 4)
CHIEN, Po-Ching
Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery (, Vol. 28, No. 2)
CHOI, Chang
Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery (, Vol. 24, No. 3)
CHOI, Gyunghyun
Dynamic Mean Value Cross Decomposition Algorithm for Capacitated Facility Location Problems (, Vol. 24, No. 4)
CHOI, Junho
Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery (, Vol. 24, No. 3)
CHOLVI, Vicent
Tight Arrival Curve at the Output of a Work-Conserving Blind Multiplexing Server (2010, Vol. 21, No. 1)
CHOMSKIS, Romanas
Non-Invasive Intracranial Pulse Wave Monitoring (2008, Vol. 19, No. 3)
CHONG, Song-Kong
The Moderately Hard DoS-Resistant Authentication Protocol on Client Puzzles (, Vol. 27, No. 1)
CHOO, Kim-Kwang Raymond
On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols (2006, Vol. 17, No. 4)
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker (2007, Vol. 18, No. 4)
A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles (, Vol. 26, No. 3)
CHOVER, Miguel
A Multiresolution Approach to Render 3D Models (, Vol. 24, No. 4)
CHOWDHURY, Amor
Implementation of PCCD-OFDM-ASK Robust Data Transmission over GSM Speech Channel (2009, Vol. 20, No. 1)
GSM Speech Coder Indirect Identification Algorithm (2010, Vol. 21, No. 4)
CHRISTIANSEN, Peter Engelund
Cross-National Interoperability and Enterprise Architecture (2009, Vol. 20, No. 3)
CHUNLIN, Li
Fabric Level and Application Level QoS Guarantees in Grid Computing (2007, Vol. 18, No. 4)
CIEGIS, Raimondas
Numerical Integration on Distributed-Memory Parallel Systems (1998, Vol. 9, No. 2)
Hyper-Rectangle Selection and Distribution Algorithm for Parallel Adaptive Numerical Integration (1999, Vol. 10, No. 2)
Adaptive Integration of Stiff ODE (2000, Vol. 11, No. 4)
A Tool for Modeling Optical Beam Propagation (2002, Vol. 13, No. 2)
One Application of the Parallelization Tool of Master-Slave Algorithms (2002, Vol. 13, No. 4)
Realistic Performance Prediction Tool for the Parallel Block LU Factorization Algorithm (2003, Vol. 14, No. 2)
Analysis of Parallel Preconditioned Conjugate Gradient Algorithms (2005, Vol. 16, No. 3)
Parallel Numerical Algorithms for 3D Parabolic Problem with Nonlocal Boundary Condition (2006, Vol. 17, No. 3)
On Efficiency Analysis of the OpenFOAM-Based Parallel Solver for Simulation of Heat Transfer in and Around the Electrical Power Cables (, Vol. 27, No. 1)
CIEGIS, Remigijus
Adaptive Integration of Stiff ODE (2000, Vol. 11, No. 4)
CIUCELIS, Algirdas
Data Aggregation Sets in Adaptive Data Model (2002, Vol. 13, No. 4)
CIUKSYS, Donatas
Reusing Ontological Knowledge about Business Processes in IS Engineering: Process Configuration Problem (2007, Vol. 18, No. 4)
CIUPAILA, Regimantas
Computational Experiment for Stability Analysis of Difference Schemes with Nonlocal Conditions (, Vol. 24, No. 2)
COBB, Maria
ORVPF - the Model and its DNC Implementation (2005, Vol. 16, No. 4)
CORCHADO, Emilio
A Hybrid Regression System Based on Local Models for Solar Energy Prediction (, Vol. 25, No. 2)
CORMACK, Gordon
New Task Types at the Canadian Computing Competition (, Vol. 1, No. )
CRETU, Vladimir
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques (2006, Vol. 17, No. 1)
CRHRISTIANSSON, Beneth
The Concept of Object and its Relation to Human Thinking: Some Misunderstandings Concerning the Connection between Object-Orientation and Human Thinking (1999, Vol. 10, No. 2)
CRISAN, Gloria-Cerasela
Soft Computing Approaches on the Bandwidth Problem (, Vol. 24, No. 2)
CUADRA, Dolores
From XML to Relational Models (2010, Vol. 21, No. 4)
CYRAS, Vytautas
Data Dependence in Nested Loops in the Structural Blanks Approach to Programming with Recurrences (1998, Vol. 9, No. 1)
Recurrences in Solving Triangular Systems of Linear Equations: Representation in the Structural Blanks Method (1999, Vol. 10, No. 1)
Composition of Loop Modules in the Structural Blanks Approach to Programming with Recurrences: A Task of Synthesis of Nested Loops (2007, Vol. 18, No. 1)
Structural Legal Visualization (, Vol. 26, No. 2)
CZIBULA, Gabriela
Soft Computing Approaches on the Bandwidth Problem (, Vol. 24, No. 2)
CZIBULA, Istvan-Gergely
Soft Computing Approaches on the Bandwidth Problem (, Vol. 24, No. 2)
Cicortas, Alexandru
Conservative Simulation for Discrete Event Systems (1998, Vol. 9, No. 3)
D'AMICO, Guglielmo
HIV Evolution: A Quantification of the Effects Due to Age and to Medical Progress (2011, Vol. 22, No. 1)
D. PETKOVIC, Marko
Design of Fixed and Adaptive Companding Quantizer with Variable-Length Codeword for Memoryless Gaussian Source (, Vol. 24, No. 1)
DAGIENE, Valentina
Quantitative Evaluation of the Process of Open Source Software Localization (2006, Vol. 17, No. 1)
Internationalization of Compilers (2007, Vol. 18, No. 3)
Multiple Criteria Comparative Evaluation of E-Learning Systems and Components (2009, Vol. 20, No. 4)
An Approach to Formalize Metainformation of Software Localizable Resources (2010, Vol. 21, No. 3)
An Integration of Methodological Resources into Learning Object Metadata Repository (, Vol. 24, No. 1)
Text Input on Mobile Devices from Cultural and Educational Aspects (, Vol. 25, No. 3)
Semantic Web Technologies for e-Learning: Models and Implementation (, Vol. 26, No. 2)
Developing a Two-Dimensional Categorization System for Educational Tasks in Informatics (, Vol. 28, No. 1)
DAMASEVICIUS, Robertas
Scripting Language Open PROMOL and its Processor (2000, Vol. 11, No. 1)
The Language-Centric Program Generator Models: 3L Paradigm (2000, Vol. 11, No. 3)
Relationship Model of Abstractions Used for Developing Domain Generators (2002, Vol. 13, No. 1)
Separation of Concerns in Multi-language Specifications (2002, Vol. 13, No. 3)
Soft IP Customisation Model Based on Metaprogramming Techniques (2004, Vol. 15, No. 1)
Complexity Estimation of Genetic Sequences Using Information-Theoretic and Frequency Analysis Methods (2010, Vol. 21, No. 1)
Equivalent Transformations of Heterogeneous Meta-Programs (, Vol. 24, No. 2)
DANCIULESCU, Daniela
Formal Languages Generation in Systems of Knowledge Representation Based on Stratified Graphs (, Vol. 26, No. 3)
DANIELI, Moshe A.
Hierarchical Decision Making Framework for Evaluation and Improvement of Composite Systems (Example for Building) (2005, Vol. 16, No. 2)
DANIUSIS, Povilas
Neural Network with Matrix Inputs (2008, Vol. 19, No. 4)
DAS, Manik Lal
An Efficient Proxy Signature Scheme with Revocation (2004, Vol. 15, No. 4)
Identity Based Multisignatures (2006, Vol. 17, No. 2)
DAUBARIS, Gediminas
Non-Invasive Intracranial Pulse Wave Monitoring (2008, Vol. 19, No. 3)
DAVULIS, Gediminas
The Method for Solving a Piecewise-Linear Multicommodity Flow Problem (2001, Vol. 12, No. 2)
DE LA SEN, Manuel
About Some Controllability Properties of Linear Discrete-Time Systems in Probabilistic Metric Spaces (, Vol. 27, No. 3)
DEHGHANBAGHI, Maryam
An Integrated Grey-Based Approach for Multi FMSs Combination Selection (, Vol. 27, No. 4)
DEKSNYS, Vytautas
Non-Invasive Intracranial Pulse Wave Monitoring (2008, Vol. 19, No. 3)
DEMENT'EV, Aleksandr
A Tool for Modeling Optical Beam Propagation (2002, Vol. 13, No. 2)
DENIC, Dragan B.
Forward Adaptation of Novel Semilogarithmic Quantizer and Lossless Coder for Speech Signals Compression (2010, Vol. 21, No. 3)
DEVEDZIC, Vladan
Incorporating the Ontology Paradigm into a Mainstream Programming Environment (2012, Vol. 23, No. 2)
DI BIASE, Giuseppe
HIV Evolution: A Quantification of the Effects Due to Age and to Medical Progress (2011, Vol. 22, No. 1)
DI MARTINO, Beniamino
A Distributed Cloud Brokering Service (, Vol. 26, No. 1)
DICIUNAS, Valdas
Simply Invertible Matrices and Fast Prediction (1998, Vol. 9, No. 3)
Generalization Error of Randomized Linear Zero Empirical Error Classifier: Simple Asymptotics for Centered Data Case (2000, Vol. 11, No. 4)
Generalization Error of Randomized Linear Zero Empirical Error Classifier: Non-Centered Data Case (2001, Vol. 12, No. 2)
DIKS, Krzysztof
A Proposal for a Task Preparation Process (, Vol. 2, No. )
DINCIC, Milan R.
Simple Compression Algorithm for Memoryless Laplacian Source Based on the Optimal Companding Technique (2009, Vol. 20, No. 1)
Forward Adaptation of Novel Semilogarithmic Quantizer and Lossless Coder for Speech Signals Compression (2010, Vol. 21, No. 3)
Coding Algorithm for Grayscale Images Based on Piecewise Uniform Quantizers (2012, Vol. 23, No. 1)
New Coding Algorithm Based on Variable-Length Codewords for Piecewise Uniform Quantizers (, Vol. 27, No. 3)
DING, Shuai
A Novel Trust Inference Framework for Web-Based Scenarios Harnessed by Social Network and Web of Trust - a Heuristic Approach (, Vol. 27, No. 2)
DJENIC, Aleksandar
Memetic Algorithm for Solving the Multilevel Uncapacitated Facility Location Problem (, Vol. 25, No. 3)
DJURIC, Dragan
Incorporating the Ontology Paradigm into a Mainstream Programming Environment (2012, Vol. 23, No. 2)
DOBRISEK, Simon
Exploiting Spatio-Temporal Information for Light-Plane Labeling in Depth-Image Sensors Using Probabilistic Graphical Models (, Vol. 27, No. 1)
DOBROVOLSKIS, Romualdas A.
Ischemic Stroke Segmentation on CT Images Using Joint Features (2004, Vol. 15, No. 2)
DOHNAL, Vlastislav
Popularity-Based Ranking for Fast Approximate kNN Search (, Vol. 28, No. 1)
DONG, Jiu-Ying
A Hesitant Fuzzy Programming Method for Hybrid MADM with Incomplete Attribute Weight Information (, Vol. 27, No. 4)
DONG, Jiuying
Multi-Attribute Group Decision Making with Trapezoidal Intuitionistic Fuzzy Numbers and Application to Stock Selection (, Vol. 25, No. 4)
DORRONSORO, Bernabé
Metaheuristics for the Virtual Machine Mapping Problem in Clouds (, Vol. 26, No. 1)
DRUNGILAS, Darius
Recognition of Human Emotions in Reasoning Algorithms of Wheelchair Type Robots (2010, Vol. 21, No. 4)
DRUZOVEC, Marjan
An Algorithm for Protecting Knowledge Discovery Data (2003, Vol. 14, No. 3)
DUCINSKAS, Kestutis
Analysis of the Risk Regret for Classification\hfill\break of Gamma Populations (1998, Vol. 9, No. 4)
Comparison of ML and OLS Estimators in Discriminant Analysis of Spatially Correlated Observations (2002, Vol. 13, No. 2)
Expected Bayes Error Rate in Supervised Classification of Spatial Gaussian Data (2011, Vol. 22, No. 3)
Actual Error Rates in Classification of the T-Distributed Random Field Observation Based on Plug-in Linear Discriminant Function (, Vol. 26, No. 4)
DUKIC, Nedzad
Fuzzy Functional Dependency and the Resolution Principle (2005, Vol. 16, No. 1)
DULAWAT, Manohar Singh
Algorithms for Inner Magic and Inner Antimagic Labelings of Some Planar Graphs (2006, Vol. 17, No. 3)
DUMSKIS, Valerijonas
Nonlinear Stochastic Programming Involving CVaR in the Objective and Constraints (, Vol. 26, No. 4)
DURIO, Alessandra
The Minimum Density Power Divergence Approach in Building Robust Regression Models (2011, Vol. 22, No. 1)
DYOMIN, Nikolas
Likelihood Ratio Determination for Stochastic Processes Recognition Problem with Respect to the Set of Continuous and Discrete Memory Observations (2001, Vol. 12, No. 2)
About Structure of Shannon Information Amount for Joint Filtering and Extrapolation Problem by Continuous-Discrete Memory Observations (2004, Vol. 15, No. 2)
DYOMIN, Irina SAFRONOVA, Nikolas DYOMIN, Irina
Information Amount Determination for Joint Problem of Filtering and Generalized Extrapolation of Stochastic Processes with Respect to the Set of Continuous and Discrete Memory Observations (2003, Vol. 14, No. 3)
DZEMYDA, Gintautas
Application of Computer Network to Solve the Complex Applied Multiple Criteria Optimization Problems (2001, Vol. 12, No. 1)
Visualisation of Multidimensional Objects and the Socio-Economical Impact to Activity in EC RTD Databases (2001, Vol. 12, No. 2)
Comparative Analysis of the Graphical Result Presentation in the SOM Software (2002, Vol. 13, No. 3)
Quantitative Forecasting and Assessment Models in the State Education System (2002, Vol. 13, No. 4)
Conditions for Optimal Efficiency of Relative MDS (2007, Vol. 18, No. 2)
Automated Optic Nerve Disc Parameterization (2008, Vol. 19, No. 3)
Optimization and Knowledge-Based Technologies (2009, Vol. 20, No. 2)
Topology Preservation Measures in the Visualization of Manifold-Type Multidimensional Data (2009, Vol. 20, No. 2)
Analysis of Thermovisual Data of the Radio-Frequency Impact on the Myocardium Damage (2010, Vol. 21, No. 3)
Efficient Data Projection for Visual Analysis of Large Data Sets Using Neural Networks (2011, Vol. 22, No. 4)
Large-Scale Data Analysis Using Heuristic Methods (2011, Vol. 22, No. 1)
Processing of Undesirable Business Events in Advanced Production Planning Systems (2012, Vol. 23, No. 4)
Markov Models in the Analysis of Frequent Patterns in Financial Data (, Vol. 24, No. 1)
Advanced Planning and Scheduling Systems: Modeling and Implementation Challenges (, Vol. 25, No. 4)
Swarm Intelligence for Frequency Management in Smart Grids (, Vol. 26, No. 3)
Fractal-Based Methods as a Technique for Estimating the Intrinsic Dimensionality of High-Dimensional Data: A Survey (, Vol. 27, No. 2)
DZEMYDAITE, Giedre
Semi-Automatic Service Provision Based on Interaction of Data Warehouses for Evaluation of Water Resources (, Vol. 27, No. 4)
DZEMYDIENE, Dale
Data Analysis Strategy for Revealing Multivariate Structures in Social-Economic Data Warehouses (2003, Vol. 14, No. 4)
Recognition of Human Emotions in Reasoning Algorithms of Wheelchair Type Robots (2010, Vol. 21, No. 4)
Semi-Automatic Service Provision Based on Interaction of Data Warehouses for Evaluation of Water Resources (, Vol. 27, No. 4)
DZITAC, Ioan
Atomic Decompositions of Fuzzy Normed Linear Spaces for Wavelet Applications (, Vol. 25, No. 4)
Some Properties and Applications of Fuzzy Quasi-Pseudo-Metric Spaces (, Vol. 27, No. 1)
DZIUGYS, Algis
Parallel DEM Software for Simulation of Granular Media (2006, Vol. 17, No. 2)
A Normalized Parameter for Similarity/Dissimilarity Characterization of Sequences (, Vol. 26, No. 2)
De la SEN, M.
Some Conceptual Links between Dynamic Physical Systems and Operator Theory Issues Concerning Energy Balances and Stability (2005, Vol. 16, No. 3)
De la SEN, Manuel
Robust Adaptive Tracking with Pole Placement of First-Oreder Potentially Inversely Unstable Continuous-Time Systems (1998, Vol. 9, No. 3)
Logical Formal Description of Expert Systems (2002, Vol. 13, No. 2)
A Note about Total Stability of a Class of Hybrid Systems (2006, Vol. 17, No. 4)
ECHAGÜE, Juan
Tight Arrival Curve at the Output of a Work-Conserving Blind Multiplexing Server (2010, Vol. 21, No. 1)
EL-AKER, Fouad
Efficient Adaptive In-Place Radix Sorting (2004, Vol. 15, No. 3)
EL-QAWASMEH, Eyas
Scene Change Detection Schemes for Video Indexing in Uncompressed Domain (2003, Vol. 14, No. 1)
Quick Matrix Multiplication on Clusters of Workstations (2004, Vol. 15, No. 2)
ELHABIAN, Shireen
Helmholtz HSH-Based Basis: A Compact Phenomenological Representation of Arbitrary Reflectance (, Vol. 26, No. 4)
ENRIQUEZ-CALDERA, Rogerio
A Biometric System Based on Neural Networks and SVM Using Morphological Feature Extraction from Hand-Shape Images (2011, Vol. 22, No. 2)
ERRA, Robert
A New Pseudo-Random Number Generator Based on Two Chaotic Maps (, Vol. 24, No. 2)
EVORA, Jose
Swarm Intelligence for Frequency Management in Smart Grids (, Vol. 26, No. 3)
FACO, Joao L.D.
Continuous Nonlinear Programming Techniques to Solve Scheduling Problems (2009, Vol. 20, No. 2)
FAGUNDEZ, Fabio D.
Continuous Nonlinear Programming Techniques to Solve Scheduling Problems (2009, Vol. 20, No. 2)
FAN, Wenjuan
A Novel Trust Inference Framework for Web-Based Scenarios Harnessed by Social Network and Web of Trust - a Heuristic Approach (, Vol. 27, No. 2)
FARAG, Aly
Helmholtz HSH-Based Basis: A Compact Phenomenological Representation of Arbitrary Reflectance (, Vol. 26, No. 4)
FENG, Tung-Huang
An Authentication Protocol for Lightweight NFC Mobile Sensors Payment (, Vol. 27, No. 4)
FERNÁNDEZ, Pascual
Solution of Discrete Competitive Facility Location Problem for Firm Expansion (, Vol. 27, No. 2)
FIAIDHI, Jinan A.W.
Transcoding Aspects for Image Tele-Collaboration (2005, Vol. 16, No. 2)
FILATOVAS, Ernestas
Synchronous R-NSGA-II: An Extended Preference-Based Evolutionary Algorithm for Multi-Objective Optimization (, Vol. 26, No. 1)
FILIPOVIC, Mark
Development of HMM/Neural Network-Based Medium-Vocabulary Isolated-Word Lithuanian Speech Recognition System (2004, Vol. 15, No. 4)
FLORY, André
Extraction of Object-oriented Schemas from Existing Relational Databases: a Form-driven Approach (2002, Vol. 13, No. 1)
FONTENLA-ROMERO, Oscar
Adaptive Inverse Control Using an Online Learning Algorithm for Neural Networks (, Vol. 25, No. 3)
FORISEK, Michal
Slovak IOI 2007 Team Selection and Preparation (, Vol. 1, No. )
FORTIS, Teodor Florin
On the Generative Capacity of Contextual Grammars with Catenation. Necessary Conditions (2001, Vol. 12, No. 3)
FOUFOU, Sebti
A Multiresolution Approach Based on MRF and Bak-Sneppen Models for Image Segmentation (2006, Vol. 17, No. 2)
FRANCOIS, Michael
A New Pseudo-Random Number Generator Based on Two Chaotic Maps (, Vol. 24, No. 2)
FRATRIC, Ivan
A Novel Biometric Personal Verification System Based on the Combination of Palmprints and Faces (2008, Vol. 19, No. 1)
GØTZE, John
Cross-National Interoperability and Enterprise Architecture (2009, Vol. 20, No. 3)
GÜNDEM, Taflan I.
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML (2008, Vol. 19, No. 4)
G.-TÓTH, Boglárka
On the Minimum Number of Simplex Shapes in Longest Edge Bisection Refinement of a Regular n-Simplex (, Vol. 26, No. 1)
GAJER, Miroslaw
The Implementation of the Example-Based Machine Translation Technique for German-to-Polish Automatic Translation System (2002, Vol. 13, No. 4)
GALLOTTA, Marco
Challenges in Running a Computer Olympiad in South Africa (, Vol. 2, No. )
GAMS, Matjaz
Analysis of Automatic Stress Assignment in Slovene (2009, Vol. 20, No. 1)
Multiple-Criteria Approach to Optimisation of Multidimensional Data Models (, Vol. 26, No. 2)
GANGISHETTI, Raju
Identity Based Multisignatures (2006, Vol. 17, No. 2)
GAO, Wei
One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings (2009, Vol. 20, No. 4)
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security (, Vol. 28, No. 2)
GARCIA, Inmaculada
On the Minimum Number of Simplex Shapes in Longest Edge Bisection Refinement of a Regular n-Simplex (, Vol. 26, No. 1)
GARG, Lalit
Phase-Type Survival Trees and Mixed Distribution Survival Trees for Clustering Patients' Hospital Length of Stay (2011, Vol. 22, No. 1)
GARLIAUSKAS, Algis
Numerical Simulation of Dynamic Synapse-Dendrite-Soma Neuronal Processes (1998, Vol. 9, No. 2)
Learning and Recognition of Visual Patterns by Human Subjects and Artificial Intelligence Systems (1998, Vol. 9, No. 4)
Hexagonal Approach and Modeling for the Visual Cortex (2000, Vol. 11, No. 4)
Artificial Neural Networks Models with Fuzziness and Chaos Phenomena (2003, Vol. 14, No. 2)
Conceptions and Modeling for Transmitted Information Evaluation by ANN (2004, Vol. 15, No. 4)
An Influence of Nonlinearities to Storage Capacity of Neural Networks (2005, Vol. 16, No. 2)
Information Conveyed by the Neural Network Systems and its Applied Significance (2007, Vol. 18, No. 2)
The Immune Network System with Chaotic Behavior (2008, Vol. 19, No. 2)
Embedded Patterns, Indirect Couplings with Randomness, and Memory Capacity in Neural Networks (2009, Vol. 20, No. 4)
An Expansion of the Neural Network Theory by Introducing Hebb Postulate (2010, Vol. 21, No. 3)
Mean Field Modeling of the FitzHugh-Nagumo Neuronal Network Model with Kernel Functions and Time-Delayed Couplings (, Vol. 24, No. 3)
GARRIDO, Aitor J.
