default search action
Information Technology and Control, Volume 42
Volume 42, Number 1, 2013
- Lukás Sekanina, Richard Ruzicka, Zdenek Vasícek, Václav Simek, Petr Hanácek:
Implementing A Unique Chip Id On A Reconfigurable Polymorphic Circuit. 7-14 - Donatas Levisauskas, Tomas Tekorius:
An Approach To Identification Of Dynamic Model For Optimization Of Fed-Batch Fermentation Processes. 15-20 - Zuowen Tan:
An Enhanced ID-based Authenticated Multiple Key Agreement Protocol. 21-28 - Raimundas Liutkevicius, Andrius Davidsonas:
Surface Reconstruction From Partially Structured Noisy Cloud Of Points Using B-Splines. 29-37 - Uros Kac, Franc Novak:
Reconfiguration Schemes Of SC Biquad Filters For Oscillation Based Test. 38-47 - Saulius Pavalkis, Lina Nemuraite, Rita Butkiene:
Derived Properties: A User Friendly Approach To Improving Model Traceability. 48-60 - Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang:
A New Group Signature Scheme Based on RSA Assumption. 61-66 - Alireza Fatehi, Behnaneh Sadeghpour, Batool Labibi:
Nonlinear System Identification in Frequent and Infrequent Operating Points for Nonlinear Model Predictive Control. 67-76 - Iztok Fister Jr., Tomaz Kosar, Iztok Fister, Marjan Mernik:
Easytime++: A Case Study Of Incremental Domain-Specific Language Development. 77-85 - Pedro J. García-Laencina:
Improving Predictions Using Linear Combination Of Multiple Extreme Learning Machines. 86-93
Volume 42, Number 2, 2013
- Debiao He, Ding Wang, Shuhua Wu:
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards. 105-112 - Qi Jiang, Jianfeng Ma, Guangsong Li, Zhuo Ma:
An Improved Password-Based Remote User Authentication Protocol without Smart Cards. 113-123 - Wen-Chung Kuo, Bae-Ling Chen, Lih-Chyau Wuu:
Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy. 124-130 - Sarunas Packevicius, Greta Krivickaite, Dominykas Barisas, Robertas Jasaitis, Tomas Blazauskas, Evaldas Guogis:
Test Data Generation for Complex Data Types Using Imprecise Model Constraints and Constraint Solving Techniques. 131-149 - Tomas Skersys, Rimantas Butleris, Kestutis Kapocius, Tomas Vileiniskis:
An Approach for Extracting Business Vocabularies from Business Process Models. 150-158 - Yuh-Min Tseng, Tung-Tso Tsai, Tsu-Yang Wu:
Efficient Revocable Multi-Receiver ID-Based Encryption. 159-169 - Cheng-Yu Yeh, Kuan-Lin Chen, Shaw-Hwa Hwang:
Consistency Analysis of the Duration Parameter Within a Syllable for Mandarin Speech. 170-177 - Stefan Miskovic, Zorica Stanimirovic:
A Memetic Algorithm for Solving Two Variants of the Two-Stage Uncapacitated Facility Location Problem. 178-190 - Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices. 191-204
Volume 42, Number 3, 2013
- Andrius Blazinskas, Antanas Lenkevicius, Alfonsas Misevicius:
Modified Local Search Heuristics for the Symmetric Traveling Salesman Problem. 217-230 - Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang:
Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. 231-237 - Darius Birvinskas, Vacius Jusas, Ignas Martisius, Robertas Damasevicius:
Data compression of EEG signals for artificial neural network classification. 238-241 - Saralees Nadarajah, Jungsoo Woo:
On the maximum and minimum of multivariate Pareto random variables. 242-246 - Cheng-Chi Lee, Yan-Ming Lai, Chin-Ling Chen, Lung Albert Chen:
A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing. 247-252 - Ruslan Pacevic, Darius Markauskas, Lukas Radvilavicius, Arnas Kaceniauskas, Remigijus Kutas:
Cell Attribute-Based Algorithm for Crack Visualization. 253-259 - Algimantas Venckauskas, Nerijus Morkevicius, Grigas Petraitis, Jonas Ceponis:
Covert Channel for Cluster-based File Systems Using Multiple Cover Files. 260-267 - Han-Yu Lin:
Secure Universal Designated Verifier Signature and its Variant for Privacy Protection. 268-276 - Zoran H. Peric, Jelena Lukic, Jelena Nikolic, Dragan B. Denic:
Application of Mean-Square Approximation for Piecewise Linear Optimal Compander Design for Gaussian Source and Gaussian Mixture Model. 277-285 - Milan Sigmund:
Statistical Analysis of Fundamental Frequency Based Features in Speech under Stress. 286-291
Volume 42, Number 4, 2013
- Aleksas Riskus, Giedrius Liutkus:
An Improved Algorithm for the Approximation of a Cubic Bezier Curve and its Application for Approximating Quadratic Bezier Curve. 303-308 - Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:
Efficient Proxy Signature Scheme for Mobile Devices from Bilinear Pairings. 309-314 - Jen-Ho Yang, Ya-Fen Chang, Yi-Hui Chen:
An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment. 315-324 - Irma Ivanoviene, Jonas Rimas:
The Use of the Lambert Function Method for Analysis of a Control System with Delays. 325-332 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari:
An Enhanced Authenticated Key Agreement for Session Initiation Protocol. 333-342 - J. C. Galan-Hernandez, Vicente Alarcón Aquino, Juan Manuel Ramírez-Cortés, Oleg Starostenko:
Region-of-Interest Coding based on Fovea and Hierarchical Trees. 343-352 - Olga Kurasova, Tomas Petkus, Ernestas