Logical Formal Description of Expert Systems (2002, Vol. 13, No. 2)
ASTRA-Matlab Integration for the Control of Tokamaks (2011, Vol. 22, No. 2)
GARRIDO, Izaskun
ASTRA-Matlab Integration for the Control of Tokamaks (2011, Vol. 22, No. 2)
GARRO, Alfredo
Observability of Turing Machines: A Refinement of the Theory of Computation (2010, Vol. 21, No. 3)
GASPEROVIC, Jelena
Techniques to Aggregate the Characteristics of Internal Quality of an IS Specification Language (2005, Vol. 16, No. 4)
Methodology to Evaluate the Functionality of Specification Languages (2006, Vol. 17, No. 3)
GENG, Guanggang
A DFSM-Based Protocol Conformance Testing and Diagnosing Method (2011, Vol. 22, No. 3)
GIEDRA, Haroldas
Decidability of Logic of Correlated Knowledge (, Vol. 25, No. 4)
GILLARD, Jonathan
Analysis of Structured Low Rank Approximation as an Optimization Problem (2011, Vol. 22, No. 4)
GOLOB, Izidor
An Algorithm for Protecting Knowledge Discovery Data (2003, Vol. 14, No. 3)
GOLUBIC, Zlatko
Modelling of Analytical Function in the Financial Knowledge Discovery Model (2001, Vol. 12, No. 4)
GOMEZ-GIL, Pilar
A Biometric System Based on Neural Networks and SVM Using Morphological Feature Extraction from Hand-Shape Images (2011, Vol. 22, No. 2)
GOMOZOV, Aleksei L.
A Generalization of Regular Expressions (1999, Vol. 10, No. 1)
GORANTLA, M. Choudary
Identity Based Multisignatures (2006, Vol. 17, No. 2)
GRECHKO, Valery
From QBE to Graph Queries (1998, Vol. 9, No. 1)
GRICIUS, Gediminas
Recognition of Human Emotions in Reasoning Algorithms of Wheelchair Type Robots (2010, Vol. 21, No. 4)
GRICIUTE, Vilma
Designing HMM-Based Part-of-Speech Tagger for Lithuanian Language (2004, Vol. 15, No. 2)
GRIGAITIS, Darius
An Optimization of System for Automatic Recognition of Ischemic Stroke Areas in Computed Tomography Images (2007, Vol. 18, No. 4)
GRIGAS, Gintautas
Quantitative Evaluation of the Process of Open Source Software Localization (2006, Vol. 17, No. 1)
Text Input on Mobile Devices from Cultural and Educational Aspects (, Vol. 25, No. 3)
GRIGOLIENE, Rasa
The Mathematical Model of the Female Menstrual Cycle and its Modifications (2000, Vol. 11, No. 4)
GROSGES, Thomas
A New Pseudo-Random Number Generator Based on Two Chaotic Maps (, Vol. 24, No. 2)
GUAN, Jian
Distance Measure and Correlation Coefficient for Linguistic Hesitant Fuzzy Sets and Their Application (, Vol. 28, No. 2)
GUDAS, Saulius
Approach to Enterprise Modelling for Information Systems Engineering (2005, Vol. 16, No. 2)
SBISAF: A Service-Oriented Business and Information Systems Alignment Method (, Vol. 24, No. 2)
Towards Internal Modelling of the Information Systems Application Domain (, Vol. 27, No. 1)
GUDONIENE, Daina
Semantic Web Technologies for e-Learning: Models and Implementation (, Vol. 26, No. 2)
GUERMEUR, Yann
A Quadratic Loss Multi-Class SVM for which a Radius-Margin Bound Applies (2011, Vol. 22, No. 1)
GUERREIRO, Pedro
Increasing the Appeal of Programming Contests with Tasks Involving Graphical User Interfaces and Computer Graphics (, Vol. 1, No. )
GUIJARRO-BERDIÑAS, Bertha
Adaptive Inverse Control Using an Online Learning Algorithm for Neural Networks (, Vol. 25, No. 3)
GUILLAMÓN, Antonio
A New Randomness Test for Bit Sequences (, Vol. 24, No. 3)
GULATI, Ved P.
An Efficient Proxy Signature Scheme with Revocation (2004, Vol. 15, No. 4)
GUMMADIDALA, Shailaja
Identity Based Strong Designated Verifier Signature Scheme (2007, Vol. 18, No. 2)
GUO, Chonghui
A VIKOR-Based Approach to Group Decision Making With Uncertain Preference Ordinals and Incomplete Weight Information (, Vol. 27, No. 3)
GUZAITIS, Jonas
An Efficient Technique to Detect Visual Defects in Particleboards (2008, Vol. 19, No. 3)
Non-Invasive Intracranial Pulse Wave Monitoring (2008, Vol. 19, No. 3)
GYÖRKÖS, József
Interactive Aggregation/Disaggregation Dichotomic Sorting Procedure for Group Decision Analysis Based on the Threshold Model (2008, Vol. 19, No. 2)
HÖLBL, Marko
Best-Fit Learning Curve Model for the C4.5 Algorithm (, Vol. 25, No. 3)
H. PERIC, Zoran
Design of Fixed and Adaptive Companding Quantizer with Variable-Length Codeword for Memoryless Gaussian Source (, Vol. 24, No. 1)
HABERMAN, Bruria
Formal and Practical Aspects of Implementing Abstract Data Types in the Prolog Instruction (2008, Vol. 19, No. 1)
HADAR, Ofer
Combinatorial Systems Evolution: Example of Standard for Multimedia Information (2009, Vol. 20, No. 4)
HANACHI, Chihab
An Agent-Based Model for Autonomic Coordination of Inter-Organizational Business Processes (2009, Vol. 20, No. 3)
HANAFI, Mohamed
From Multiblock Partial Least Squares to Multiblock Redundancy Analysis. A Continuum Approach (2011, Vol. 22, No. 1)
HANCER, Emrah
Color Image Quantization: A Short Review and an Application with Artificial Bee Colony Algorithm (, Vol. 25, No. 3)
HAREJ PULKO, Katja
Learning Process Termination Criteria (2012, Vol. 23, No. 4)
HARTMAN, Joseph C.
Dynamic-Programming-Based Inequalities for the Unbounded Integer Knapsack Problem (, Vol. 27, No. 2)
HASHEMI, Shide Sadat
Decision Making with Unknown Data: Development of ELECTRE Method Based on Black Numbers (, Vol. 25, No. 1)
HASSANIEN, Abou Ella
A Copyright Protection using Watermarking Algorithm (2006, Vol. 17, No. 2)
HASSANIEN, Aboul Ella
Rough Set Approach for Generation of Classification Rules of Breast Cancer Data (2004, Vol. 15, No. 1)
HEGNER, Stephen J.
A Model for Multigranular Data and Its Integrity (, Vol. 28, No. 1)
HEIBERG, Thomas
An Agent-Based Architecture for Customer Services Management and Product Search (2002, Vol. 13, No. 4)
HEINIS, Thomas
ADvaNCE - Efficient and Scalable Approximate Density-Based Clustering Based on Hashing (, Vol. 28, No. 1)
HEMANTH, D. Jude
Performance Improved Modified Fuzzy C-Means Algorithm for Image Segmentation Applications (, Vol. 26, No. 4)
HENDRIX, Eligius M.T.
On the Minimum Number of Simplex Shapes in Longest Edge Bisection Refinement of a Regular n-Simplex (, Vol. 26, No. 1)
On Benchmarking Stochastic Global Optimization Algorithms (, Vol. 26, No. 4)
On Bisecting the Unit Simplex Using Various Distance Norms (, Vol. 27, No. 2)
Pipe Replacement in a Water Supply Network: Coordinated Versus Uncoordinated Replacement and Budget Effects (, Vol. 27, No. 2)
HERICKO, Marjan
The Impact of Details in the Class Diagram on Software Size Estimation (2005, Vol. 16, No. 2)
Learning Process Termination Criteria (2012, Vol. 23, No. 4)
Best-Fit Learning Curve Model for the C4.5 Algorithm (, Vol. 25, No. 3)
An Entropy-Based Algorithm for Proposing a Suitable Design Pattern (, Vol. 27, No. 4)
HERNANDEZ, Jose Juan
Swarm Intelligence for Frequency Management in Smart Grids (, Vol. 26, No. 3)
HERNANDEZ, Mario
Swarm Intelligence for Frequency Management in Smart Grids (, Vol. 26, No. 3)
HILAS, Constantinos S.
SCOLS-FuM: A Hybrid Fuzzy Modeling Method for Telecommunications Time-Series Forecasting (, Vol. 25, No. 2)
HOEHNE, Guenter
Intelligent Functional Model for Costs Minimization in Hybrid Manufacturing Systems (2004, Vol. 15, No. 1)
HOLBL, Marko
Learning Process Termination Criteria (2012, Vol. 23, No. 4)
HOLUBOVÁ, Irena
eXolutio: Methodology for Design and Evolution of XML Schemas Using Conceptual Modeling (, Vol. 26, No. 3)
HORNG, Gwoboa
A Secure YS-Like User Authentication Scheme (2007, Vol. 18, No. 1)
Public Key Authentication Schemes for Local Area Networks (2008, Vol. 19, No. 1)
HOSSEINI-NASAB, Hasan
An Integrated Grey-Based Approach for Multi FMSs Combination Selection (, Vol. 27, No. 4)
HOTOMSKI, Petar
Comparison of H-Logical Norm with some t-Norms (2003, Vol. 14, No. 4)
HOU, Jingyu
A Matrix-Based Model for Web Page Community Construction and More (2007, Vol. 18, No. 2)
HSIAO, Ching-Li
IHPG Algorithm for Efficient Information Fusion in Multi-Sensor Network via Smoothing Parameter Optimization (, Vol. 24, No. 2)
HSIEH, Bin-Tsan
On the Security of Some Password Authentication Protocols (2003, Vol. 14, No. 2)
HTOO, Htoo
Safe-Region Generation Methods for Continuous Trip Route Planning Queries (, Vol. 28, No. 1)
HUANG, Hui-Feng
Efficient Mobile Conference Scheme for Wireless Communication (, Vol. 24, No. 1)
HUANG, Pei-Hui
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes (2007, Vol. 18, No. 1)
HUANG, Rufen
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes (2007, Vol. 18, No. 3)
HUANG, Sen-Shan
Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles (, Vol. 25, No. 3)
Certificateless Signature with Strong Unforgeability in the Standard Model (, Vol. 26, No. 4)
A Revocable Certificateless Short Signature Scheme and Its Authentication Application (, Vol. 27, No. 3)
SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices (, Vol. 28, No. 1)
HUANG, Shaonong
Identity-Based Threshold Proxy Signature from Bilinear Pairings (2010, Vol. 21, No. 1)
HUANG, Xinli
Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model (2012, Vol. 23, No. 3)
HUANG, Zhenjie
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures (2006, Vol. 17, No. 3)
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes (2007, Vol. 18, No. 3)
HULTQUIST, Carl
Challenges in Running a Computer Olympiad in South Africa (, Vol. 2, No. )
HUNG, Ying-Hao
Certificateless Signature with Strong Unforgeability in the Standard Model (, Vol. 26, No. 4)
A Revocable Certificateless Short Signature Scheme and Its Authentication Application (, Vol. 27, No. 3)
HUR, Sun
A Multiechelon Repairable Item Inventory System with Lateral Transshipment and a General Repair Time Distribution (2006, Vol. 17, No. 3)
HWANG, Kuo-Feng
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures (2000, Vol. 11, No. 1)
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards (2003, Vol. 14, No. 3)
HWANG, Min-Shiang
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures (2000, Vol. 11, No. 1)
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers (2000, Vol. 11, No. 2)
A New Redundancy Reducing Cipher (2000, Vol. 11, No. 4)
An Improvement of SPLICE/AS in WIDE against Guessing Attack (2001, Vol. 12, No. 2)
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers (2003, Vol. 14, No. 3)
Security of Improvement on Methods for Protecting Password Transmission (2003, Vol. 14, No. 4)
Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem (2003, Vol. 14, No. 1)
Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages (2012, Vol. 23, No. 4)
The Moderately Hard DoS-Resistant Authentication Protocol on Client Puzzles (, Vol. 27, No. 1)
An Authentication Protocol for Lightweight NFC Mobile Sensors Payment (, Vol. 27, No. 4)
HWANG, Shaw-Hwa
An Improved Version of Algebraic Codebook Search Algorithm for an AMR-WB Speech Coder (, Vol. 28, No. 2)
HWANG, Shin-Jia
Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers (2003, Vol. 14, No. 2)
HWANG, Tzonelih
On the Security of Some Password Authentication Protocols (2003, Vol. 14, No. 2)
On the Linkability of Some Group Signature Schemes (2003, Vol. 14, No. 1)
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes (2007, Vol. 18, No. 1)
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem (2007, Vol. 18, No. 1)
IBEAS, Asier
Representations of Multi-Model Based Controllers by Using Artificial Intelligence Tools (2004, Vol. 15, No. 3)
On the Equilibrium Points, Boundedness and Positivity of a Sveirs Epidemic Model under Constant Regular Constrained Vaccination (2011, Vol. 22, No. 3)
ICHTEV, Alexandar
Closed-Loop System Identification with Recursive Modifications of the Instrumental Variable Method (2011, Vol. 22, No. 2)
ICHTEV, Alexander
Closed-Loop System Identification with Modifications of the Instrumental Variable Method (2010, Vol. 21, No. 2)
IFTIKHAR, Nadeem
Generic Multimedia Database Architecture Based upon Semantic Libraries (2007, Vol. 18, No. 4)
IHSAN, Imran
Generic Multimedia Database Architecture Based upon Semantic Libraries (2007, Vol. 18, No. 4)
IKEDA, Makoto
Performance Evaluation of WMN-GA System in Node Placement in WMNs for Different Distributions of Mesh Clients and Different Selection and Mutation Operators (, Vol. 27, No. 3)
IPSIC, Ivo
Acoustic Modelling for Croatian Speech Recognition and Synthesis (2008, Vol. 19, No. 2)
ISAIA, Ennio Davide
The Minimum Density Power Divergence Approach in Building Robust Regression Models (2011, Vol. 22, No. 1)
ISAZADEH, Ayaz
Viewcharts: Syntax and Semantics (2008, Vol. 19, No. 3)
ITURRIAGA, Santiago
Metaheuristics for the Virtual Machine Mapping Problem in Clouds (, Vol. 26, No. 1)
IVANAUSKAS, Feliksas
Reliability of One Dimensional Model of Moisture Diffusion in Wood ^* (2002, Vol. 13, No. 4)
IVANOVIC, Mirjana
Theoretical Foundations of an Environment-Based Multiparadigm Language (2000, Vol. 11, No. 1)
Numerical Representations as Purely Functional Data Structures: a New Approach (2002, Vol. 13, No. 2)
JAAKKOLA, Hannu
An Algorithm for Protecting Knowledge Discovery Data (2003, Vol. 14, No. 3)
Assessment of Classification Models with Small Amounts of Data (2007, Vol. 18, No. 3)
Learning Process Termination Criteria (2012, Vol. 23, No. 4)
JAKIMAUSKAS, Gintautas
Influence of Projection Pursuit on Classification Errors: Computer Simulation Results (2000, Vol. 11, No. 2)
JALINIAUSKAS, Alvydas
The Analysis of Unstructured Processes in Business Administration (2000, Vol. 11, No. 2)
JAN, Jinn-Ke
On the Security of Methods for Protecting Password Transmission (2001, Vol. 12, No. 3)
Partially Blind Threshold Signature Based on RSA (2003, Vol. 14, No. 2)
JANIAK, Adam
Sequencing with Ordered Criteria, Precedence and Group Technology Constraints (2001, Vol. 12, No. 1)
Job Sequencing with Exponential Functions of Processing Times (2006, Vol. 17, No. 1)
A Problem of Scheduling Jobs with Non-Monotonic Stepwise Values (, Vol. 25, No. 1)
JANICIC, Predrag
Formal Correctness Proof for DPLL Procedure (2010, Vol. 21, No. 1)
JANSSEN, Jacques
HIV Evolution: A Quantification of the Effects Due to Age and to Medical Progress (2011, Vol. 22, No. 1)
JANUSAUSKAS, Artras
The Empirical Mode Decomposition and the Discrete Wavelet Transform for Detection of Human Cataract in Ultrasound Signals (2005, Vol. 16, No. 4)
JANUSAUSKAS, Arturas
The Hilbert-Huang Transform for Detection of Otoacoustic Emissions and Time-Frequency Mapping (2006, Vol. 17, No. 1)
Detection of Hearing Loss in Audiological Frequencies from Transient Evoked Otoacoustic Emissions (2010, Vol. 21, No. 2)
JANUSKEVICIUS, Eugenijus
Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure (2005, Vol. 16, No. 1)
JANUTENIENE, Jolanta
Mathematical Modeling of Metal Cutting Process (2001, Vol. 12, No. 2)
JAPERTAS, Saulius
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem (2010, Vol. 21, No. 2)
JAYAKUMAR, Chinnappan
Optimized on Demand Routing Protocol of Mobile Ad Hoc Network (2006, Vol. 17, No. 4)
JEGELEVICIUS, Darius
Application of Data Mining Technique for Diagnosis of Posterior Uveal Melanoma (2002, Vol. 13, No. 4)
JEONG, Won Chan
A Coordination Model Under an Order-Up-To Policy (2012, Vol. 23, No. 2)
JEVSIKOVA, Tatjana
An Approach to Formalize Metainformation of Software Localizable Resources (2010, Vol. 21, No. 3)
An Integration of Methodological Resources into Learning Object Metadata Repository (, Vol. 24, No. 1)
Text Input on Mobile Devices from Cultural and Educational Aspects (, Vol. 25, No. 3)
JIA, Yuan
2-Tuple Linguistic Hesitant Fuzzy Aggregation Operators and Its Application to Multi-Attribute Decision Making (, Vol. 28, No. 2)
JOKSIENE, Zivile
Computational Experiment for Stability Analysis of Difference Schemes with Nonlocal Conditions (, Vol. 24, No. 2)
JOVANOVIC, Aleksandra Z.
New Coding Algorithm Based on Variable-Length Codewords for Piecewise Uniform Quantizers (, Vol. 27, No. 3)
JOVANOVIC, Rodoljub
Extension of Ratio System Part of MOORA Method for Solving Decision-Making Problems with Interval Data (2012, Vol. 23, No. 1)
A Multi-Attribute Decision Making Model Based on Distance from Decision Maker's Preferences (, Vol. 24, No. 1)
JUGO, Josu
Absolute Stability and Hyperstability of a Class of Hereditary Systems (1998, Vol. 9, No. 2)
JUOZAPAVICIUS, Algimantas
Indices and Data Structures in Information Systems (1999, Vol. 10, No. 1)
JUOZULYNAS, Algirdas
Application of Survival Models for the Population Studies (2003, Vol. 14, No. 4)
JURIC, Matjaz B.
Assessment of Classification Models with Small Amounts of Data (2007, Vol. 18, No. 3)
Interactive Aggregation/Disaggregation Dichotomic Sorting Procedure for Group Decision Analysis Based on the Threshold Model (2008, Vol. 19, No. 2)
Learning Process Termination Criteria (2012, Vol. 23, No. 4)
JURKONIS, Rytis
The Empirical Mode Decomposition and the Discrete Wavelet Transform for Detection of Human Cataract in Ultrasound Signals (2005, Vol. 16, No. 4)
JUSAS, Vacius
The Realization-Independent Testing Based on the Black Box Fault Models (2005, Vol. 16, No. 1)
Functional Test Generation Based on Combined Random and Deterministic Search Methods (2007, Vol. 18, No. 1)
KÖPPEN, Mario
Relational Optimization and Its Application: From Bottleneck Flow Control to Wireless Channel Allocation (, Vol. 24, No. 3)
K. HO, James
Maximum Resolution Topology for Multi-Attribute Dichotomies (2005, Vol. 16, No. 4)
KABURLASOS, Vassilis G.
A Genetic Based Approach to the Type I Structure Identification Problem (2005, Vol. 16, No. 3)
KACENIAUSKAS, Arnas
Parallel FEM Software for CFD Problems (2004, Vol. 15, No. 3)
Parallel DEM Software for Simulation of Granular Media (2006, Vol. 17, No. 2)
Development of Efficient Interface Sharpening Procedure for Viscous Incompressible Flows (2008, Vol. 19, No. 4)
KACIANAUSKAS, Rimantas
Moving Locally Predefined Remeshing for Deep Cone Penetration FE Analysis (2004, Vol. 15, No. 4)
Parallel DEM Software for Simulation of Granular Media (2006, Vol. 17, No. 2)
KAIMAL, M. Ramachandra
Variable Gain Takagi-Sugeno Fuzzy Logic Controllers (2006, Vol. 17, No. 3)
KAJACKAS, Algimantas
An Investigation of the Perceptual Value of Voice Frames (2009, Vol. 20, No. 4)
KAKLAUSKAS, Arturas
Multivariant Design and Multiple Criteria Analysis of a Building Life Cycle (2001, Vol. 12, No. 1)
Multi-Attribute Decision-Making Model by Applying Grey Numbers (2009, Vol. 20, No. 2)
KALIBATIENE, Diana
Application of the Ontology Axioms for the Development of OCL Constraints from PAL Constraints (2012, Vol. 23, No. 3)
KAMINSKAS, Vytautas
Adaptive Fuzzy Control of Nonlinear Plant with Changing Dynamics (2002, Vol. 13, No. 3)
Statistical Language Models of Lithuanian Based on Word Clustering and Morphological Decomposition (2004, Vol. 15, No. 4)
Learning Fuzzy Control of Nonlinear Processes (2005, Vol. 16, No. 4)
Forecast Model of Impact of Meteorological Factors on Coronary Artery Disease Patients (2007, Vol. 18, No. 3)
Modeling Human Emotions as Reactions to a Dynamical Virtual 3D Face (, Vol. 25, No. 3)
A Comparison of Hammerstein-Type Nonlinear Models for Identification of Human Response to Virtual 3D Face Stimuli (, Vol. 27, No. 2)
KAMINSKI, Wieslaw A.
Liquid State Machine Built of Hodgkin-Huxley Neurons (2004, Vol. 15, No. 1)
Nonlinear Behaviour in the MPI-Parallelised Model of the Rat Somatosensory Cortex (2008, Vol. 19, No. 3)
KAMINSKY, Evgeny
Combinatorial Systems Evolution: Example of Standard for Multimedia Information (2009, Vol. 20, No. 4)
KANCELKIS, Deividas
Improving Space Localization Properties of the Discrete Wavelet Transform (, Vol. 24, No. 4)
KANCHARLA, Phani Kumar
Identity Based Strong Designated Verifier Signature Scheme (2007, Vol. 18, No. 2)
KANDRATAVICIUS, Irmantas
Synthesized Fricative ch Specific Features and Influence on Speech Quality Analysis (2001, Vol. 12, No. 3)
KANG, Harcharan S.
Modeling and Control - Flexible Structure Spacecraft (2002, Vol. 13, No. 1)
KAPOCIUS, K\c{e}stutis
Repository for Business Rules Based IS Requirements (2006, Vol. 17, No. 4)
KAPUS, Tatjana
Specifying and Verifying External Behaviour of Fair Input/Output Automata by Using the Temporal Logic of Actions (, Vol. 26, No. 4)
KARABASEVIC, Darjan
The Framework for the Selection of Personnel Based on the SWARA and ARAS Methods Under Uncertainties (, Vol. 27, No. 1)
A Neutrosophic Extension of the MULTIMOORA Method (, Vol. 28, No. 1)
KARABOGA, Dervis
Color Image Quantization: A Short Review and an Application with Artificial Bee Colony Algorithm (, Vol. 25, No. 3)
KARBAUSKAITE, Rasa
Topology Preservation Measures in the Visualization of Manifold-Type Multidimensional Data (2009, Vol. 20, No. 2)
Fractal-Based Methods as a Technique for Estimating the Intrinsic Dimensionality of High-Dimensional Data: A Survey (, Vol. 27, No. 2)
KARIMPOUR, Jaber
Viewcharts: Syntax and Semantics (2008, Vol. 19, No. 3)
KAROULIS, Athanasis
Usability Evaluation of a Virtual Museum Interface (2006, Vol. 17, No. 3)
KASHLAKOVA, Elena
Some Grammatical Structures of Programming Languages as Simple Bracketed Languages (2000, Vol. 11, No. 4)
KASPARAITIS, Pijus
Transcribing of the Lithuanian Text Using Formal Rules (1999, Vol. 10, No. 4)
Automatic Stressing of the Lithuanian Text on the Basis of a Dictionary (2000, Vol. 11, No. 1)
Automatic Stressing of the Lithuanian Nouns and Adjectives on the Basis of Rules (2001, Vol. 12, No. 2)
Diphone Databases for Lithuanian Text-to-Speech Synthesis (2005, Vol. 16, No. 2)
Lithuanian Speech Recognition Using the English Recognizer (2008, Vol. 19, No. 4)
Building Text Corpus for Unit Selection Synthesis (, Vol. 25, No. 4)
Automatic Parameters Estimation of the D. Klatt Phoneme Duration Model (, Vol. 27, No. 3)
KATIN, Igor
On the Optimization of Investment Strategies in the Context of Virtual Financial Market by the Individual Approach to Risk (, Vol. 25, No. 2)
KATINA, Joana
On the Optimization of Investment Strategies in the Context of Virtual Financial Market by the Individual Approach to Risk (, Vol. 25, No. 2)
KAUKENAS, Jonas
Recognition of Short-Time Specific Random Elements in Random Sequences (2011, Vol. 22, No. 2)
KAVALIAUSKAS, Mindaugas
On Local Bandwidth Selection for Density Estimation (1998, Vol. 9, No. 4)
Multivariate Data Clustering for the Gaussian Mixture Model (2005, Vol. 16, No. 1)
KAZAKEVICIUTE, Geruta
Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure (2005, Vol. 16, No. 1)
KAZANAVICIUS, Egidijus
The Evaluation and Design Methodology for Real Time Systems (2004, Vol. 15, No. 1)
KAZLAUSKAS , Kazys
Sensitivity Analysis of Multivariable Systems in State Space (2000, Vol. 11, No. 1)
KAZLAUSKAS, Jaunius
Layered Polynomial Filter Structures (2002, Vol. 13, No. 1)
Iterative Estimation Algorithm of Autoregressive Parameters (2006, Vol. 17, No. 2)
Key-Dependent S-Box Generation in AES Block Cipher System (2009, Vol. 20, No. 1)
KAZLAUSKAS, Kazys
High Speed LMS Adaptive Filtering (1998, Vol. 9, No. 2)
Noisy Speech Intelligibility Enhancement (1999, Vol. 10, No. 2)
Layered Polynomial Filter Structures (2002, Vol. 13, No. 1)
Optimal Estimation of the Parameters of Linear Periodically Time-varying Systems (2003, Vol. 14, No. 2)
Iterative Estimation Algorithm of Autoregressive Parameters (2006, Vol. 17, No. 2)
The Burg Algorithm with Extrapolation for Improving the Frequency Estimation (2011, Vol. 22, No. 2)
Key-Dependent S-Box Generation in AES Block Cipher System (2009, Vol. 20, No. 1)
A Forward-Backward Approach for Instantaneous Frequency Estimation of Frequency Modulated Signals in Noisy Environment (2012, Vol. 23, No. 1)
On Intelligent Extraction of an Internal Signal in a Wiener System Consisting of a Linear Block Followed by Hard-Nonlinearity (, Vol. 24, No. 1)
Missing Data Restoration Algorithm (, Vol. 25, No. 2)
An Algorithm for Key-Dependent S-Box Generation in Block Cipher System (, Vol. 26, No. 1)
KAZLAUSKIENE, Asta
Corpus-Based Hidden Markov Modelling of the Fundamental Frequency of Lithuanian (, Vol. 27, No. 3)
KEMKES, Graeme
New Task Types at the Canadian Computing Competition (, Vol. 1, No. )
KESHAVARZ GHORABAEE, Mehdi
Multi-Criteria Inventory Classification Using a New Method of Evaluation Based on Distance from Average Solution (EDAS) (, Vol. 26, No. 3)
A New Approach for Solving Bi-Objective Redundancy Allocation Problem Using DOE, Simulation and \varepsilon-Constraint Method (, Vol. 28, No. 1)
KEYZER, Michiel
On Stochastic Optimization and Statistical Learning in Reproducing Kernel Hilbert Spaces by Support Vector Machines (SVM) (2009, Vol. 20, No. 2)
KHACHAY, Michael
Complexity and Approximability of Committee Polyhedral Separability of Sets in General Position (2009, Vol. 20, No. 2)
KHALILI ESBOUEI, Saber
A Hybrid MCDM Approach Based on Fuzzy ANP and Fuzzy TOPSIS for Technology Selection (, Vol. 26, No. 3)
KHANDEKAR, Anant V.
Selection of Material Handling Equipment Using Fuzzy Axiomatic Design Principles (, Vol. 26, No. 2)
KHARCHENKO, Andrey
FORECASTING AUTOMATION: AN EMERGING BRANCH OF FORECASTING ENGINEERING (1998, Vol. 9, No. 3)
Forecasting Automation: an Emerging Branch of Forecasting Engineering (1998, Vol. 9, No. 4)
KHARIN, Yuriy
Statistical Analysis of Spatio-Temporal Data Based on Poisson Conditional Autoregressive Model (, Vol. 26, No. 1)
KIAKOJOORI, Davood
Sensorless Estimation of Wind Speed by Soft Computing Methodologies: A Comparative Study (, Vol. 26, No. 3)
KIKUSTS, Paulis
Root Cause Analysis of Large Scale Application Testing Results (, Vol. 27, No. 4)
KIM, Chulyeon
Dynamic Mean Value Cross Decomposition Algorithm for Capacitated Facility Location Problems (, Vol. 24, No. 4)
KIM, Jeongnyeo
Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery (, Vol. 24, No. 3)
KIM, Jong Soo
An Algorithm for Portfolio Optimization Problem (2005, Vol. 16, No. 1)
A Multiechelon Repairable Item Inventory System with Lateral Transshipment and a General Repair Time Distribution (2006, Vol. 17, No. 3)
A Coordination Model Under an Order-Up-To Policy (2012, Vol. 23, No. 2)
KIM, Kitae
A Method of Finding Bad Signatures in an RSA-Type Batch Verification (2011, Vol. 22, No. 2)
KIM, Pankoo
Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery (, Vol. 24, No. 3)
KIM, Tai Young
A Multiechelon Repairable Item Inventory System with Lateral Transshipment and a General Repair Time Distribution (2006, Vol. 17, No. 3)
KIM, Yong Chan
An Algorithm for Portfolio Optimization Problem (2005, Vol. 16, No. 1)
KIRIS, Safak
Multi-Criteria Inventory Classification by Using a Fuzzy Analytic Network Process (ANP) Approach (, Vol. 24, No. 2)
KIRSCH, Lee
A Bayesian Approach to Pharmaceutical Product Quality Risk Quantification (2011, Vol. 22, No. 4)
KIS, Kristina
A Novel Biometric Personal Verification System Based on the Combination of Palmprints and Faces (2008, Vol. 19, No. 1)
KISEL, Andrej
Fingerprint Minutiae Matching without Global Alignment Using Local Structures (2008, Vol. 19, No. 1)
The Use of Group Delay Features of Linear Prediction Model for Speaker Recognition (2010, Vol. 21, No. 1)
KISS, Ferenc
Processing of Undesirable Business Events in Advanced Production Planning Systems (2012, Vol. 23, No. 4)
Advanced Planning and Scheduling Systems: Modeling and Implementation Challenges (, Vol. 25, No. 4)
KIZAUSKIENE, Laura
The Gaze Tracking System with Natural Head Motion Compensation (2012, Vol. 23, No. 1)
KLÍMEK, Jakub
eXolutio: Methodology for Design and Evolution of XML Schemas Using Conceptual Modeling (, Vol. 26, No. 3)
KLEIZA, Jonas
The Extension of the Van Der Pauw Method to Anisotropic Media (2007, Vol. 18, No. 2)
KLEIZA, Vytautas
The Extension of the Van Der Pauw Method to Anisotropic Media (2007, Vol. 18, No. 2)
Determination of Stress Strain State Components of Butt Welded Joint with Mild Interlayer Subjected to Elasto-Plastic Tension (2006, Vol. 17, No. 2)
KLEMENTAVICIUS, Arturas
Multi-Criterion Assessment of Preferences for Communication Alternatives of Wind Power Park Information System (2008, Vol. 19, No. 1)
KLJAJIC BORSTNAR, Mirjana
Multiple-Criteria Approach to Optimisation of Multidimensional Data Models (, Vol. 26, No. 2)
KOCATÜRK, Mustafa M.
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML (2008, Vol. 19, No. 4)
KOCHETKOV, Alexej
Fingerprint Minutiae Matching without Global Alignment Using Local Structures (2008, Vol. 19, No. 1)
KOKO, Jonas
Parallel Implementation of a Generalized Conjugate Gradient Algorithm (1998, Vol. 9, No. 4)
KOLSTAD, Rob
USA Computing Olympiad (USACO) (, Vol. 1, No. )
KONG, Min
A Novel Trust Inference Framework for Web-Based Scenarios Harnessed by Social Network and Web of Trust - a Heuristic Approach (, Vol. 27, No. 2)
KOPUSTINSKAS, Audris
Ultrasound Quantitative Evaluation of Human Eye Cataract (2007, Vol. 18, No. 2)
KORELIC, Igor
Multiple-Criteria Approach to Optimisation of Multidimensional Data Models (, Vol. 26, No. 2)
KOTNIK, Bojan
Implementation of PCCD-OFDM-ASK Robust Data Transmission over GSM Speech Channel (2009, Vol. 20, No. 1)
GSM Speech Coder Indirect Identification Algorithm (2010, Vol. 21, No. 4)
KOTSIALOS, Efthimios
Design and Implementation of Parallel Counterpropagation Networks Using MPI (2007, Vol. 18, No. 1)
KOTSIREAS, Ilias S.
D-Optimal Designs: A Mathematical Programming Approach using Cyclotomic Cosets (2011, Vol. 22, No. 4)
KOU, Gang
Minimum Mean Square Error Estimators for the Exponential SSALT Model (, Vol. 27, No. 4)
KOVALYOV, Mikhail Y.
Job Sequencing with Exponential Functions of Processing Times (2006, Vol. 17, No. 1)
KRANAUSKAS, Justas
Fingerprint Minutiae Matching without Global Alignment Using Local Structures (2008, Vol. 19, No. 1)
KRAPAVICKAITE, Danute
Estimation of a Ratio in the Finite Population (2005, Vol. 16, No. 3)
KRAUJALIS, Sarunas
The Development of Universal Banking in Lithuania (2001, Vol. 12, No. 4)
KRAVANJA, Jaka
Exploiting Spatio-Temporal Information for Light-Plane Labeling in Depth-Image Sensors Using Probabilistic Graphical Models (, Vol. 27, No. 1)
KREMERS, Enrique
Swarm Intelligence for Frequency Management in Smart Grids (, Vol. 26, No. 3)
KRIAUCIUNIENE, Loresa
Digital Model of Blood Circulation Analysis System (2009, Vol. 20, No. 4)
KRIKSTOLAITIS, Ricardas
Influence of Projection Pursuit on Classification Errors: Computer Simulation Results (2000, Vol. 11, No. 2)
KRILAVICIUS, Tomas
On Structural Analysis of Parliamentarian Voting Data (2008, Vol. 19, No. 3)
KRISHNAA, Auparajita
A Study of the Major Graph Labelings of Trees (2004, Vol. 15, No. 4)
KRISHNAA,, Auparajita
Algorithms for Inner Magic and Inner Antimagic Labelings of Some Planar Graphs (2006, Vol. 17, No. 3)
KRISPER, Marjan
Facilitating Ontology Development with Continuous Evaluation (2010, Vol. 21, No. 4)
KRIUKOVAS, Arturas
Pixel-Wise Tamper Detection Under Generic Blur/Sharpen Attacks (2012, Vol. 23, No. 4)
KRIVULIN, Nikolai
A Maximization Problem in Tropical Mathematics: A Complete Solution and Application Examples (, Vol. 27, No. 3)
KRUCHKOV, Oleg
Combinatorial Systems Evolution: Example of Standard for Multimedia Information (2009, Vol. 20, No. 4)
KRYSIAK, Tomasz
A Problem of Scheduling Jobs with Non-Monotonic Stepwise Values (, Vol. 25, No. 1)
KUBICA, Marcin
A Proposal for a Task Preparation Process (, Vol. 2, No. )
KUBILINSKIENE, Svetlana
An Integration of Methodological Resources into Learning Object Metadata Repository (, Vol. 24, No. 1)
KUBILIUS, Kestutis
On Comparison of the Estimators of the Hurst Index of the Solutions of Stochastic Differential Equations Driven by the Fractional Brownian Motion (2011, Vol. 22, No. 1)
KULVICIUS, Tomas
{T} Wave Alternans Features for Automated Detection (2005, Vol. 16, No. 4)
KULYS, Juozas
Computational Modeling of Bienzyme Biosensor with Different Initial and Boundary Conditions (, Vol. 24, No. 4)
KUNCAK, Viktor
Numerical Representations as Purely Functional Data Structures: a New Approach (2002, Vol. 13, No. 2)
KUPER, Jan
Designing HMM-Based Part-of-Speech Tagger for Lithuanian Language (2004, Vol. 15, No. 2)
KURAPKIENE, Skaidra
Evaluation of Ultrasound Attenuation Characteristics of Human Cataract (2003, Vol. 14, No. 4)
The Empirical Mode Decomposition and the Discrete Wavelet Transform for Detection of Human Cataract in Ultrasound Signals (2005, Vol. 16, No. 4)
Ultrasound Quantitative Evaluation of Human Eye Cataract (2007, Vol. 18, No. 2)
KURASOVA, Olga
Comparative Analysis of the Graphical Result Presentation in the SOM Software (2002, Vol. 13, No. 3)
Efficient Data Projection for Visual Analysis of Large Data Sets Using Neural Networks (2011, Vol. 22, No. 4)
Quality of Quantization and Visualization of Vectors Obtained by Neural Gas and Self-Organizing Map (2011, Vol. 22, No. 1)
Genetic Algorithm for VRP with Constraints Based on Feasible Insertion (, Vol. 25, No. 1)
Synchronous R-NSGA-II: An Extended Preference-Based Evolutionary Algorithm for Multi-Objective Optimization (, Vol. 26, No. 1)
Swarm Intelligence for Frequency Management in Smart Grids (, Vol. 26, No. 3)
KURILOVAS, Eugenijus
Multiple Criteria Comparative Evaluation of E-Learning Systems and Components (2009, Vol. 20, No. 4)
KURMIS, Mindaugas
Integration of a Self-Organizing Map and a Virtual Pheromone for Real-Time Abnormal Movement Detection in Marine Traffic (, Vol. 28, No. 2)
KUZNETSOV, Mikhail
Analytic and Stochastic Methods of Structure Parameter Estimation (, Vol. 27, No. 3)
KVEDERYTE, Nerija
Multivariant Design and Multiple Criteria Analysis of a Building Life Cycle (2001, Vol. 12, No. 1)
KWOLEK, Bogdan
Real-Time Head Tracker Using Color, Stereovision and Ellipse Fitting in a Particle Filter (2004, Vol. 15, No. 2)
López REDONDO, Juana
Multimodal Evolutionary Algorithm for Multidimensional Scaling with City-Block Distances (2012, Vol. 23, No. 4)
LAÍNEZ, José Miguel
A Bayesian Approach to Pharmaceutical Product Quality Risk Quantification (2011, Vol. 22, No. 4)
LACHMAYER, Friedrich
Structural Legal Visualization (, Vol. 26, No. 2)
LAI, Jui-Chang
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem (2006, Vol. 17, No. 3)
LAL, Mangi
Vague Rough Set Techniques for Uncertainty Processing in Relational Database Model (2008, Vol. 19, No. 1)
LANCINSKAS, Algirdas
On Benchmarking Stochastic Global Optimization Algorithms (, Vol. 26, No. 4)
Solution of Discrete Competitive Facility Location Problem for Firm Expansion (, Vol. 27, No. 2)
LAPIN, Kristina
Automatic Configuration of Structured Graphical Documents: A Case Study in the Domain of Electroplating Lines (1999, Vol. 10, No. 1)
Structural Legal Visualization (, Vol. 26, No. 2)
LARICHEV, Oleg
Method ZAPROS for Multicriteria Alternatives Ranking and the Problem of Incomparability (2001, Vol. 12, No. 1)
LAUCIUS, Rimgaudas
Internationalization of Compilers (2007, Vol. 18, No. 3)
LAUKAITIS, Algirdas
Multi-Alignment Templates Induction (2008, Vol. 19, No. 4)
Semi-Automatic Bilingual Corpus Creation with Zero Entropy Alignments (2011, Vol. 22, No. 2)
LAUKAITIS, Ricardas
Semi-Automatic Bilingual Corpus Creation with Zero Entropy Alignments (2011, Vol. 22, No. 2)
LAURINCIUKAITE, Sigita
Framework for Choosing a Set of Syllables and Phonemes for Lithuanian Speech Recognition (2007, Vol. 18, No. 3)
LAUSEN, Georg
Handling Termination in a Logical Language for Active Rules (1998, Vol. 9, No. 1)
LAVBIC, Dejan
Facilitating Ontology Development with Continuous Evaluation (2010, Vol. 21, No. 4)
General Context-Aware Data Matching and Merging Framework (, Vol. 24, No. 1)
LAYUAN, Li
Fabric Level and Application Level QoS Guarantees in Grid Computing (2007, Vol. 18, No. 4)
LEE, Cheng-Chi
An Improvement of SPLICE/AS in WIDE against Guessing Attack (2001, Vol. 12, No. 2)
LEE, Chien-I
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams (2008, Vol. 19, No. 1)
LEE, Moon Sung
Cryptanalysis of a Public Key Cryptosystem Based on the Matrix Combinatorial Problem (, Vol. 24, No. 2)
LEE, Narn-Yih
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem (2007, Vol. 18, No. 1)
LEHIRECHE, Ahmed
Evolving in Real Time a Neural Net Controller of Robot-Arm: Track and Evolve (2004, Vol. 15, No. 1)
LEI, Xu-Sheng
Reliable Information Hiding Based on Support Vector Machine (2005, Vol. 16, No. 3)
LENGVINAS, Gintautas
Non-Invasive Intracranial Pulse Wave Monitoring (2008, Vol. 19, No. 3)
LERGA, Jonatan
Separable Image Denoising Based on the Relative Intersection of Confidence Intervals Rule (2011, Vol. 22, No. 3)
LEVIN, Mark Sh.
Hierarchical Decision Making Framework for Evaluation and Improvement of Composite Systems (Example for Building) (2005, Vol. 16, No. 2)
Combinatorial Systems Evolution: Example of Standard for Multimedia Information (2009, Vol. 20, No. 4)
Towards Clique-Based Fusion of Graph Streams in Multi-Function System Testing (2012, Vol. 23, No. 3)
LIANG, Tianzhu
Community Detection Through Optimal Density Contrast of Adjacency Matrix (2011, Vol. 22, No. 1)
LIAO, Chiu-Hsiung
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update (2010, Vol. 21, No. 3)
LILEIKYTE, Rasa
Metrics Based Quality Estimation of Speech Recognition Features (, Vol. 24, No. 3)
LIM, Seongan
A Method of Finding Bad Signatures in an RSA-Type Batch Verification (2011, Vol. 22, No. 2)
LIN, Changsheng
Minimum Mean Square Error Estimators for the Exponential SSALT Model (, Vol. 27, No. 4)
LIN, Iuon-Chang
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers (2000, Vol. 11, No. 2)
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach (2005, Vol. 16, No. 1)
Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery (, Vol. 28, No. 2)
LIN, Iuon-Chung
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures (2000, Vol. 11, No. 1)
LIN, Pei-Yu
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys (2007, Vol. 18, No. 4)
LIN, Xuanzhi
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes (2007, Vol. 18, No. 3)
LINK, Thomas
New Tendencies in Rating SMEs with Respect to Basel II (2001, Vol. 12, No. 4)
LIPEIKA, Antanas
Language Egineering in Lithuania (1998, Vol. 9, No. 4)
Speaker Recognition Based on the Use of Vocal Tract and Residue Signal LPC Parameters (1999, Vol. 10, No. 4)
Optimal Segmentation of Random Sequences (2000, Vol. 11, No. 3)
Development of Isolated Word Speech Recognition System (2002, Vol. 13, No. 1)
Word Endpoint Detection Using Dynamic Programming (2003, Vol. 14, No. 4)
Development of HMM/Neural Network-Based Medium-Vocabulary Isolated-Word Lithuanian Speech Recognition System (2004, Vol. 15, No. 4)
Framework for Choosing a Set of Syllables and Phonemes for Lithuanian Speech Recognition (2007, Vol. 18, No. 3)
On the Use of the Formant Features in the Dynamic Time Warping Based Recognition of Isolated Words (2008, Vol. 19, No. 2)
Optimization of Formant Feature Based Speech Recognition (2010, Vol. 21, No. 3)
LIPEIKIENE, Joana
Language Egineering in Lithuania (1998, Vol. 9, No. 4)
Speaker Recognition Based on the Use of Vocal Tract and Residue Signal LPC Parameters (1999, Vol. 10, No. 4)
Development of Isolated Word Speech Recognition System (2002, Vol. 13, No. 1)
Word Endpoint Detection Using Dynamic Programming (2003, Vol. 14, No. 4)
On the Use of the Formant Features in the Dynamic Time Warping Based Recognition of Isolated Words (2008, Vol. 19, No. 2)
LIPUS, Bogdan
Efficient Reconstruction of Images with Deliberately Corrupted Pixels (2012, Vol. 23, No. 1)
LIU, Jenshiuh
Identity-Based Threshold Proxy Signature from Bilinear Pairings (2010, Vol. 21, No. 1)
LIU, Kuo-Ching
Efficient Mobile Conference Scheme for Wireless Communication (, Vol. 24, No. 1)
LIU, Peide
Some Single Valued Neutrosophic Number Heronian Mean Operators and Their Application in Multiple Attribute Group Decision Making (, Vol. 27, No. 1)
LIU, Shengli
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing (2006, Vol. 17, No. 4)
LIUTKEVICIUS, Raimundas
Adaptive Fuzzy Control of Nonlinear Plant with Changing Dynamics (2002, Vol. 13, No. 3)
Coupled Adaptive Fuzzy Control of Nonlinear, Time-Varying Plant (2003, Vol. 14, No. 3)
Learning Fuzzy Control of Nonlinear Processes (2005, Vol. 16, No. 4)
LONG, Yu
Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing (2006, Vol. 17, No. 4)
Identity-Based Key-Insulated Signcryption (2012, Vol. 23, No. 1)
LOPATA, Audrius
Approach to Enterprise Modelling for Information Systems Engineering (2005, Vol. 16, No. 2)
Towards Internal Modelling of the Information Systems Application Domain (, Vol. 27, No. 1)
LOU, Der-Chyuan
An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications (2005, Vol. 16, No. 3)
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem (2006, Vol. 17, No. 3)
Efficient Mobile Conference Scheme for Wireless Communication (, Vol. 24, No. 1)
LOUPAL, Pavel
Storing XML Data - The ExDB and CellStore Way in the Context of Current Approaches (2012, Vol. 23, No. 2)
LUDÄSCHER, Bertram
Handling Termination in a Logical Language for Active Rules (1998, Vol. 9, No. 1)
LUK, Wayne
ADvaNCE - Efficient and Scalable Approximate Density-Based Clustering Based on Hashing (, Vol. 28, No. 1)
LUKAC, Niko
Sweep-Hyperplane Clustering Algorithm Using Dynamic Model (, Vol. 25, No. 4)
LUKASZEWSKI, Tomasz
Updating the Evidence in the Dempster-Shafer Theory (1999, Vol. 10, No. 1)
LUKOSEVICIUS, Arnas
The Empirical Mode Decomposition and the Discrete Wavelet Transform for Detection of Human Cataract in Ultrasound Signals (2005, Vol. 16, No. 4)
LUKOSEVICIUS, Arunas
Application of Data Mining Technique for Diagnosis of Posterior Uveal Melanoma (2002, Vol. 13, No. 4)
The Hilbert-Huang Transform for Detection of Otoacoustic Emissions and Time-Frequency Mapping (2006, Vol. 17, No. 1)
Detection of Hearing Loss in Audiological Frequencies from Transient Evoked Otoacoustic Emissions (2010, Vol. 21, No. 2)
LUKOSEVICIUS, Saulius
Analysis of Thermovisual Data of the Radio-Frequency Impact on the Myocardium Damage (2010, Vol. 21, No. 3)
LUNDAY, Brian J.
A Dynamic Network Interdiction Problem (2010, Vol. 21, No. 4)
LUO, Gangfei
A Projection Method for Multiple Attribute Group Decision Making with Intuitionistic Fuzzy Information (, Vol. 24, No. 3)
LUO, Hao
Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images (2007, Vol. 18, No. 4)
LUO, Wanming
A DFSM-Based Protocol Conformance Testing and Diagnosing Method (2011, Vol. 22, No. 3)
LUPEIKIENE, Audrone
The Role of Ontologies in Reusing Domain and Enterprise Engineering Assets (2003, Vol. 14, No. 4)
Comparing Real and Intended System Usages: A Case for Web Portal (2012, Vol. 23, No. 2)
Processing of Undesirable Business Events in Advanced Production Planning Systems (2012, Vol. 23, No. 4)
A Model of View-Based Enterprise Business Service Quality Evaluation Framework (, Vol. 24, No. 4)
Advanced Planning and Scheduling Systems: Modeling and Implementation Challenges (, Vol. 25, No. 4)
LUPO, Coralie
From Multiblock Partial Least Squares to Multiblock Redundancy Analysis. A Continuum Approach (2011, Vol. 22, No. 1)
MACIULIS, Audris
Evaluation of Ultrasound Attenuation Characteristics of Human Cataract (2003, Vol. 14, No. 4)
Ultrasound Quantitative Evaluation of Human Eye Cataract (2007, Vol. 18, No. 2)
Digital Model of Blood Circulation Analysis System (2009, Vol. 20, No. 4)
MACNORIUTE, Jurate
Designing Harmonious Proportions (1998, Vol. 9, No. 4)
MAGDALENIC, Ivan
Dynamic Generation of Web Services for Data Retrieval Using Ontology (2009, Vol. 20, No. 3)
MAGDALINOVIC, Nedeljko
Extension of Ratio System Part of MOORA Method for Solving Decision-Making Problems with Interval Data (2012, Vol. 23, No. 1)
A Multi-Attribute Decision Making Model Based on Distance from Decision Maker's Preferences (, Vol. 24, No. 1)
An Efficient and Simple Multiple Criteria Model for a Grinding Circuit Selection Based on MOORA Method (, Vol. 25, No. 1)
MAGDALINOVIC, Srdjana
An Efficient and Simple Multiple Criteria Model for a Grinding Circuit Selection Based on MOORA Method (, Vol. 25, No. 1)
MAGDISYUK, Ilona
Using the Cascade-Correlation Algorithm to Evaluate Investment Projects (2001, Vol. 12, No. 1)
MAKACKAS, Dalius
Multistage K-Means Clustering for Scenario Tree Construction (2010, Vol. 21, No. 1)
MAKNICKAS, Algirdas
Parallel DEM Software for Simulation of Granular Media (2006, Vol. 17, No. 2)
MALÝ, Jakub
eXolutio: Methodology for Design and Evolution of XML Schemas Using Conceptual Modeling (, Vol. 26, No. 3)
MALICKAS , Algimantas
Fingerprint Registration Using Composite Features Consensus (1999, Vol. 10, No. 4)
MALICKAS, Algimantas
Fingerprint Pre-Classification Using Ridge Density (2000, Vol. 11, No. 3)
Feature Matches Filtering Using Geometric Invariants in Image Registration Tasks (2001, Vol. 12, No. 3)
MALKI, Mimoun
Extraction of Object-oriented Schemas from Existing Relational Databases: a Form-driven Approach (2002, Vol. 13, No. 1)
Extracting Personalised Ontology from Data-Intensive Web Application: an HTML Forms-Based Reverse Engineering Approach (2007, Vol. 18, No. 4)
MANCA, Raimondo
HIV Evolution: A Quantification of the Effects Due to Age and to Medical Progress (2011, Vol. 22, No. 1)
MANKILA, Merja
Attracting Students through Price Bundling. A Conjoint Study of Swedish Students' Preferences of Retail Banking Services (2001, Vol. 12, No. 4)
MANSINI, Renata
On LP Solvable Models for Portfolio Selection (2003, Vol. 14, No. 1)
MANVI, Sunilkumar S.
An Agent-Based Best Effort Routing Technique for Load Balancing (2006, Vol. 17, No. 3)
MAO, Qian
A Novel Turbo Unequal Error Protection Scheme for Image Steganography (, Vol. 24, No. 4)
MARÉCHAL, François
Robust Optimization for Strategic Energy Planning (, Vol. 27, No. 3)
MARCINKEVICIUS, Albinas
Modeling of Signals in Subnanosecond Analog-to-Digital Information Converters (2004, Vol. 15, No. 1)
MARCINKEVICIUS, Virginijus
Conditions for Optimal Efficiency of Relative MDS (2007, Vol. 18, No. 2)
Efficient Data Projection for Visual Analysis of Large Data Sets Using Neural Networks (2011, Vol. 22, No. 4)
Assessment of the Optic Nerve Disc and Excavation Parameters of Interactive and Automated Parameterization Methods (2012, Vol. 23, No. 3)
MARGARIS, Athanasios
Design and Implementation of Parallel Counterpropagation Networks Using MPI (2007, Vol. 18, No. 1)
MARIC, Filip
Formal Correctness Proof for DPLL Procedure (2010, Vol. 21, No. 1)
MARIC, Miroslav
Memetic Algorithm for Solving the Multilevel Uncapacitated Facility Location Problem (, Vol. 25, No. 3)
MARINCIC, Domen
Analysis of Automatic Stress Assignment in Slovene (2009, Vol. 20, No. 1)
MARKAUSKAITE, Lina
PLSpath Modelling of Various Factors' Influence on Students' Knowledge of Informatics (2001, Vol. 12, No. 3)
MARKAUSKAS, Darius
Moving Locally Predefined Remeshing for Deep Cone Penetration FE Analysis (2004, Vol. 15, No. 4)
MAROZAS, Vaidotas
The Hilbert-Huang Transform for Detection of Otoacoustic Emissions and Time-Frequency Mapping (2006, Vol. 17, No. 1)
Detection of Hearing Loss in Audiological Frequencies from Transient Evoked Otoacoustic Emissions (2010, Vol. 21, No. 2)
MARTINCIC-IPSIC, Sanda
Acoustic Modelling for Croatian Speech Recognition and Synthesis (2008, Vol. 19, No. 2)
MARTINKENAS, Arvydas
Forecast Model of Impact of Meteorological Factors on Coronary Artery Disease Patients (2007, Vol. 18, No. 3)
MASKELIUNAS, Saulius
Ontological Engineering: Common Approaches and Visualisation Capabilities (2000, Vol. 11, No. 1)
Semi-Automatic Service Provision Based on Interaction of Data Warehouses for Evaluation of Water Resources (, Vol. 27, No. 4)
MASTOROCOSTAS, Paris A.
SCOLS-FuM: A Hybrid Fuzzy Modeling Method for Telecommunications Time-Series Forecasting (, Vol. 25, No. 2)
MATIJOSAITIS, Vaidas
Non-Invasive Intracranial Pulse Wave Monitoring (2008, Vol. 19, No. 3)
MATSKIN, Mihhail
An Agent-Based Architecture for Customer Services Management and Product Search (2002, Vol. 13, No. 4)
MATULEVICIUS, Raimundas
Search for Dynamic Equilibrium in Duel Problems by Global Optimization (2002, Vol. 13, No. 1)
MATVEJEVS, Aleksandrs
Insurance Models for Joint Life and Last Survivor Benefits (2001, Vol. 12, No. 4)
MATVEJEVS, Andrejs
Insurance Models for Joint Life and Last Survivor Benefits (2001, Vol. 12, No. 4)
MEDVEDEV, Viktor
Efficient Data Projection for Visual Analysis of Large Data Sets Using Neural Networks (2011, Vol. 22, No. 4)
Comparing Real and Intended System Usages: A Case for Web Portal (2012, Vol. 23, No. 2)
Integration of a Self-Organizing Map and a Virtual Pheromone for Real-Time Abnormal Movement Detection in Marine Traffic (, Vol. 28, No. 2)
MEENAN, Brian J.
Phase-Type Survival Trees and Mixed Distribution Survival Trees for Clustering Patients' Hospital Length of Stay (2011, Vol. 22, No. 1)
MEGHDARI, Ali
Velocity Distribution Profile for Robot Arm Motion Using Rational Frenet-Serret Curves (2006, Vol. 17, No. 1)
MEHRABANFAR, Ehsan
An Integrated Grey-Based Approach for Multi FMSs Combination Selection (, Vol. 27, No. 4)
MELICHOV, Dmitrij
On Comparison of the Estimators of the Hurst Index of the Solutions of Stochastic Differential Equations Driven by the Fractional Brownian Motion (2011, Vol. 22, No. 1)
MELKEMI, Kamal E.
A Multiresolution Approach Based on MRF and Bak-Sneppen Models for Image Segmentation (2006, Vol. 17, No. 2)
MELNIKOV, Boris
Commutation in Global Supermonoid of Free Monoids (2000, Vol. 11, No. 4)
Some Grammatical Structures of Programming Languages as Simple Bracketed Languages (2000, Vol. 11, No. 4)
A New Algorithm of Constructing the Basis Finite Automaton (2002, Vol. 13, No. 3)
MELNIKOVA, Alexandra
A New Algorithm of Constructing the Basis Finite Automaton (2002, Vol. 13, No. 3)
MELNINKAITE, Vida
Text Categorization Using Neural Networks Initialized with Decision Trees (2004, Vol. 15, No. 4)
MENDERICO, Raphael Marcos
Brazilian Olympiad in Informatics (, Vol. 1, No. )
MENG, Fanyong
An Approach to Interval-Valued Hesitant Fuzzy Multi-Attribute Decision Making with Incomplete Weight Information Based on Hybrid Shapley Operators (, Vol. 25, No. 4)
Some Generalized Interval-Valued 2-Tuple Linguistic Correlated Aggregation Operators and Their Application in Decision Making (, Vol. 27, No. 1)
An Approach to Hesitant Fuzzy Group Decision Making with Multi-Granularity Linguistic Information (, Vol. 27, No. 4)
Distance Measure and Correlation Coefficient for Linguistic Hesitant Fuzzy Sets and Their Application (, Vol. 28, No. 2)
MERISTE, Merik
Models of Attributed Automata (1998, Vol. 9, No. 1)
MERRY, Bruce
Challenges in Running a Computer Olympiad in South Africa (, Vol. 2, No. )
MESKAUSKAS, Tadas
Computational Experiment for Stability Analysis of Difference Schemes with Nonlocal Conditions (, Vol. 24, No. 2)
MESLATI, Djamel
On AspectJ and Composition Filters: A Mapping of Concepts (2009, Vol. 20, No. 4)
MEZGEC, Zdenko
Implementation of PCCD-OFDM-ASK Robust Data Transmission over GSM Speech Channel (2009, Vol. 20, No. 1)
GSM Speech Coder Indirect Identification Algorithm (2010, Vol. 21, No. 4)
MIÑAMBRES, Juan J.
Logical Formal Description of Expert Systems (2002, Vol. 13, No. 2)
MIHALKOVICH, Aleksejus
New Asymmetric Cipher of Non-Commuting Cryptography Class Based on Matrix Power Function (, Vol. 25, No. 2)
MIJANGOS, Eugenio
Solving Multistage Mixed Nonlinear Convex Stochastic Problems (, Vol. 27, No. 4)
MILANOVIC, Dragan
An Efficient and Simple Multiple Criteria Model for a Grinding Circuit Selection Based on MOORA Method (, Vol. 25, No. 1)
MILIAUSKAITE, Jolanta
A Model of View-Based Enterprise Business Service Quality Evaluation Framework (, Vol. 24, No. 4)
MILIAUSKAS, Arunas
Semi-Automatic Service Provision Based on Interaction of Data Warehouses for Evaluation of Water Resources (, Vol. 27, No. 4)
MILIAUSKAS, Rimvydas
A Serial-Parallel Panoramic Filter Bank as a Model of Frequency Decomposition of Complex Sounds in the Human Inner Ear (2011, Vol. 22, No. 2)
MILLARD, Peter
Phase-Type Survival Trees and Mixed Distribution Survival Trees for Clustering Patients' Hospital Length of Stay (2011, Vol. 22, No. 1)
MIRCHEVSKA, Violeta
Multiple-Criteria Approach to Optimisation of Multidimensional Data Models (, Vol. 26, No. 2)
MISEVICIUS, Alfonsas
An Intensive Search Algorithm for the Quadratic Assignment Problem (2000, Vol. 11, No. 2)
A Modified Simulated Annealing Algorithm for the Quadratic Assignment Problem (2003, Vol. 14, No. 4)
Experiments with Hybrid Genetic Algorithm for the Grey Pattern Problem (2006, Vol. 17, No. 2)
Testing of Hybrid Genetic Algorithms for Structured Quadratic Assignment Problems (2009, Vol. 20, No. 2)
MLÝNKOVÁ, Irena
Storing XML Data - The ExDB and CellStore Way in the Context of Current Approaches (2012, Vol. 23, No. 2)
Heuristic Methods for Inference of XML Schemas: Lessons Learned and Open Issues (, Vol. 24, No. 4)
MOCKUS, Jonas
Comparison of ARMA and Multilayer Perceptron Based Methods for Economic Time Series Forecasting (1999, Vol. 10, No. 2)
Bayesian Heuristic Approach to Scheduling (2002, Vol. 13, No. 3)
Walras Competition Model, an Example of Global Optimization (2004, Vol. 15, No. 4)
Investigation of Examples of E-Education Environment for Scientific Collaboration and Distance Graduate Studies, Part 1 (2006, Vol. 17, No. 2)
Investigation of Examples of E-education Environment for Scientific Collaboration and Distance Graduate Studies. Part 2 (2008, Vol. 19, No. 1)
A Web-Based Bimatrix Game Optimization Model of Polynomial Complexity (2009, Vol. 20, No. 1)
On the Pareto Optimality in the Context of Lipschitzian Optimization (2011, Vol. 22, No. 4)
On Multi-Start Algorithms for Optimization of High School Timetables (2012, Vol. 23, No. 3)
On Simulation of the Nash Equilibrium in the Stock Exchange Contest (2012, Vol. 23, No. 1)
On the Optimization of Investment Strategies in the Context of Virtual Financial Market by the Individual Approach to Risk (, Vol. 25, No. 2)
MOCKUS, Linas
A Bayesian Approach to Pharmaceutical Product Quality Risk Quantification (2011, Vol. 22, No. 4)
MOHAMMED, Sabah M.A.
Transcoding Aspects for Image Tele-Collaboration (2005, Vol. 16, No. 2)
MOLYTE, Alma
Quality of Quantization and Visualization of Vectors Obtained by Neural Gas and Self-Organizing Map (2011, Vol. 22, No. 1)
MONFRINI, Emmanuel
A Quadratic Loss Multi-Class SVM for which a Radius-Margin Bound Applies (2011, Vol. 22, No. 1)
MONTVILAS, Algirdas Mykolas
Pre-processing of Data for Nonlinear Mapping (2001, Vol. 12, No. 3)
Sequential Nonlinear Mapping versus Simultaneous One (2002, Vol. 13, No. 3)
Features of Sequential Nonlinear Mapping (2003, Vol. 14, No. 3)
MONTVILAS, AlgirdasMykolas
Issues for Design of Information System for Supervision and Control of Dynamic Systems (1999, Vol. 10, No. 3)
MORET, Stefano
Robust Optimization for Strategic Energy Planning (, Vol. 27, No. 3)
MORKEVICIUS, Aurelijus
SBISAF: A Service-Oriented Business and Information Systems Alignment Method (, Vol. 24, No. 2)
MORKUNAITE, Kristina
Analysis of Thermovisual Data of the Radio-Frequency Impact on the Myocardium Damage (2010, Vol. 21, No. 3)
MORTENSEN, Rasmus Kirkegaard
Cross-National Interoperability and Enterprise Architecture (2009, Vol. 20, No. 3)
MOTIEJUNAS, K\c{e}stutis
Identifying Legal and Illegal States in Synchronous Sequential Circuits Using Test Generation (2003, Vol. 14, No. 2)
The Realization-Independent Testing Based on the Black Box Fault Models (2005, Vol. 16, No. 1)
MOTIEJUNAS, Kestutis
Functional Test Generation Based on Combined Random and Deterministic Search Methods (2007, Vol. 18, No. 1)
MOUKRIM, Aziz
Parallel Implementation of a Generalized Conjugate Gradient Algorithm (1998, Vol. 9, No. 4)
MROZ, Tomasz
Application of Multi-Criterion Decision Aid Method in Designing Heating Systems for Museum Buildings (2001, Vol. 12, No. 1)
MUNRO, Ian
New Task Types at the Canadian Computing Competition (, Vol. 1, No. )
MUSATOVA, Elena
On Solution of One Equation with d.c. Function (, Vol. 27, No. 2)
MUSCALAGIU, Ionel
Improving the Performances of Asynchronous Algorithms by Combining the Nogood Processors with the Nogood Learning Techniques (2006, Vol. 17, No. 1)
Martínez ORTIGOSA, Pilar
Multimodal Evolutionary Algorithm for Multidimensional Scaling with City-Block Distances (2012, Vol. 23, No. 4)
McCLEAN, Sally
Phase-Type Survival Trees and Mixed Distribution Survival Trees for Clustering Patients' Hospital Length of Stay (2011, Vol. 22, No. 1)
Návrat, Pavol
Use of Program Schemata in Lisp Programming: an Evaluation of its Impact on Learning (1998, Vol. 9, No. 1)
NA'MNEH, Rami Al
Efficient Adaptive Algorithms for Transposing Small and Large Matrices on Symmetric Multiprocessors (2006, Vol. 17, No. 4)
NADABAN, Sorin
Atomic Decompositions of Fuzzy Normed Linear Spaces for Wavelet Applications (, Vol. 25, No. 4)
Some Properties and Applications of Fuzzy Quasi-Pseudo-Metric Spaces (, Vol. 27, No. 1)
NAHAR, Tej Singh
On Characterization of Certain Wright's Generalized Hypergeometric Functions Involving Certain Subclasses of Analytic Functions (1999, Vol. 10, No. 2)
NAHAR, TejSingh
Certain Subclasses of Analytic \mathversionbold\mathit {p}-valent Functions with Negative Coefficients (1998, Vol. 9, No. 4)
NAIK, Ganesh R.
Measure of Quality of Source Separation for Sub- and Super-Gaussian Audio Mixtures (2012, Vol. 23, No. 4)
NARUSEVICIUS, Laurynas
Comparing Dissimilarity Measures: A Case of Banking Ratios (, Vol. 27, No. 3)
NAVAKAS, Robertas
A Normalized Parameter for Similarity/Dissimilarity Characterization of Sequences (, Vol. 26, No. 2)
NAVAKAUSKAS, Dalius
New Implementation Scheme for the Restoration of Voiced Speech Signals (2003, Vol. 14, No. 3)
Quick Training Algorithm for Extra Reduced Size Lattice-Ladder Multilayer Perceptrons (2003, Vol. 14, No. 2)
Discrimination of Homographs Distorted by a Lengthy Impulsive Noise (2006, Vol. 17, No. 2)
Treatment of Over-Saturated Protein Spots in Two-Dimensional Electrophoresis Gel Images (2010, Vol. 21, No. 3)
NECASKÝ, Martin
Storing XML Data - The ExDB and CellStore Way in the Context of Current Approaches (2012, Vol. 23, No. 2)
Heuristic Methods for Inference of XML Schemas: Lessons Learned and Open Issues (, Vol. 24, No. 4)
eXolutio: Methodology for Design and Evolution of XML Schemas Using Conceptual Modeling (, Vol. 26, No. 3)
NECHITA, Elena
Recognition Algorithm for Diamond-Free Graphs (2007, Vol. 18, No. 3)
NEMURA, Antanas
Multi-Criterion Assessment of Preferences for Communication Alternatives of Wind Power Park Information System (2008, Vol. 19, No. 1)
NEMURAITE, Lina
Business Object Modeling Framework for Distributed Enterprise (1999, Vol. 10, No. 2)
NESMACHNOW, Sergio
Metaheuristics for the Virtual Machine Mapping Problem in Clouds (, Vol. 26, No. 1)
NEUBAUER, Jirí
Change Point Detection by Sparse Parameter Estimation (2011, Vol. 22, No. 1)
NGUYEN, Thai-Son
A Reversible Data Hiding Scheme for SMVQ Indices (, Vol. 25, No. 4)
NIKOLAEV, Alexey
Improved Infra-Chromatic Bound for Exact Maximum Clique Search (, Vol. 27, No. 2)
NIKOLIC, Branka
Comparison of H-Logical Norm with some t-Norms (2003, Vol. 14, No. 4)
NIKOLIC, Jelena
An Effective Method for Initialization of Lloyd-Max's Algorithm of Optimal Scalar Quantization for Laplacian Source (2007, Vol. 18, No. 2)
Lloyd-Max's Algorithm Implementation in Speech Coding Algorithm Based on Forward Adaptive Technique (2008, Vol. 19, No. 2)
NISTAL, Raul
On the Equilibrium Points, Boundedness and Positivity of a Sveirs Epidemic Model under Constant Regular Constrained Vaccination (2011, Vol. 22, No. 3)
NONCHEVA, Veska
Agent Belief: Presentation, Propagation, and Optimization (1999, Vol. 10, No. 4)
NORDBY, Eivind J.
Semantic Integrity of Switching Sections with Contracts: Discussion of a Case Study (1999, Vol. 10, No. 2)
NORESE, Maria Franca
GIS and Multicriteria Analysis to Evaluate and Map Erosion and Landslide Hazards (2001, Vol. 12, No. 1)
NORGELA, Stanislovas
Applications of Finite Linear Temporal Logic to Piecewise Linear Aggregates (2012, Vol. 23, No. 3)
NORKEVICIUS, Giedrius
Modeling Phone Duration of Lithuanian by Classification and Regression Trees, using Very Large Speech Corpus (2008, Vol. 19, No. 2)
NORKIN, Vladimir
On Stochastic Optimization and Statistical Learning in Reproducing Kernel Hilbert Spaces by Support Vector Machines (SVM) (2009, Vol. 20, No. 2)
O'HAGAN, Thomas
Event-Based Awareness Services for P2P Groupware Systems (, Vol. 26, No. 1)
ODA, Tetsuya
Performance Evaluation of WMN-GA System in Node Placement in WMNs for Different Distributions of Mesh Clients and Different Selection and Mutation Operators (, Vol. 27, No. 3)
OGRYCZAK, Wlodzimierz
On LP Solvable Models for Portfolio Selection (2003, Vol. 14, No. 1)
OHSAWA, Yutaka
Safe-Region Generation Methods for Continuous Trip Route Planning Queries (, Vol. 28, No. 1)
OLFAT, Laya
Multi-Criteria Inventory Classification Using a New Method of Evaluation Based on Distance from Average Solution (EDAS) (, Vol. 26, No. 3)
OPMANIS, Martins
Root Cause Analysis of Large Scale Application Testing Results (, Vol. 27, No. 4)
OPMANIS, Rudolfs
Root Cause Analysis of Large Scale Application Testing Results (, Vol. 27, No. 4)
OSIPOV, Pavel
Advantages of Deferred Approach for Time-Critical Tasks (, Vol. 25, No. 3)
OZTURK, Celal
Color Image Quantization: A Short Review and an Application with Artificial Bee Colony Algorithm (, Vol. 25, No. 3)
PÉRES, François
Evaluation Model in Decision Analysis: Bipolar Approach (2012, Vol. 23, No. 3)
PÉREZ-SÁNCHEZ, Beatriz
Adaptive Inverse Control Using an Online Learning Algorithm for Neural Networks (, Vol. 25, No. 3)
PAJARSKAITE, Giedre
Designing HMM-Based Part-of-Speech Tagger for Lithuanian Language (2004, Vol. 15, No. 2)
PAKSTAS, Algirdas
Mobile Code Alternatives for Secure Environments (2000, Vol. 11, No. 1)
PALACIOS-MARQUÉS, Daniel
A New Model for Interactive Group Decision Making with Intuitionistic Fuzzy Preference Relations (, Vol. 27, No. 4)
PALIULIONIS, Viktoras
Intelligent GIS: Architectural Issues and Implementation Methods (2000, Vol. 11, No. 3)
PALM, Guenther
Learning Inductive Riemannian Manifold in Abstract Form by Modeling Embedded Dynamical System (, Vol. 25, No. 3)
PALUBECKIS, Gintaras
An Algorithm for Construction of Test Cases for the Quadratic Assignment Problem (2000, Vol. 11, No. 3)
Iterated Tabu Search for the Unconstrained Binary Quadratic Optimization Problem (2006, Vol. 17, No. 2)
PAN, Jeng-Shyang
Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images (2007, Vol. 18, No. 4)
PAN, W. David
Efficient Adaptive Algorithms for Transposing Small and Large Matrices on Symmetric Multiprocessors (2006, Vol. 17, No. 4)
PAPADAKIS, Stelios E.
A Genetic Based Approach to the Type I Structure Identification Problem (2005, Vol. 16, No. 3)
PAPADOPOULOS, Apostolos
Assessment of Classification Models with Small Amounts of Data (2007, Vol. 18, No. 3)
PAPRZYCKI, Marcin
ORVPF - the Model and its DNC Implementation (2005, Vol. 16, No. 4)
PARDALOS, Panos M.
D-Optimal Designs: A Mathematical Programming Approach using Cyclotomic Cosets (2011, Vol. 22, No. 4)
A Novel Trust Inference Framework for Web-Based Scenarios Harnessed by Social Network and Web of Trust - a Heuristic Approach (, Vol. 27, No. 2)
Dynamic-Programming-Based Inequalities for the Unbounded Integer Knapsack Problem (, Vol. 27, No. 2)
Improved Infra-Chromatic Bound for Exact Maximum Clique Search (, Vol. 27, No. 2)
PARK, Haeryong
A Method of Finding Bad Signatures in an RSA-Type Batch Verification (2011, Vol. 22, No. 2)
PASZKOWSKI, Slawomir
Cross-National Interoperability and Enterprise Architecture (2009, Vol. 20, No. 3)
PATIAS, Petros G.
3-D Computer Modeling with Intra-Component, Geometric, Quality and Topological Constraints (2003, Vol. 14, No. 3)
PAULAUSKAITE-TARASEVICIENE, Agne
The Gaze Tracking System with Natural Head Motion Compensation (2012, Vol. 23, No. 1)
PAULIKAS, Sarnas
Discrimination of Homographs Distorted by a Lengthy Impulsive Noise (2006, Vol. 17, No. 2)
PAULIKAS, Sarunas
New Implementation Scheme for the Restoration of Voiced Speech Signals (2003, Vol. 14, No. 3)
PAUNKSNIENE, Marija
Ultrasound Quantitative Evaluation of Human Eye Cataract (2007, Vol. 18, No. 2)
PAUNKSNIENE, Marija-Liucija
Evaluation of Ultrasound Attenuation Characteristics of Human Cataract (2003, Vol. 14, No. 4)
PAUNKSNIS, Alvydas
Application of Data Mining Technique for Diagnosis of Posterior Uveal Melanoma (2002, Vol. 13, No. 4)
Evaluation of Ultrasound Attenuation Characteristics of Human Cataract (2003, Vol. 14, No. 4)
The Empirical Mode Decomposition and the Discrete Wavelet Transform for Detection of Human Cataract in Ultrasound Signals (2005, Vol. 16, No. 4)
Ultrasound Quantitative Evaluation of Human Eye Cataract (2007, Vol. 18, No. 2)
Automated Optic Nerve Disc Parameterization (2008, Vol. 19, No. 3)
Digital Model of Blood Circulation Analysis System (2009, Vol. 20, No. 4)
Assessment of the Optic Nerve Disc and Excavation Parameters of Interactive and Automated Parameterization Methods (2012, Vol. 23, No. 3)
PAVESIC, Nikola
Gabor-Based Kernel Partial-Least-Squares Discrimination Features for Face Recognition (2009, Vol. 20, No. 1)
PAVLIC, Luka
An Entropy-Based Algorithm for Proposing a Suitable Design Pattern (, Vol. 27, No. 4)
PCHELKIN, Arthur
Efficient Exploration in Reinforcement Learning Based on Utile Suffix Memory (2003, Vol. 14, No. 2)
PEDERSEN, Jøran
An Agent-Based Architecture for Customer Services Management and Product Search (2002, Vol. 13, No. 4)
PEI, Jun
A Novel Trust Inference Framework for Web-Based Scenarios Harnessed by Social Network and Web of Trust - a Heuristic Approach (, Vol. 27, No. 2)
PELDSCHUS, Friedel
Development of Software for Multiple Criteria Evaluation (2003, Vol. 14, No. 2)
Fuzzy Matrix Games Multi-Criteria Model for Decision-Making in Engineering (2005, Vol. 16, No. 1)
PELEGRÍN, Blas
Solution of Discrete Competitive Facility Location Problem for Firm Expansion (, Vol. 27, No. 2)
PENG, Bo
Induced Uncertain Pure Linguistic Hybrid Averaging Aggregation Operator and Its Application to Group Decision Making (, Vol. 26, No. 3)
PENG, Xinguang
Trust-Based Scheduling Strategy for Cloud Workflow Applications (, Vol. 26, No. 1)
PENG, Yi
Minimum Mean Square Error Estimators for the Exponential SSALT Model (, Vol. 27, No. 4)
PENJAM, Jaan
Models of Attributed Automata (1998, Vol. 9, No. 1)
PERIC, Zoran
An Effective Method for Initialization of Lloyd-Max's Algorithm of Optimal Scalar Quantization for Laplacian Source (2007, Vol. 18, No. 2)
Lloyd-Max's Algorithm Implementation in Speech Coding Algorithm Based on Forward Adaptive Technique (2008, Vol. 19, No. 2)
PERIC, Zoran H.
Simple Compression Algorithm for Memoryless Laplacian Source Based on the Optimal Companding Technique (2009, Vol. 20, No. 1)
Forward Adaptation of Novel Semilogarithmic Quantizer and Lossless Coder for Speech Signals Compression (2010, Vol. 21, No. 3)
Coding Algorithm for Grayscale Images Based on Piecewise Uniform Quantizers (2012, Vol. 23, No. 1)
New Coding Algorithm Based on Variable-Length Codewords for Piecewise Uniform Quantizers (, Vol. 27, No. 3)
PERLIBAKAS, Vytautas
Face Recognition Using Principal Component Analysis and Wavelet Packet Decomposition (2004, Vol. 15, No. 2)
PETKOVIC, Dalibor
Sensorless Estimation of Wind Speed by Soft Computing Methodologies: A Comparative Study (, Vol. 26, No. 3)
PETKOVIC, Marko D.
Simple Compression Algorithm for Memoryless Laplacian Source Based on the Optimal Companding Technique (2009, Vol. 20, No. 1)
PETKUS, Tomas
Application of Computer Network to Solve the Complex Applied Multiple Criteria Optimization Problems (2001, Vol. 12, No. 1)
PETKUS, Vytautas
Non-Invasive Intracranial Pulse Wave Monitoring (2008, Vol. 19, No. 3)
PETROVSKY, Alexey
Method for Approximation of Diverse Individual Sorting Rules (2001, Vol. 12, No. 1)
PIELE, Don
USA Computing Olympiad (USACO) (, Vol. 1, No. )
PINTEA, Camelia-M.
Soft Computing Approaches on the Bandwidth Problem (, Vol. 24, No. 2)
A Unifying Survey of Agent-Based Approaches for Equality-Generalized Traveling Salesman Problem (, Vol. 26, No. 3)
PLIKUSAS, Aleksandras
Estimation of a Ratio in the Finite Population (2005, Vol. 16, No. 3)
PLIKYNAS, Darius
Research of Neural Network Methods for Compound Stock Exchange Indices Analysis (2002, Vol. 13, No. 4)
Semi-Automatic Bilingual Corpus Creation with Zero Entropy Alignments (2011, Vol. 22, No. 2)
PLIUSKEVICIENE, Aida
Decision Procedure for Temporal Logic of Belief and Actions (2004, Vol. 15, No. 3)
Termination of Derivations in a Fragment of Transitive Distributed Knowledge Logic (2008, Vol. 19, No. 4)
PLIUSKEVICIUS, Regimantas
Decision Procedure for Temporal Logic of Belief and Actions (2004, Vol. 15, No. 3)
Termination of Derivations in a Fragment of Transitive Distributed Knowledge Logic (2008, Vol. 19, No. 4)
PLUME, Janis
Data Conversion Development: A Tool-Supported Approach (1999, Vol. 10, No. 1)
POBERII, Maria
Complexity and Approximability of Committee Polyhedral Separability of Sets in General Position (2009, Vol. 20, No. 2)
PODGORELEC, Vili
An Entropy-Based Algorithm for Proposing a Suitable Design Pattern (, Vol. 27, No. 4)
PODLIPSKYTE, Aurelija
On Multimodality of the SSTRESS Criterion for Metric Multidimensional Scaling (2003, Vol. 14, No. 1)
POKORNÝ, Jaroslav
XML in Enterprise Systems (2009, Vol. 20, No. 3)
POPESCU, Constantin
An Improvement of the Ateniese's Verifiable Encryption Protocol (2005, Vol. 16, No. 1)
An Electronic Cash System Based on Group Blind Signatures (2006, Vol. 17, No. 4)
An Anonymous Mobile Payment System Based on Bilinear Pairings (2009, Vol. 20, No. 4)
A Secure E-Cash Transfer System based on the Elliptic Curve Discrete Logarithm Problem (2011, Vol. 22, No. 3)
POPOVIC, Gabrijela
An Efficient and Simple Multiple Criteria Model for a Grinding Circuit Selection Based on MOORA Method (, Vol. 25, No. 1)
POULOVASSILIS, Alex
Event-Based Awareness Services for P2P Groupware Systems (, Vol. 26, No. 1)
POVILIAUSKAS, Darius
Modeling of Signals in Subnanosecond Analog-to-Digital Information Converters (2004, Vol. 15, No. 1)
PRAGARAUSKAITE, Julija
Markov Models in the Analysis of Frequent Patterns in Financial Data (, Vol. 24, No. 1)
PRANEVICIUS, Henrikas
Creation of ESTELLE/Ag Specifications Using Knowledge Bases (2003, Vol. 14, No. 1)
Multistage K-Means Clustering for Scenario Tree Construction (2010, Vol. 21, No. 1)
Applications of Finite Linear Temporal Logic to Piecewise Linear Aggregates (2012, Vol. 23, No. 3)
PRASCEVIC, Momir R.
Forward Adaptation of Novel Semilogarithmic Quantizer and Lossless Coder for Speech Signals Compression (2010, Vol. 21, No. 3)
PUPEIKIENE, Lina
On Multi-Start Algorithms for Optimization of High School Timetables (2012, Vol. 23, No. 3)
PUPEIKIS, Rimantas
State Estimation of Dynamic Systems in the Presence of Time-Varying Outliers in Observations (1998, Vol. 9, No. 3)
Recursive Optimization of State Estimation of Dynamic Processes in the Presence of Patchy Outliers in Observations (1999, Vol. 10, No. 3)
Closed-loop Robust Identification Using the Direct Approach (2000, Vol. 11, No. 2)
Closed-loop Robust Identification Using the Indirect Approach (2000, Vol. 11, No. 3)
On System Identification Using the Closed-Loop Observations (2001, Vol. 12, No. 3)
On the Optimization of an Adaptive State Estimation of Dynamic Systems in the Presence of Time-varying Outliers (2002, Vol. 13, No. 1)
On the Identification of Wiener Systems Having Saturation-like Functions with Positive Slopes (2005, Vol. 16, No. 1)
On the Identification of Hammerstein Systems Having Saturation-like Functions with Positive Slopes (2006, Vol. 17, No. 1)
On the Processing of Decimated Signals (2008, Vol. 19, No. 4)
On Recursive Calculation of M- and GM-Estimates by Direct Identification in LQG Control Systems (2009, Vol. 20, No. 1)
On a Time-Varying Parameter Adaptive Self-Organizing System in the Presence of Large Outliers in Observations (2010, Vol. 21, No. 1)
A Forward-Backward Approach for Instantaneous Frequency Estimation of Frequency Modulated Signals in Noisy Environment (2012, Vol. 23, No. 1)
On Intelligent Extraction of an Internal Signal in a Wiener System Consisting of a Linear Block Followed by Hard-Nonlinearity (, Vol. 24, No. 1)
Missing Data Restoration Algorithm (, Vol. 25, No. 2)
PUZIENE, Viktorija
Digital Model of Blood Circulation Analysis System (2009, Vol. 20, No. 4)
PYZ, Grazina
Modelling of Lithuanian Speech Diphthongs (2011, Vol. 22, No. 3)
Developing Models of Lithuanian Speech Vowels and Semivowels (, Vol. 25, No. 1)
QANNARI, El Mostafa
From Multiblock Partial Least Squares to Multiblock Redundancy Analysis. A Continuum Approach (2011, Vol. 22, No. 1)
QIAN, Haifeng
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers (2005, Vol. 16, No. 2)
Adaptively Secure Threshold Signature Scheme in the Standard Model (2009, Vol. 20, No. 4)
Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model (2012, Vol. 23, No. 3)
QIAN, Junyan
Formal Verification for C Program (2007, Vol. 18, No. 2)
QIN, Chuan
A Novel Turbo Unequal Error Protection Scheme for Image Steganography (, Vol. 24, No. 4)
QIN, Yong
Holo-Entropy Based Categorical Data Hierarchical Clustering (, Vol. 28, No. 2)
QIN, Zhiguang
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography (2010, Vol. 21, No. 2)
QUINTIÁN, Héctor
A Hybrid Regression System Based on Local Models for Solar Energy Prediction (, Vol. 25, No. 2)
R. NIKOLIC, Jelena
Design of Fixed and Adaptive Companding Quantizer with Variable-Length Codeword for Memoryless Gaussian Source (, Vol. 24, No. 1)
RACHEV, Svetlozar
New Tendencies in Rating SMEs with Respect to Basel II (2001, Vol. 12, No. 4)
RACKAUSKAS, Alfredas
Comparing Dissimilarity Measures: A Case of Banking Ratios (, Vol. 27, No. 3)
RADAVICIUS, Marijus
Comparison of Poisson Mixture Models for Count Data Clusterization (2002, Vol. 13, No. 2)
RADOSEVIC, Danijel
Dynamic Generation of Web Services for Data Retrieval Using Ontology (2009, Vol. 20, No. 3)
RADOSZEWSKI, Jakub
A Proposal for a Task Preparation Process (, Vol. 2, No. )
RAGAUSKAS, Arminas
Non-Invasive Intracranial Pulse Wave Monitoring (2008, Vol. 19, No. 3)
RAHIMI, Shahram
ORVPF - the Model and its DNC Implementation (2005, Vol. 16, No. 4)
RAHMATI, Mohamad
Learning Inductive Riemannian Manifold in Abstract Form by Modeling Embedded Dynamical System (, Vol. 25, No. 3)
RAHMOUNE, Abdellatif
Evolving in Real Time a Neural Net Controller of Robot-Arm: Track and Evolve (2004, Vol. 15, No. 1)
RAHMOUNI, Mustapha Kamal
Extracting Personalised Ontology from Data-Intensive Web Application: an HTML Forms-Based Reverse Engineering Approach (2007, Vol. 18, No. 4)
RAHMOUNI, Mustapha Kamel
Extraction of Object-oriented Schemas from Existing Relational Databases: a Form-driven Approach (2002, Vol. 13, No. 1)
RAINA, Ravinder Krishna
On Characterization of Certain Wright's Generalized Hypergeometric Functions Involving Certain Subclasses of Analytic Functions (1999, Vol. 10, No. 2)
Certain Integral Means Inequalities Involving Fractional Calculus Operators of Analytic Functions (2003, Vol. 14, No. 2)
RAINA, RavinderKrishna
Certain Subclasses of Analytic \mathversionbold\mathit {p}-valent Functions with Negative Coefficients (1998, Vol. 9, No. 4)
RAISUTIS, Renaldas
Non-Invasive Intracranial Pulse Wave Monitoring (2008, Vol. 19, No. 3)
RAJESH, Reghunadhan
Variable Gain Takagi-Sugeno Fuzzy Logic Controllers (2006, Vol. 17, No. 3)
RAJKOVIC, Vladislav
Multiple-Criteria Approach to Optimisation of Multidimensional Data Models (, Vol. 26, No. 2)
RAMIREZ-CORTES, Juan-Manuel
A Biometric System Based on Neural Networks and SVM Using Morphological Feature Extraction from Hand-Shape Images (2011, Vol. 22, No. 2)
RAMOS, Francisco
A Multiresolution Approach to Render 3D Models (, Vol. 24, No. 4)
RASHIDZADEH, Mohammad ali
Using Analytic Network Process in a Group Decision-Making for Supplier Selection (2012, Vol. 23, No. 4)
RASKINIENE, Danute
Building Medium-Vocabulary Isolated-Word Lithuanian HMM Speech Recognition System (2003, Vol. 14, No. 1)
RASKINIS, Gailius
Preprocessing of Folk Song Acoustic Records for Transcription into Music Scores (1998, Vol. 9, No. 3)
Building Medium-Vocabulary Isolated-Word Lithuanian HMM Speech Recognition System (2003, Vol. 14, No. 1)
Designing HMM-Based Part-of-Speech Tagger for Lithuanian Language (2004, Vol. 15, No. 2)
Statistical Language Models of Lithuanian Based on Word Clustering and Morphological Decomposition (2004, Vol. 15, No. 4)
Cache-based Statistical Language Models of English and Highly Inflected Lithuanian (2006, Vol. 17, No. 1)
Modeling Phone Duration of Lithuanian by Classification and Regression Trees, using Very Large Speech Corpus (2008, Vol. 19, No. 2)
Corpus-Based Hidden Markov Modelling of the Fundamental Frequency of Lithuanian (, Vol. 27, No. 3)
RAUDONIS, Vidas
The Gaze Tracking System with Natural Head Motion Compensation (2012, Vol. 23, No. 1)
RAUDYS, Aistis
Comparison of ARMA and Multilayer Perceptron Based Methods for Economic Time Series Forecasting (1999, Vol. 10, No. 2)
RAUDYS, Sarunas
Generalization Error of Randomized Linear Zero Empirical Error Classifier: Simple Asymptotics for Centered Data Case (2000, Vol. 11, No. 4)
RAULYNAITIS, Andrius
Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level (2007, Vol. 18, No. 1)
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem (2010, Vol. 21, No. 2)
RAUSCHMAYER, Felix
Philosophical Aspects of Incommensurability and Incomparability (2001, Vol. 12, No. 1)
RAVANI, Reza
Velocity Distribution Profile for Robot Arm Motion Using Rational Frenet-Serret Curves (2006, Vol. 17, No. 1)
RAZAVI HAJIAGHA, Seyed Hossein
Decision Making with Unknown Data: Development of ELECTRE Method Based on Black Numbers (, Vol. 25, No. 1)
RAZAVI, Seyed Hossein
Application of Grey TOPSIS in Preference Ordering of Action Plans in Balanced Scorecard and Strategy Map (, Vol. 24, No. 4)
REISZ , Robert D.
Decomposition Theorems for Probabilistic Automata over Infinite Objects (1999, Vol. 10, No. 4)
REKLAITIENE, Regina
Application of Survival Models for the Population Studies (2003, Vol. 14, No. 4)
REKLAITIS, Gintaras
A Bayesian Approach to Pharmaceutical Product Quality Risk Quantification (2011, Vol. 22, No. 4)
REMEIKIS, Nerijus
Text Categorization Using Neural Networks Initialized with Decision Trees (2004, Vol. 15, No. 4)
REN, Yanli
New Fuzzy Identity-Based Encryption in the Standard Model (2010, Vol. 21, No. 3)
REPOLUSK, Polona
An Entropy-Based Algorithm for Proposing a Suitable Design Pattern (, Vol. 27, No. 4)
RIBARIC, Slobodan
A Novel Biometric Personal Verification System Based on the Combination of Palmprints and Faces (2008, Vol. 19, No. 1)
Acoustic Modelling for Croatian Speech Recognition and Synthesis (2008, Vol. 19, No. 2)
RIBEIRO, Pedro
Increasing the Appeal of Programming Contests with Tasks Involving Graphical User Interfaces and Computer Graphics (, Vol. 1, No. )
RICHTA, Karel
Storing XML Data - The ExDB and CellStore Way in the Context of Current Approaches (2012, Vol. 23, No. 2)
RIPOLLES, Oscar
A Multiresolution Approach to Render 3D Models (, Vol. 24, No. 4)
RODRÍGUEZ, M. Andrea
A Model for Multigranular Data and Its Integrity (, Vol. 28, No. 1)
ROSENBAUM, René
Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure (2005, Vol. 16, No. 1)
ROUMELIOTIS, Manos
Design and Implementation of Parallel Counterpropagation Networks Using MPI (2007, Vol. 18, No. 1)
ROZHKOVA, Olga
Likelihood Ratio Determination for Stochastic Processes Recognition Problem with Respect to the Set of Continuous and Discrete Memory Observations (2001, Vol. 12, No. 2)
ROZHKOVA, Svetlana
Likelihood Ratio Determination for Stochastic Processes Recognition Problem with Respect to the Set of Continuous and Discrete Memory Observations (2001, Vol. 12, No. 2)
Information Amount Determination for Joint Problem of Filtering and Generalized Extrapolation of Stochastic Processes with Respect to the Set of Continuous and Discrete Memory Observations (2003, Vol. 14, No. 3)
About Structure of Shannon Information Amount for Joint Filtering and Extrapolation Problem by Continuous-Discrete Memory Observations (2004, Vol. 15, No. 2)
ROZMAN, Ivan
An Algorithm for Protecting Knowledge Discovery Data (2003, Vol. 14, No. 3)
The Impact of Details in the Class Diagram on Software Size Estimation (2005, Vol. 16, No. 2)
Assessment of Classification Models with Small Amounts of Data (2007, Vol. 18, No. 3)
Best-Fit Learning Curve Model for the C4.5 Algorithm (, Vol. 25, No. 3)
RUAN, Qiuqi
A Joint-Diffused Inpainting Model for Underexposure Image Preserving the Linear Geometric Structure (2009, Vol. 20, No. 1)
Exemplar-Based Image Completion Model Employing PDE Corrections (2010, Vol. 21, No. 2)
RUBLIAUSKAS, Dalius
Testing of Hybrid Genetic Algorithms for Structured Quadratic Assignment Problems (2009, Vol. 20, No. 2)
RUDOLPH, Günter
Linear Time Estimators for Assessing Uniformity of Point Samples in Hypercubes (, Vol. 27, No. 2)
RUDZKIENE, Vitalija
Data Analysis Strategy for Revealing Multivariate Structures in Social-Economic Data Warehouses (2003, Vol. 14, No. 4)
RUDZKIS, Rimantas
On Local Bandwidth Selection for Density Estimation (1998, Vol. 9, No. 4)
Multivariate Data Clustering for the Gaussian Mixture Model (2005, Vol. 16, No. 1)
Statistical Classification of Scientific Publications (2010, Vol. 21, No. 4)
Goodness of Fit Tests Based on Kernel Density Estimators (, Vol. 24, No. 3)
RUIZ, María del Carmen
A New Randomness Test for Bit Sequences (, Vol. 24, No. 3)
RUSECKAITE, Rasa
Automated Epilepsy Prediction by Means of Visual Perception Testing and Digital EEG Processing Data (2001, Vol. 12, No. 3)
RUTSCHMANN, Peter
Parallel FEM Software for CFD Problems (2004, Vol. 15, No. 3)
RYU, Eun-Kyung
Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme (2005, Vol. 16, No. 2)
SÖRNMO, Leif
The Hilbert-Huang Transform for Detection of Otoacoustic Emissions and Time-Frequency Mapping (2006, Vol. 17, No. 1)
Detection of Hearing Loss in Audiological Frequencies from Transient Evoked Otoacoustic Emissions (2010, Vol. 21, No. 2)
S. SAVIC, Milan
Coding Algorithm for Grayscale Images Based on Piecewise Uniform Quantizers (2012, Vol. 23, No. 1)
SABERI, Narges
Application of Grey TOPSIS in Preference Ordering of Action Plans in Balanced Scorecard and Strategy Map (, Vol. 24, No. 4)
SABLINSKAS, Ramunas
Numerical Integration on Distributed-Memory Parallel Systems (1998, Vol. 9, No. 2)
Hyper-Rectangle Selection and Distribution Algorithm for Parallel Adaptive Numerical Integration (1999, Vol. 10, No. 2)
SADEGHI, Mohammadreza
Using Analytic Network Process in a Group Decision-Making for Supplier Selection (2012, Vol. 23, No. 4)
Application of Grey TOPSIS in Preference Ordering of Action Plans in Balanced Scorecard and Strategy Map (, Vol. 24, No. 4)
SAFRONOVA, Irina
About Structure of Shannon Information Amount for Joint Filtering and Extrapolation Problem by Continuous-Discrete Memory Observations (2004, Vol. 15, No. 2)
SAKALAUSKAITE , Jurate
Sequent Calculi for Branching Time Temporal Logics of Knowledge and Belief (2007, Vol. 18, No. 1)
SAKALAUSKAITE, Jurate
Sequent Calculi for Temporal Logics of Common Knowledge and Belief (2006, Vol. 17, No. 1)
Decidability of Logic of Correlated Knowledge (, Vol. 25, No. 4)
SAKALAUSKAS, Eligijus
New Digital Signature Scheme in Gaussian Monoid (2004, Vol. 15, No. 2)
One Digital Signature Scheme in Semimodule over Semiring (2005, Vol. 16, No. 3)
Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level (2007, Vol. 18, No. 1)
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem (2010, Vol. 21, No. 2)
New Asymmetric Cipher of Non-Commuting Cryptography Class Based on Matrix Power Function (, Vol. 25, No. 2)
SAKALAUSKAS, Leonidas
Nonlinear Stochastic Optimization by the Monte-Carlo Method (2000, Vol. 11, No. 4)
Application of the Monte-Carlo Method to Nonlinear Stochastic Optimization with Linear Constraints (2004, Vol. 15, No. 2)
An Optimization of System for Automatic Recognition of Ischemic Stroke Areas in Computed Tomography Images (2007, Vol. 18, No. 4)
Optimization and Knowledge-Based Technologies (2009, Vol. 20, No. 2)
Large-Scale Data Analysis Using Heuristic Methods (2011, Vol. 22, No. 1)
Locally Homogeneous and Isotropic Gaussian Fields in Kriging (, Vol. 24, No. 2)
Nonlinear Stochastic Programming Involving CVaR in the Objective and Constraints (, Vol. 26, No. 4)
SAKALYTE, Gintare
Analysis of Thermovisual Data of the Radio-Frequency Impact on the Myocardium Damage (2010, Vol. 21, No. 3)
SAKAMOTO, Shinji
Performance Evaluation of WMN-GA System in Node Placement in WMNs for Different Distributions of Mesh Clients and Different Selection and Mutation Operators (, Vol. 27, No. 3)
SALMERÓN, Jose M.G.
On Bisecting the Unit Simplex Using Various Distance Norms (, Vol. 27, No. 2)
SALNA, Bernardas
The Use of Group Delay Features of Linear Prediction Model for Speaker Recognition (2010, Vol. 21, No. 1)
SALTENIS, Vydunas
Global Sensitivity Analysis of Infection Spread, Radar Search and Multiple Criteria Decision Models (1998, Vol. 9, No. 2)
Simulation of Wet Film Evolution and the Euclidean Steiner Problem (1999, Vol. 10, No. 4)
Investigation of Dead-Point Situations in the Simulation of Wet Film Evolution (2000, Vol. 11, No. 4)
Quantitative Forecasting and Assessment Models in the State Education System (2002, Vol. 13, No. 4)
Outlier Detection Based on the Distribution of Distances between Data Points (2004, Vol. 15, No. 3)
Automated Optic Nerve Disc Parameterization (2008, Vol. 19, No. 3)
SALTYTE, Jurate
Comparison of ML and OLS Estimators in Discriminant Analysis of Spatially Correlated Observations (2002, Vol. 13, No. 2)
SAN SEGUNDO, Pablo
Improved Infra-Chromatic Bound for Exact Maximum Clique Search (, Vol. 27, No. 2)
SAPAGOVAS, Mifodijus
The Solution of Two-Dimensional Neutron Diffusion Equation with Delayed Neutrons (2001, Vol. 12, No. 2)
Reliability of One Dimensional Model of Moisture Diffusion in Wood ^* (2002, Vol. 13, No. 4)
The Extension of the Van Der Pauw Method to Anisotropic Media (2007, Vol. 18, No. 2)
Computational Experiment for Stability Analysis of Difference Schemes with Nonlocal Conditions (, Vol. 24, No. 2)
SARAÇ, Tugba
The Performance of the Modified Subgradient Algorithm on Solving the 0-1 Quadratic Knapsack Problem (2009, Vol. 20, No. 2)
SAUDARGIENE, Ausra
Structurization of the Covariance Matrix by Process Type and Block-Diagonal Models in the Classifier Design (1999, Vol. 10, No. 2)
SAVIC, Dusan
Extended Software Architecture Based on Security Patterns (2010, Vol. 21, No. 2)
SAVIC, Milan S.
Forward Adaptation of Novel Semilogarithmic Quantizer and Lossless Coder for Speech Signals Compression (2010, Vol. 21, No. 3)
SAXENA, Ashutosh
An Efficient Proxy Signature Scheme with Revocation (2004, Vol. 15, No. 4)
Identity Based Strong Designated Verifier Signature Scheme (2007, Vol. 18, No. 2)
Identity Based Multisignatures (2006, Vol. 17, No. 2)
SCHUMANN, Heidrun
Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure (2005, Vol. 16, No. 1)
SEDEREVICIUS, Antanas
Analysis of Thermovisual Data of the Radio-Frequency Impact on the Myocardium Damage (2010, Vol. 21, No. 3)
SEF, Tomaz
Analysis of Automatic Stress Assignment in Slovene (2009, Vol. 20, No. 1)
SEINAUSKAS, Rimantas
Identifying Legal and Illegal States in Synchronous Sequential Circuits Using Test Generation (2003, Vol. 14, No. 2)
The Realization-Independent Testing Based on the Black Box Fault Models (2005, Vol. 16, No. 1)
Functional Test Generation Based on Combined Random and Deterministic Search Methods (2007, Vol. 18, No. 1)
SEMENKIN, Eugene
Local Search Efficiency when Optimizing Unimodal Pseudoboolean Functions (1998, Vol. 9, No. 3)
SEN, Manuel De la
Adaptive Stable Control of Manipulators with Improved Adaptation Transients by Using On-line Supervision of the Free-Parameters of the Adaptation Algorithm and Sampling Rate (2002, Vol. 13, No. 3)
On the Equilibrium Points, Boundedness and Positivity of a Sveirs Epidemic Model under Constant Regular Constrained Vaccination (2011, Vol. 22, No. 3)
SEN, Manuel de la
Absolute Stability and Hyperstability of a Class of Hereditary Systems (1998, Vol. 9, No. 2)
Controllability and Equilibrium Analysis of the Interaction between the Unemloyment Level and Related Government Expenditure (1998, Vol. 9, No. 2)
On the Existence of Optimal Control of Differential Systems with After-Effect (1999, Vol. 10, No. 3)
Absolute Stability of Single-Input Single-Output Systems with Constant Internal Point Time Delays (2003, Vol. 14, No. 3)
Representations of Multi-Model Based Controllers by Using Artificial Intelligence Tools (2004, Vol. 15, No. 3)
SENTÜRK, Sevil
Interval Type-2 Fuzzy c-Control Charts: An Application in a Food Company (, Vol. 28, No. 2)
SENTANCE, Sue
Developing a Two-Dimensional Categorization System for Educational Tasks in Informatics (, Vol. 28, No. 1)
SEPESY MAUCEC, Mirjam
Reduction of Morpho-Syntactic Features in Statistical Machine Translation of Highly Inflective Language (2010, Vol. 21, No. 1)
SERACKIS, Arturas
Treatment of Over-Saturated Protein Spots in Two-Dimensional Electrophoresis Gel Images (2010, Vol. 21, No. 3)
SERBAN, Gabriela
Hierarchical Adaptive Clustering (2008, Vol. 19, No. 1)
SERGEYEV, Yaroslav D.
A New Applied Approach for Executing Computations with Infinite and Infinitesimal Quantities (2008, Vol. 19, No. 4)
Using Blinking Fractals for Mathematical Modeling of Processes of Growth in Biological Systems (2011, Vol. 22, No. 4)
Observability of Turing Machines: A Refinement of the Theory of Computation (2010, Vol. 21, No. 3)
SERSIC, Damir
Point-Wise Adaptive Wavelet Transform for Signal Denoising (, Vol. 24, No. 4)
SEVAUX, Marc
Decision Making System for Regulation of a Bimodal Urban Transportation Network, Associating a Classical and a Multi-Agent Approaches (2005, Vol. 16, No. 4)
SEVILLANO, Goretti
ASTRA-Matlab Integration for the Control of Tokamaks (2011, Vol. 22, No. 2)
SHAFRANSKY, Yakov
Sequencing with Ordered Criteria, Precedence and Group Technology Constraints (2001, Vol. 12, No. 1)
SHAGAEV, Igor
Mobile Code Alternatives for Secure Environments (2000, Vol. 11, No. 1)
SHAH-MANSOURI, Vahid
Optimal Access Class Barring in Machine to Machine Systems with Random Activation Time (, Vol. 28, No. 2)
SHAMSHIRBAND, Shahaboddin
Sensorless Estimation of Wind Speed by Soft Computing Methodologies: A Comparative Study (, Vol. 26, No. 3)
SHAO, Zuhua
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys (2006, Vol. 17, No. 4)
SHEN, Li-Ping
Reliable Information Hiding Based on Support Vector Machine (2005, Vol. 16, No. 3)
SHEN, Rui-Min
Reliable Information Hiding Based on Support Vector Machine (2005, Vol. 16, No. 3)
SHERALI, Hanif D.
A Game Theoretic Analysis of Mechanisms to Induce Regional Technological Cooperation (2000, Vol. 11, No. 2)
Multiple Shift Scheduling of Hierarchical Workforce with Multiple Work Centers (2007, Vol. 18, No. 3)
A Dynamic Network Interdiction Problem (2010, Vol. 21, No. 4)
SHI, Pengfei
An Algebraic Framework for Schema Matching (2008, Vol. 19, No. 3)
SHIN, Ki Young
An Algorithm for Portfolio Optimization Problem (2005, Vol. 16, No. 1)
SHIRY GHIDARY, Saeed
Learning Inductive Riemannian Manifold in Abstract Form by Modeling Embedded Dynamical System (, Vol. 25, No. 3)
SHPILEWSKI, Edward
Recursive Algorithms of Time Series Observations Recognition (2000, Vol. 11, No. 3)
SILINGAS, Darius
Specifics of Hidden Markov Model Modifications for Large Vocabulary Continuous Speech Recognition (2004, Vol. 15, No. 1)
SBISAF: A Service-Oriented Business and Information Systems Alignment Method (, Vol. 24, No. 2)
SILKO, Galina
A Tool for Modeling Optical Beam Propagation (2002, Vol. 13, No. 2)
SIMANAUSKAS, Leonas
Research of Neural Network Methods for Compound Stock Exchange Indices Analysis (2002, Vol. 13, No. 4)
SIMIC, Dejan
Extended Software Architecture Based on Security Patterns (2010, Vol. 21, No. 2)
SIMONYTE, Virginija
Modelling of Lithuanian Speech Diphthongs (2011, Vol. 22, No. 3)
SIMONYTE, Virginija
Developing Models of Lithuanian Speech Vowels and Semivowels (, Vol. 25, No. 1)
SIMOVIC, Vladimir
Modelling of Analytical Function in the Financial Knowledge Discovery Model (2001, Vol. 12, No. 4)
SINDHYA, Karthik
Synchronous R-NSGA-II: An Extended Preference-Based Evolutionary Algorithm for Multi-Objective Optimization (, Vol. 26, No. 1)
SINGH, Karan
Vague Rough Set Techniques for Uncertainty Processing in Relational Database Model (2008, Vol. 19, No. 1)
SINJUR, Smiljan
Fast Convex Layers Algorithm for Near-Duplicate Image Detection (2012, Vol. 23, No. 4)
SIPAHIOGLU, Aydin
The Performance of the Modified Subgradient Algorithm on Solving the 0-1 Quadratic Knapsack Problem (2009, Vol. 20, No. 2)
SKAKAUSKAS, Vladas
Solvability and Asymptotic Behavior of a Pair Formation Model (1998, Vol. 9, No. 2)
A Mathematical Analysis of an Age-sex-space-structured Population Dynamics Model with Random Mating and Females' Pregnancy (1998, Vol. 9, No. 3)
On the Coexistence of Different Religions (1999, Vol. 10, No. 3)
On the Population Evolution Problem with the Harmonic Mean Type Mating Law and Females' Pregnancy (1999, Vol. 10, No. 4)
Two Population Dynamics Models with Child Care (2000, Vol. 11, No. 2)
SKERSYS, Tomas
Approach to Enterprise Modelling for Information Systems Engineering (2005, Vol. 16, No. 2)
SKOCIR, Zoran
Dynamic Generation of Web Services for Data Retrieval Using Ontology (2009, Vol. 20, No. 3)
SKRIPKAUSKAS, Mantas
Automatic Transcription of Lithuanian Text Using Dictionary (2006, Vol. 17, No. 4)
SKUCAS, Ignas
Text Categorization Using Neural Networks Initialized with Decision Trees (2004, Vol. 15, No. 4)
SLIVINSKAS, Vytautas
Modelling of Lithuanian Speech Diphthongs (2011, Vol. 22, No. 3)
Developing Models of Lithuanian Speech Vowels and Semivowels (, Vol. 25, No. 1)
SMAIZYS, Aidas
Business Rules Based Agile ERP Systems Development (2009, Vol. 20, No. 3)
SMALIUKAS, Robertas
An Algorithm for Key-Dependent S-Box Generation in Block Cipher System (, Vol. 26, No. 1)
SMARANDACHE, Florentin
A Neutrosophic Extension of the MULTIMOORA Method (, Vol. 28, No. 1)
SOLIUNAS, Alvydas
Learning and Recognition of Visual Patterns by Human Subjects and Artificial Intelligence Systems (1998, Vol. 9, No. 4)
Hexagonal Approach and Modeling for the Visual Cortex (2000, Vol. 11, No. 4)
SOTIRIADIS, Stelios
Cloud Scheduling Optimization: A Reactive Model to Enable Dynamic Deployment of Virtual Machines Instantiations (, Vol. 24, No. 3)
SOUKHAKIAN, Mohammad ali
Using Analytic Network Process in a Group Decision-Making for Supplier Selection (2012, Vol. 23, No. 4)
SOURAVLAS, Stavros
Design and Implementation of Parallel Counterpropagation Networks Using MPI (2007, Vol. 18, No. 1)
SPAHO, Evjola
Performance Evaluation of WMN-GA System in Node Placement in WMNs for Different Distributions of Mesh Clients and Different Selection and Mutation Operators (, Vol. 27, No. 3)
SPECHT, Günther
O!-LOLA - Extending the Deductive Database System LOLA by Object-Oriented Logic Programming (1998, Vol. 9, No. 1)
SPERANZA, M. Grazia
On LP Solvable Models for Portfolio Selection (2003, Vol. 14, No. 1)
SRINIVASAN, Seshadhri
Optimal Access Class Barring in Machine to Machine Systems with Random Activation Time (, Vol. 28, No. 2)
STABINGIENE, Lijana
Expected Bayes Error Rate in Supervised Classification of Spatial Gaussian Data (2011, Vol. 22, No. 3)
STAHL, Florian
Name Your Own Price on Data Marketplaces (, Vol. 28, No. 1)
STANEVICHENE, Larisa
An Algorithm for Transformation of Finite Automata to Regular Expressions (2000, Vol. 11, No. 1)
STANEVICHENE, Larisa I.
A Generalization of Regular Expressions (1999, Vol. 10, No. 1)
STANIKUNAS, Rytis
Neural Network for Color Constancy (2000, Vol. 11, No. 2)
STANIMIROVIC, Zorica
Memetic Algorithm for Solving the Multilevel Uncapacitated Facility Location Problem (, Vol. 25, No. 3)
STANKEVICIUS, Giedrius
Forming of the Investment Portfolio Using the Self-organizing Maps (SOM) (2001, Vol. 12, No. 4)
STANOJEVIC, Predrag
Memetic Algorithm for Solving the Multilevel Uncapacitated Facility Location Problem (, Vol. 25, No. 3)
STANUJKIC, Dragisa
Extension of Ratio System Part of MOORA Method for Solving Decision-Making Problems with Interval Data (2012, Vol. 23, No. 1)
A Multi-Attribute Decision Making Model Based on Distance from Decision Maker's Preferences (, Vol. 24, No. 1)
An Efficient and Simple Multiple Criteria Model for a Grinding Circuit Selection Based on MOORA Method (, Vol. 25, No. 1)
Extension of the ARAS Method for Decision-Making Problems with Interval-Valued Triangular Fuzzy Numbers (, Vol. 26, No. 2)
The Framework for the Selection of Personnel Based on the SWARA and ARAS Methods Under Uncertainties (, Vol. 27, No. 1)
A Neutrosophic Extension of the MULTIMOORA Method (, Vol. 28, No. 1)
STARIKOVICIUS, Vadimas
Realistic Performance Prediction Tool for the Parallel Block LU Factorization Algorithm (2003, Vol. 14, No. 2)
On Efficiency Analysis of the OpenFOAM-Based Parallel Solver for Simulation of Heat Transfer in and Around the Electrical Power Cables (, Vol. 27, No. 1)
STASIUNAS, Antanas
A Serial-Parallel Panoramic Filter Bank as a Model of Frequency Decomposition of Complex Sounds in the Human Inner Ear (2011, Vol. 22, No. 2)
STEFANAKIS, Emmanuel
Scheduling Trajectories on a Planar Surface with Moving Obstacles (2006, Vol. 17, No. 1)
STENCEL, Krzysztof
A Proposal for a Task Preparation Process (, Vol. 2, No. )
STOJANOVIC, Sanja
Extension of Ratio System Part of MOORA Method for Solving Decision-Making Problems with Interval Data (2012, Vol. 23, No. 1)
STREKALOVSKIY, Alexander
On Solution of One Equation with d.c. Function (, Vol. 27, No. 2)
STRIJOV, Vadim
Analytic and Stochastic Methods of Structure Parameter Estimation (, Vol. 27, No. 3)
STRIUGAS, Nerijus
A Normalized Parameter for Similarity/Dissimilarity Characterization of Sequences (, Vol. 26, No. 2)
STRNAD, Pavel
Storing XML Data - The ExDB and CellStore Way in the Context of Current Approaches (2012, Vol. 23, No. 2)
STRUC, Vitomir
Gabor-Based Kernel Partial-Least-Squares Discrimination Features for Face Recognition (2009, Vol. 20, No. 1)
Exploiting Spatio-Temporal Information for Light-Plane Labeling in Depth-Image Sensors Using Probabilistic Graphical Models (, Vol. 27, No. 1)
STUIKYS, Vytautas
Design of Reusable VHDL Component Using External Functions (1998, Vol. 9, No. 4)
Scripting Language Open PROMOL and its Processor (2000, Vol. 11, No. 1)
The Language-Centric Program Generator Models: 3L Paradigm (2000, Vol. 11, No. 3)
Relationship Model of Abstractions Used for Developing Domain Generators (2002, Vol. 13, No. 1)
Separation of Concerns in Multi-language Specifications (2002, Vol. 13, No. 3)
Wrapping of Soft IPs for Interface-based Design Using Heterogeneous Metaprogramming (2003, Vol. 14, No. 1)
Wrapping of Soft IPs for Interface-based Design Using Heterogeneous Metaprogramming (2003, Vol. 14, No. 1)
Soft IP Customisation Model Based on Metaprogramming Techniques (2004, Vol. 15, No. 1)
Equivalent Transformations of Heterogeneous Meta-Programs (, Vol. 24, No. 2)
STUPURIENE, Gabriele
Developing a Two-Dimensional Categorization System for Educational Tasks in Informatics (, Vol. 28, No. 1)
STYLIADIS, Athanasios D.
3-D Computer Modeling with Intra-Component, Geometric, Quality and Topological Constraints (2003, Vol. 14, No. 3)
E-Learning Documentation of Historical Living Systems with 3-D Modeling Functionality (2007, Vol. 18, No. 3)
SUBELJ, Lovro
General Context-Aware Data Matching and Merging Framework (, Vol. 24, No. 1)
SUBOC, Olga
Adaptive Integration of Stiff ODE (2000, Vol. 11, No. 4)
SUCIC, Victor
Separable Image Denoising Based on the Relative Intersection of Confidence Intervals Rule (2011, Vol. 22, No. 3)
SUN, Haojun
Holo-Entropy Based Categorical Data Hierarchical Clustering (, Vol. 28, No. 2)
SUN, Hung-Min
Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes (2002, Vol. 13, No. 1)
On the Security of Some Password Authentication Protocols (2003, Vol. 14, No. 2)
On the Linkability of Some Group Signature Schemes (2003, Vol. 14, No. 1)
SUN, Wei
Optimal Congestion Control and Routing for Multipath Networks with Random Losses (, Vol. 26, No. 2)
SUN, Xun
Delegatability of an Identity Based Strong Designated Verifier Signature Scheme (2010, Vol. 21, No. 1)
SUNG, Wen-Tsai
IHPG Algorithm for Efficient Information Fusion in Multi-Sensor Network via Smoothing Parameter Optimization (, Vol. 24, No. 2)
SUSINSKAS, Jurgis
Comparison of Poisson Mixture Models for Count Data Clusterization (2002, Vol. 13, No. 2)
SUTIENE, Kristina
Multistage K-Means Clustering for Scenario Tree Construction (2010, Vol. 21, No. 1)
SVECKO, Rajko
Implementation of PCCD-OFDM-ASK Robust Data Transmission over GSM Speech Channel (2009, Vol. 20, No. 1)
GSM Speech Coder Indirect Identification Algorithm (2010, Vol. 21, No. 4)
SVEIKAUSKIENE, Daiva
Graph Representation of the Syntactic Structure of the Lithuanian Sentence (2005, Vol. 16, No. 3)
SVITRA, Donatas
A Possibility of Taking into Consideration of Insulin "Age Structure" for Modeling Blood Glucose Dynamics (2000, Vol. 11, No. 1)
The Mathematical Model of the Female Menstrual Cycle and its Modifications (2000, Vol. 11, No. 4)
Mathematical Modeling of Metal Cutting Process (2001, Vol. 12, No. 2)
SYED, Mujahid N.
D-Optimal Designs: A Mathematical Programming Approach using Cyclotomic Cosets (2011, Vol. 22, No. 4)
SYLAIOU, Stella
Usability Evaluation of a Virtual Museum Interface (2006, Vol. 17, No. 3)
SYU, Liang-Wei
An Authentication Protocol for Lightweight NFC Mobile Sensors Payment (, Vol. 27, No. 4)
SZETO, Kwok Yip
Community Detection Through Optimal Density Contrast of Adjacency Matrix (2011, Vol. 22, No. 1)
TAHON, Christian
Decision Making System for Regulation of a Bimodal Urban Transportation Network, Associating a Classical and a Multi-Agent Approaches (2005, Vol. 16, No. 4)
TAI, Wei-Liang
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices (, Vol. 24, No. 1)
TALBI, El-Ghazali
Metaheuristics for the Virtual Machine Mapping Problem in Clouds (, Vol. 26, No. 1)
TALMACIU, Mihai
Recognition Algorithm for Diamond-Free Graphs (2007, Vol. 18, No. 3)
TAMOSAITIENE, Jolanta
Multi-Attribute Decision-Making Model by Applying Grey Numbers (2009, Vol. 20, No. 2)
TAMOSAITIS, Romualdas
Simulation of Technological Processes of Civil Engineering Companies (2001, Vol. 12, No. 4)
TAMOSIUNAITE, Minija
{T} Wave Alternans Features for Automated Detection (2005, Vol. 16, No. 4)
TAMOSIUNAS, Abdonas
Application of Survival Models for the Population Studies (2003, Vol. 14, No. 4)
TAN, Chunqiao
2-Tuple Linguistic Hesitant Fuzzy Aggregation Operators and Its Application to Multi-Attribute Decision Making (, Vol. 28, No. 2)
TANG, Yuan-Liang
An Improvement of SPLICE/AS in WIDE against Guessing Attack (2001, Vol. 12, No. 2)
TCHANGANI, Ayeley P.
Evaluation Model in Decision Analysis: Bipolar Approach (2012, Vol. 23, No. 3)
TELKSNYS, Laimutis
Development of Isolated Word Speech Recognition System (2002, Vol. 13, No. 1)
Specifics of Hidden Markov Model Modifications for Large Vocabulary Continuous Speech Recognition (2004, Vol. 15, No. 1)
Automatic Transcription of Lithuanian Text Using Dictionary (2006, Vol. 17, No. 4)
Parameters Estimation in Modelling of Gas-Gap in RBMK Type Reactor Using Bayesian Approach (2010, Vol. 21, No. 2)
Recognition of Short-Time Specific Random Elements in Random Sequences (2011, Vol. 22, No. 2)
Metrics Based Quality Estimation of Speech Recognition Features (, Vol. 24, No. 3)
TEPANDI, Jaak
Simulation of Conflict in an Agent World: Access to Resources and Possibility of Termination of the Population (2002, Vol. 13, No. 4)
THAKUR, Samajh Singh
Vague Rough Set Techniques for Uncertainty Processing in Relational Database Model (2008, Vol. 19, No. 1)
THEOCHARIS, John B.
A Genetic Based Approach to the Type I Structure Identification Problem (2005, Vol. 16, No. 3)
THIEL, Tomasz
Application of Multi-Criterion Decision Aid Method in Designing Heating Systems for Museum Buildings (2001, Vol. 12, No. 1)
TIESIS, Vytautas
Visualisation of Multidimensional Objects and the Socio-Economical Impact to Activity in EC RTD Databases (2001, Vol. 12, No. 2)
Quantitative Forecasting and Assessment Models in the State Education System (2002, Vol. 13, No. 4)
TOKMAKOVA, Aleksandra
Analytic and Stochastic Methods of Structure Parameter Estimation (, Vol. 27, No. 3)
TOMANDL, Bernd F.
Ischemic Stroke Segmentation on CT Images Using Joint Features (2004, Vol. 15, No. 2)
TOMIC, Mladen
Point-Wise Adaptive Wavelet Transform for Signal Denoising (, Vol. 24, No. 4)
TRCEK, Denis
Computational Trust Management, QAD, and Its Applications (, Vol. 25, No. 1)
TREIGYS, Povilas
Automated Optic Nerve Disc Parameterization (2008, Vol. 19, No. 3)
Analysis of Thermovisual Data of the Radio-Frequency Impact on the Myocardium Damage (2010, Vol. 21, No. 3)
Assessment of the Optic Nerve Disc and Excavation Parameters of Interactive and Automated Parameterization Methods (2012, Vol. 23, No. 3)
Integration of a Self-Organizing Map and a Virtual Pheromone for Real-Time Abnormal Movement Detection in Marine Traffic (, Vol. 28, No. 2)
TRELA, Radoslaw
A Problem of Scheduling Jobs with Non-Monotonic Stepwise Values (, Vol. 25, No. 1)
TROYANO, Francis Condis
The Competitiveness of Industrial Sectors in CEECs Countries as the Base for their Successful Economic Integration to the EU (2001, Vol. 12, No. 1)
TRUECK, Stefan
New Tendencies in Rating SMEs with Respect to Basel II (2001, Vol. 12, No. 4)
TSAI, Cheng-Jung
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams (2008, Vol. 19, No. 1)
A Study of Improving the Performance of Mining Multi-Valued and Multi-Labeled Data (, Vol. 25, No. 1)
TSAI, Chwei-Shyong
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers (2003, Vol. 14, No. 3)
TSAI, Hao-Chuan
Weaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme (2005, Vol. 16, No. 2)
TSAI, Hung-Hsu
JND-Based Watermark Embedding and GA-Based Watermark Extraction with Fuzzy Inference System for Image Verification (, Vol. 25, No. 1)
TSAI, Tung-Tso
A Fully Secure Revocable ID-Based Encryption in the Standard Model (2012, Vol. 23, No. 3)
RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE (, Vol. 25, No. 2)
Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles (, Vol. 25, No. 3)
Certificateless Signature with Strong Unforgeability in the Standard Model (, Vol. 26, No. 4)
SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices (, Vol. 28, No. 1)
TSENG, Hsien-Wen
High Capacity Data Hiding in JPEG-Compressed Images (2004, Vol. 15, No. 1)
VQ-Based Image Watermarking Using Anti-Gray Coding (2004, Vol. 15, No. 2)
Hiding Data in Halftone Images (2005, Vol. 16, No. 3)
TSENG, Yuh-Min
On the Security of Methods for Protecting Password Transmission (2001, Vol. 12, No. 3)
Cryptanalysis and Improvement of Key Distribution System for VSAT Satellite Communications (2002, Vol. 13, No. 3)
Partially Blind Threshold Signature Based on RSA (2003, Vol. 14, No. 2)
An Improved Conference-Key Agreement Protocol with Forward Secrecy (2005, Vol. 16, No. 2)
An Efficient Two-Party Identity-Based Key Exchange ProtocolThis research was partially supported by National Science Council, Taiwan, R.O.C., under contract no. NSC95-2221-E-018-010. (2007, Vol. 18, No. 1)
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards (2008, Vol. 19, No. 2)
Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique (2010, Vol. 21, No. 2)
Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants (2012, Vol. 23, No. 2)
A Fully Secure Revocable ID-Based Encryption in the Standard Model (2012, Vol. 23, No. 3)
RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE (, Vol. 25, No. 2)
Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles (, Vol. 25, No. 3)
Certificateless Signature with Strong Unforgeability in the Standard Model (, Vol. 26, No. 4)
A Revocable Certificateless Short Signature Scheme and Its Authentication Application (, Vol. 27, No. 3)
SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices (, Vol. 28, No. 1)
TULCHINSKY, Peter
From QBE to Graph Queries (1998, Vol. 9, No. 1)
TULCHINSKY, Vadim
From QBE to Graph Queries (1998, Vol. 9, No. 1)
TURSKIS, Zenonas
A New Logarithmic Normalization Method in Games Theory (2008, Vol. 19, No. 2)
Multi-Attribute Decision-Making Model by Applying Grey Numbers (2009, Vol. 20, No. 2)
A Novel Method for Multiple Criteria Analysis: Grey Additive Ratio Assessment (ARAS-G) Method (2010, Vol. 21, No. 4)
Multi-Criteria Inventory Classification Using a New Method of Evaluation Based on Distance from Average Solution (EDAS) (, Vol. 26, No. 3)
The Framework for the Selection of Personnel Based on the SWARA and ARAS Methods Under Uncertainties (, Vol. 27, No. 1)
A New Approach for Solving Bi-Objective Redundancy Allocation Problem Using DOE, Simulation and \varepsilon-Constraint Method (, Vol. 28, No. 1)
TUSAR, Tea
Analysis of Automatic Stress Assignment in Slovene (2009, Vol. 20, No. 1)
TUZIKOV, Alexander
Sequencing with Ordered Criteria, Precedence and Group Technology Constraints (2001, Vol. 12, No. 1)
TVARIJONAS, Povilas
Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level (2007, Vol. 18, No. 1)
TZENG, Shiang-Feng
Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers (2003, Vol. 14, No. 3)
TZIONAS, Panagiotis
A Genetic Based Approach to the Type I Structure Identification Problem (2005, Vol. 16, No. 3)
UDDIN AHMED, Mobin
Generic Multimedia Database Architecture Based upon Semantic Libraries (2007, Vol. 18, No. 4)
UR REHMAN, Mohib
Generic Multimedia Database Architecture Based upon Semantic Libraries (2007, Vol. 18, No. 4)
USINSKAS, Andrius
Ischemic Stroke Segmentation on CT Images Using Joint Features (2004, Vol. 15, No. 2)
USTINOVICHIUS, Leonas
Development of Software for Multiple Criteria Evaluation (2003, Vol. 14, No. 2)
UUSTALU, Tarmo
Primitive (Co)Recursion and Course-of-Value (Co)Iteration, Categorically (1999, Vol. 10, No. 1)
VÕHANDU, Leo
Limited-Vocabulary Estonian Continuous Speech Recognition System using Hidden Markov Models (2004, Vol. 15, No. 3)
VÖRÖS, Jozef
Recursive Identification of Systems with Noninvertible Output Nonlinearities (2010, Vol. 21, No. 1)
Parametric Identification of Systems with General Backlash (2012, Vol. 23, No. 2)
Vítezslav, Vítezslav
Change Point Detection by Sparse Parameter Estimation (2011, Vol. 22, No. 1)
V. MOSIC, Aleksandar
Design of Fixed and Adaptive Companding Quantizer with Variable-Length Codeword for Memoryless Gaussian Source (, Vol. 24, No. 1)
VAICEKAUSKAS, Gytis
An Algorithm for Key-Dependent S-Box Generation in Block Cipher System (, Vol. 26, No. 1)
VAICIULIS, Dainius
Determination of Stress Strain State Components of Butt Welded Joint with Mild Interlayer Subjected to Elasto-Plastic Tension (2006, Vol. 17, No. 2)
VAICIUNAS, Airenas
Statistical Language Models of Lithuanian Based on Word Clustering and Morphological Decomposition (2004, Vol. 15, No. 4)
Cache-based Statistical Language Models of English and Highly Inflected Lithuanian (2006, Vol. 17, No. 1)
Corpus-Based Hidden Markov Modelling of the Fundamental Frequency of Lithuanian (, Vol. 27, No. 3)
VAIRA, Gintaras
Genetic Algorithm for VRP with Constraints Based on Feasible Insertion (, Vol. 25, No. 1)
VAIRA, Zilvinas
Software Engineering Paradigm Independent Design Problems, GoF 23 Design Patterns, and Aspect Design (2011, Vol. 22, No. 2)
VAISNYS, Rimas
{T} Wave Alternans Features for Automated Detection (2005, Vol. 16, No. 4)
VAITKEVICIUS, Henrikas
Neural Network for Color Constancy (2000, Vol. 11, No. 2)
VAITKUS, Pranas
Neural Network with Matrix Inputs (2008, Vol. 19, No. 4)
VALANTINAS, Jonas
On the Use of Shift Dynamics in Synthesizing Fractal Images (2004, Vol. 15, No. 3)
On the Application of Invariant Image Parameters to Fractal Encoding of Bi-Level Images (2007, Vol. 18, No. 3)
Improving Space Localization Properties of the Discrete Wavelet Transform (, Vol. 24, No. 4)
VALANTINAS, Rokas
Improving Space Localization Properties of the Discrete Wavelet Transform (, Vol. 24, No. 4)
VAN DIJK, Diana
Pipe Replacement in a Water Supply Network: Coordinated Versus Uncoordinated Replacement and Budget Effects (, Vol. 27, No. 2)
VARONECKAS, Giedrius
Forecast Model of Impact of Meteorological Factors on Coronary Artery Disease Patients (2007, Vol. 18, No. 3)
VASIGA, Troy
New Task Types at the Canadian Computing Competition (, Vol. 1, No. )
VASILECAS, Olegas
The Role of Ontologies in Reusing Domain and Enterprise Engineering Assets (2003, Vol. 14, No. 4)
Multi-Alignment Templates Induction (2008, Vol. 19, No. 4)
Semi-Automatic Bilingual Corpus Creation with Zero Entropy Alignments (2011, Vol. 22, No. 2)
Business Rules Based Agile ERP Systems Development (2009, Vol. 20, No. 3)
Application of the Ontology Axioms for the Development of OCL Constraints from PAL Constraints (2012, Vol. 23, No. 3)
General Context-Aware Data Matching and Merging Framework (, Vol. 24, No. 1)
VASILIAUSKIENE, Lina
Intelligent Initial Finite Element Mesh Generation for Solutions of 2D Problems (2002, Vol. 13, No. 2)
VASKEVICIUS, Egidijus
Modeling Human Emotions as Reactions to a Dynamical Virtual 3D Face (, Vol. 25, No. 3)
VAVPOTIC, Damjan
A Framework and Tool-Support for Reengineering Software Development Methods (2008, Vol. 19, No. 3)
VEIKUTIS, Vincentas
Analysis of Thermovisual Data of the Radio-Frequency Impact on the Myocardium Damage (2010, Vol. 21, No. 3)
VELASCO, Manuel
From XML to Relational Models (2010, Vol. 21, No. 4)
VENE, Varmo
Models of Attributed Automata (1998, Vol. 9, No. 1)
Primitive (Co)Recursion and Course-of-Value (Co)Iteration, Categorically (1999, Vol. 10, No. 1)
VENKATARAM, Pallapa
An Agent-Based Best Effort Routing Technique for Load Balancing (2006, Vol. 17, No. 3)
VENSKUS, Julius
Integration of a Self-Organizing Map and a Virtual Pheromone for Real-Time Abnormal Movement Detection in Marine Traffic (, Vol. 28, No. 2)
VENTICINQUE, Salvatore
A Distributed Cloud Brokering Service (, Vol. 26, No. 1)
VERIKAS, Antanas
The Evidence Theory Based Post-Processing of Colour Images (2004, Vol. 15, No. 3)
An Efficient Technique to Detect Visual Defects in Particleboards (2008, Vol. 19, No. 3)
A Serial-Parallel Panoramic Filter Bank as a Model of Frequency Decomposition of Complex Sounds in the Human Inner Ear (2011, Vol. 22, No. 2)
VETEIKIS, Romualdas
The Calculation of Electrotonic Potential Half-Time and its Derivative in Respect to Distance in One- and Two-Dimensional RC Media (2000, Vol. 11, No. 4)
VETEIKIS Algimantas KRISCIUKAITIS, Romualdas VETEIKIS Algimantas
Modelling of Electric Stimulation in a Three-Dimensional Isotropic Bidomain Space RC-Medium: a Rectangular Current Stimulus Case (1998, Vol. 9, No. 3)
VIDUGIRIENE, Ausra
Modeling Human Emotions as Reactions to a Dynamical Virtual 3D Face (, Vol. 25, No. 3)
A Comparison of Hammerstein-Type Nonlinear Models for Identification of Human Response to Virtual 3D Face Stimuli (, Vol. 27, No. 2)
VILEINISKIS, Virginijus
The Solution of Two-Dimensional Neutron Diffusion Equation with Delayed Neutrons (2001, Vol. 12, No. 2)
VILKAUSKAS, Leonardas
Application of Survival Models for the Population Studies (2003, Vol. 14, No. 4)
VISCIUTE, Gintare
Improving Space Localization Properties of the Discrete Wavelet Transform (, Vol. 24, No. 4)
VITKUS, Rimantas
Fingerprint Registration Using Composite Features Consensus (1999, Vol. 10, No. 4)
Fingerprint Pre-Classification Using Ridge Density (2000, Vol. 11, No. 3)
Feature Matches Filtering Using Geometric Invariants in Image Registration Tasks (2001, Vol. 12, No. 3)
VLAJIC, Sinisa
Extended Software Architecture Based on Security Patterns (2010, Vol. 21, No. 2)
VOJNOVIC, Savo
Modelling of Analytical Function in the Financial Knowledge Discovery Model (2001, Vol. 12, No. 4)
VOLKOVICH, Zeev
On a Minimal Spanning Tree Approach in the Cluster Validation Problem (2009, Vol. 20, No. 2)
VOSSEN, Gottfried
Name Your Own Price on Data Marketplaces (, Vol. 28, No. 1)
VOZNAK, Miroslav
Integration of a Self-Organizing Map and a Virtual Pheromone for Real-Time Abnormal Movement Detection in Marine Traffic (, Vol. 28, No. 2)
VRANKIC, Miroslav
Separable Image Denoising Based on the Relative Intersection of Confidence Intervals Rule (2011, Vol. 22, No. 3)
VYLITOK, Aleksei
An Algorithm for Transformation of Finite Automata to Regular Expressions (2000, Vol. 11, No. 1)
WAN, Shu-Ping
A Hesitant Fuzzy Programming Method for Hybrid MADM with Incomplete Attribute Weight Information (, Vol. 27, No. 4)
WAN, Shuping
Multi-Attribute Group Decision Making with Trapezoidal Intuitionistic Fuzzy Numbers and Application to Stock Selection (, Vol. 25, No. 4)
WAN, Zhongmei
Identity-Based Key-Insulated Signcryption (2012, Vol. 23, No. 1)
WANG, Baocang
A Novel Combinatorial Public Key Cryptosystem (2010, Vol. 21, No. 4)
WANG, Chih-Hung
Proxy Confirmation Signatures (2004, Vol. 15, No. 3)
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes (2007, Vol. 18, No. 1)
WANG, Ching-Te
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update (2010, Vol. 21, No. 3)
WANG, Guilin
One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings (2009, Vol. 20, No. 4)
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security (, Vol. 28, No. 2)
WANG, Hongbing
A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles (, Vol. 26, No. 3)
WANG, Ji-Zong
An Algorithm of Neural Network and Application to Data Processing in Concrete Engineering (2003, Vol. 14, No. 1)
WANG, Jian-Qiang
A Group Decision Making Approach Based on Interval-Valued Intuitionistic Uncertain Linguistic Aggregation Operators (, Vol. 26, No. 3)
WANG, Shengbao
A New ID-Based Deniable Authentication Protocol (2007, Vol. 18, No. 1)
A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles (, Vol. 26, No. 3)
WANG, Shengrui
Holo-Entropy Based Categorical Data Hierarchical Clustering (, Vol. 28, No. 2)
WANG, Shu-Ching
Optimal Agreement in a Scale-Free Network Environment (2006, Vol. 17, No. 1)
WANG, Shuozhong
New Fuzzy Identity-Based Encryption in the Standard Model (2010, Vol. 21, No. 3)
WANG, Xi-Juan
An Algorithm of Neural Network and Application to Data Processing in Concrete Engineering (2003, Vol. 14, No. 1)
WANG, Xin-Fan
A Group Decision Making Approach Based on Interval-Valued Intuitionistic Uncertain Linguistic Aggregation Operators (, Vol. 26, No. 3)
WANG, Xu An
Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model (2012, Vol. 23, No. 2)
WANG, Xueli
One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings (2009, Vol. 20, No. 4)
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security (, Vol. 28, No. 2)
WANG, Yongtao
Identity-Based Key-Insulated Signcryption (2012, Vol. 23, No. 1)
WANG, Yufang
ORVPF - the Model and its DNC Implementation (2005, Vol. 16, No. 4)
WANG, Yumin
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures (2006, Vol. 17, No. 3)
WANG, Zecheng
Adaptively Secure Threshold Signature Scheme in the Standard Model (2009, Vol. 20, No. 4)
WASNIEWSKI, Jerzy
Numerical Integration on Distributed-Memory Parallel Systems (1998, Vol. 9, No. 2)
WEBER, Gerhard-Wilhelm
On a Minimal Spanning Tree Approach in the Cluster Validation Problem (2009, Vol. 20, No. 2)
A Hybrid Computational Method Based on Convex Optimization for Outlier Problems: Application to Earthquake Ground Motion Prediction (, Vol. 27, No. 4)
WELZER, Tatjana
An Algorithm for Protecting Knowledge Discovery Data (2003, Vol. 14, No. 3)
Assessment of Classification Models with Small Amounts of Data (2007, Vol. 18, No. 3)
Learning Process Termination Criteria (2012, Vol. 23, No. 4)
WEN, Hsiang-An
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes (2007, Vol. 18, No. 1)
WESSING, Simon
Linear Time Estimators for Assessing Uniformity of Point Samples in Hypercubes (, Vol. 27, No. 2)
WHITE, Martin
Usability Evaluation of a Virtual Museum Interface (2006, Vol. 17, No. 3)
WIDUCH, Jacek
A Label Correcting Algorithm with Storing Partial Solutions to Solving the Bus Routing Problem (, Vol. 24, No. 3)
WIN, Tin Nilar
Safe-Region Generation Methods for Continuous Trip Route Planning Queries (, Vol. 28, No. 1)
WOJCIK, Grzegorz M.
Liquid State Machine Built of Hodgkin-Huxley Neurons (2004, Vol. 15, No. 1)
Nonlinear Behaviour in the MPI-Parallelised Model of the Rat Somatosensory Cortex (2008, Vol. 19, No. 3)
XAVIER, Adilson E.
Continuous Nonlinear Programming Techniques to Solve Scheduling Problems (2009, Vol. 20, No. 2)
XHAFA, Fatos
Cloud Scheduling Optimization: A Reactive Model to Enable Dynamic Deployment of Virtual Machines Instantiations (, Vol. 24, No. 3)
Event-Based Awareness Services for P2P Groupware Systems (, Vol. 26, No. 1)
XIONG, Hu
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography (2010, Vol. 21, No. 2)
XUE, Fei
Fault Diagnosis of Distributed Discrete Event Systems Using OBDD (2005, Vol. 16, No. 3)
XUE, Qingshui
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers (2005, Vol. 16, No. 2)
YAN, Kuo-Qin
Optimal Agreement in a Scale-Free Network Environment (2006, Vol. 17, No. 1)
YAN, Lu
Fault Diagnosis of Distributed Discrete Event Systems Using OBDD (2005, Vol. 16, No. 3)
YANG, Chou-Chen
Security of Improvement on Methods for Protecting Password Transmission (2003, Vol. 14, No. 4)
Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem (2003, Vol. 14, No. 1)
Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks (2004, Vol. 15, No. 2)
YANG, Chuan-Sheng
Public Key Authentication Schemes for Local Area Networks (2008, Vol. 19, No. 1)
YANG, Chunyu
Strongly Absolute Stability Problem of Descriptor Systems (2007, Vol. 18, No. 2)
YANG, Jen-Ho
Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery (, Vol. 28, No. 2)
YANG, Meihong
A DFSM-Based Protocol Conformance Testing and Diagnosing Method (2011, Vol. 22, No. 3)
YANG, Shanlin
A Novel Trust Inference Framework for Web-Based Scenarios Harnessed by Social Network and Web of Trust - a Heuristic Approach (, Vol. 27, No. 2)
YANG, Wei-Pang
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams (2008, Vol. 19, No. 1)
Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages (2012, Vol. 23, No. 4)
YANG, Wu-E.
A Group Decision Making Approach Based on Interval-Valued Intuitionistic Uncertain Linguistic Aggregation Operators (, Vol. 26, No. 3)
YANG, Xiaoyuan
Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model (2012, Vol. 23, No. 2)
YANG, Yuli
Trust-Based Scheduling Strategy for Cloud Workflow Applications (, Vol. 26, No. 1)
YANG, Zhenguang
One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings (2009, Vol. 20, No. 4)
YAO, Chih-Chia
Oblique Support Vector Machines (2007, Vol. 18, No. 1)
YEH, Cheng-Yu
An Improved Version of Algebraic Codebook Search Algorithm for an AMR-WB Speech Coder (, Vol. 28, No. 2)
YEH, Her-Tyan
On the Linkability of Some Group Signature Schemes (2003, Vol. 14, No. 1)
YEH, Ming-Che
An Improved Version of Algebraic Codebook Search Algorithm for an AMR-WB Speech Coder (, Vol. 28, No. 2)
YERLIKAYA-ÖZKURT, Fatma
A Hybrid Computational Method Based on Convex Optimization for Outlier Problems: Application to Earthquake Ground Motion Prediction (, Vol. 27, No. 4)
YIE, Ikkwon
A Method of Finding Bad Signatures in an RSA-Type Batch Verification (2011, Vol. 22, No. 2)
YIM, Kangbin
Intelligent Reconfigurable Method of Cloud Computing Resources for Multimedia Data Delivery (, Vol. 24, No. 3)
YIN, Hu
Delegatability of an Identity Based Strong Designated Verifier Signature Scheme (2010, Vol. 21, No. 1)
YOO, Kee-Young
Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme (2005, Vol. 16, No. 2)
Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting (2009, Vol. 20, No. 1)
An Improvement of the User Identification and Key Agreement Protocol with User Anonymity (2012, Vol. 23, No. 1)
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password (2010, Vol. 21, No. 4)
YOO, Seong-Moo
Efficient Adaptive Algorithms for Transposing Small and Large Matrices on Symmetric Multiprocessors (2006, Vol. 17, No. 4)
YOON, Eun-Jun
Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme (2005, Vol. 16, No. 2)
Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting (2009, Vol. 20, No. 1)
An Improvement of the User Identification and Key Agreement Protocol with User Anonymity (2012, Vol. 23, No. 1)
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password (2010, Vol. 21, No. 4)
ZAKAREVICIUS, Algimantas
Evaluation of Ranking Accuracy in Multi-Criteria Decisions (2006, Vol. 17, No. 4)
Measuring Congruence of Ranking Results Applying Particular MCDM Methods (2011, Vol. 22, No. 3)
ZALIK, Borut
Efficient Reconstruction of Images with Deliberately Corrupted Pixels (2012, Vol. 23, No. 1)
Fast Convex Layers Algorithm for Near-Duplicate Image Detection (2012, Vol. 23, No. 4)
Sweep-Hyperplane Clustering Algorithm Using Dynamic Model (, Vol. 25, No. 4)
ZALIK, Krista Rizman
Sweep-Hyperplane Clustering Algorithm Using Dynamic Model (, Vol. 25, No. 4)
ZAVADSKAS, Edmundas Kazimieras
Multivariant Design and Multiple Criteria Analysis of a Building Life Cycle (2001, Vol. 12, No. 1)
Development of Software for Multiple Criteria Evaluation (2003, Vol. 14, No. 2)
Fuzzy Matrix Games Multi-Criteria Model for Decision-Making in Engineering (2005, Vol. 16, No. 1)
Evaluation of Ranking Accuracy in Multi-Criteria Decisions (2006, Vol. 17, No. 4)
A New Logarithmic Normalization Method in Games Theory (2008, Vol. 19, No. 2)
Multi-Attribute Decision-Making Model by Applying Grey Numbers (2009, Vol. 20, No. 2)
Measuring Congruence of Ranking Results Applying Particular MCDM Methods (2011, Vol. 22, No. 3)
A Novel Method for Multiple Criteria Analysis: Grey Additive Ratio Assessment (ARAS-G) Method (2010, Vol. 21, No. 4)
Robustness of MULTIMOORA: A Method for Multi-Objective Optimization (2012, Vol. 23, No. 1)
Applications of WASPAS Method in Manufacturing Decision Making (, Vol. 25, No. 1)
Multi-Criteria Inventory Classification Using a New Method of Evaluation Based on Distance from Average Solution (EDAS) (, Vol. 26, No. 3)
The Framework for the Selection of Personnel Based on the SWARA and ARAS Methods Under Uncertainties (, Vol. 27, No. 1)
A Neutrosophic Extension of the MULTIMOORA Method (, Vol. 28, No. 1)
ZAZULA, Damjan
Fast Convex Layers Algorithm for Near-Duplicate Image Detection (2012, Vol. 23, No. 4)
ZENG, Peng
A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles (, Vol. 26, No. 3)
ZENG, Shouzhen
A Method Based on OWA Operator and Distance Measures for Multiple Attribute Decision Making with 2-Tuple Linguistic Information (2012, Vol. 23, No. 4)
A Projection Method for Multiple Attribute Group Decision Making with Intuitionistic Fuzzy Information (, Vol. 24, No. 3)
Induced Uncertain Pure Linguistic Hybrid Averaging Aggregation Operator and Its Application to Group Decision Making (, Vol. 26, No. 3)
A New Model for Interactive Group Decision Making with Intuitionistic Fuzzy Preference Relations (, Vol. 27, No. 4)
ZESTAS, Nikos C.
3-D Computer Modeling with Intra-Component, Geometric, Quality and Topological Constraints (2003, Vol. 14, No. 3)
ZGANEC, Mario
Exploiting Spatio-Temporal Information for Light-Plane Labeling in Depth-Image Sensors Using Probabilistic Graphical Models (, Vol. 27, No. 1)
ZGANEC-GROS, Jerneja
Exploiting Spatio-Temporal Information for Light-Plane Labeling in Depth-Image Sensors Using Probabilistic Graphical Models (, Vol. 27, No. 1)
ZHANG, Chonghui
A Method Based on OWA Operator and Distance Measures for Multiple Attribute Decision Making with 2-Tuple Linguistic Information (2012, Vol. 23, No. 4)
ZHANG, Chuanlei
Orthogonal Margin Maximization Projection for Gait Recognition (, Vol. 26, No. 2)
ZHANG, Minqing
Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model (2012, Vol. 23, No. 2)
ZHANG, Qingling
Strongly Absolute Stability Problem of Descriptor Systems (2007, Vol. 18, No. 2)
ZHANG, Shanwen
Orthogonal Margin Maximization Projection for Gait Recognition (, Vol. 26, No. 2)
ZHANG, Xiaolu
An Integrated Maximizing Consistency and Multi-Choice Goal Programming Approach for Hybrid Multiple Criteria Group Decision Making Based on Interval-Valued Intuitionistic Fuzzy Number (, Vol. 26, No. 4)
ZHANG, Xinchang
A DFSM-Based Protocol Conformance Testing and Diagnosing Method (2011, Vol. 22, No. 3)
ZHANG, Xinpeng
New Fuzzy Identity-Based Encryption in the Standard Model (2010, Vol. 21, No. 3)
ZHANG, Yaming
Optimal Congestion Control and Routing for Multipath Networks with Random Losses (, Vol. 26, No. 2)
ZHANG, Yi
Image Motion Restoration Using Fractional-Order Gradient Prior (, Vol. 26, No. 4)
ZHANG, Zhen
A VIKOR-Based Approach to Group Decision Making With Uncertain Preference Ordinals and Incomplete Weight Information (, Vol. 27, No. 3)
ZHANG, Zhi
An Algebraic Framework for Schema Matching (2008, Vol. 19, No. 3)
ZHAO, Na
Entropy Measures for Interval-Valued Intuitionistic Fuzzy Information from a Comparative Perspective and Their Application to Decision Making (, Vol. 27, No. 1)
ZHENG, Da-zhong
Fault Diagnosis of Distributed Discrete Event Systems Using OBDD (2005, Vol. 16, No. 3)
ZHIGLJAVSKY, Anatoly
Analysis of Structured Low Rank Approximation as an Optimization Problem (2011, Vol. 22, No. 4)
ZHOU, Dao
An Approach to Hesitant Fuzzy Group Decision Making with Multi-Granularity Linguistic Information (, Vol. 27, No. 4)
Distance Measure and Correlation Coefficient for Linguistic Hesitant Fuzzy Sets and Their Application (, Vol. 28, No. 2)
ZHOU, Hong
ORVPF - the Model and its DNC Implementation (2005, Vol. 16, No. 4)
ZHOU, Jiliu
Image Motion Restoration Using Fractional-Order Gradient Prior (, Vol. 26, No. 4)
ZHOU, Ligang
Generalized Ordered Weighted Proportional Averaging Operator and Its Application to Group Decision Making (, Vol. 25, No. 2)
ZHOU, Linna
Strongly Absolute Stability Problem of Descriptor Systems (2007, Vol. 18, No. 2)
ZHU, Facang
A New Model for Interactive Group Decision Making with Intuitionistic Fuzzy Preference Relations (, Vol. 27, No. 4)
ZHU, Mingxun
Some Generalized Interval-Valued 2-Tuple Linguistic Correlated Aggregation Operators and Their Application in Decision Making (, Vol. 27, No. 1)
ZHURAK, Maryna
Statistical Analysis of Spatio-Temporal Data Based on Poisson Conditional Autoregressive Model (, Vol. 26, No. 1)
ZIBERKAS, Giedrius
The Language-Centric Program Generator Models: 3L Paradigm (2000, Vol. 11, No. 3)
ZIKARIENE, Egle
Actual Error Rates in Classification of the T-Distributed Random Field Observation Based on Plug-in Linear Discriminant Function (, Vol. 26, No. 4)
ZILINSKAS, Antanas
On Multimodality of the SSTRESS Criterion for Metric Multidimensional Scaling (2003, Vol. 14, No. 1)
On Structural Analysis of Parliamentarian Voting Data (2008, Vol. 19, No. 3)
Interval Arithmetic Based Optimization in Nonlinear Regression (2010, Vol. 21, No. 1)
Optimization-Based Evaluation of Concentrations in Modeling the Biosensor-Aided Measurement (2011, Vol. 22, No. 4)
ZILINSKAS, Julius
Evaluation Ranges of Functions using Balanced Random Interval Arithmetic (2003, Vol. 14, No. 3)
Comparison of Packages for Interval Arithmetic (2005, Vol. 16, No. 1)
Estimation of Functional Ranges Using Standard and Inner Interval Arithmetic (2006, Vol. 17, No. 1)
On Dimensionality of Embedding Space in Multidimensional Scaling (2008, Vol. 19, No. 3)
Interval Arithmetic Based Optimization in Nonlinear Regression (2010, Vol. 21, No. 1)
Copositive Programming by Simplicial Partition (2011, Vol. 22, No. 4)
Multimodal Evolutionary Algorithm for Multidimensional Scaling with City-Block Distances (2012, Vol. 23, No. 4)
Solution of Discrete Competitive Facility Location Problem for Firm Expansion (, Vol. 27, No. 2)
ZINTELYTE, Marija
Synthesized Fricative ch Specific Features and Influence on Speech Quality Analysis (2001, Vol. 12, No. 3)
ZITNIK, Slavko
General Context-Aware Data Matching and Merging Framework (, Vol. 24, No. 1)
ZIVKOVIC, Ales
The Impact of Details in the Class Diagram on Software Size Estimation (2005, Vol. 16, No. 2)
ZUMBAKIS, Tomas
On the Use of Shift Dynamics in Synthesizing Fractal Images (2004, Vol. 15, No. 3)
On the Application of Invariant Image Parameters to Fractal Encoding of Bi-Level Images (2007, Vol. 18, No. 3)
ZUTAUTAITE-SEPUTIENE, Inga
Parameters Estimation in Modelling of Gas-Gap in RBMK Type Reactor Using Bayesian Approach (2010, Vol. 21, No. 2)
Zhigljavsky, Anatoly
Stochastic Global Optimization: A Review on the Occasion of 25 Years of Informatica (, Vol. 27, No. 2)
Zilinskas, Antanas
Stochastic Global Optimization: A Review on the Occasion of 25 Years of Informatica (, Vol. 27, No. 2)
TopTop Copyright © INFORMATICA, Vilnius University Institute of Mathematics and Informatics, 2010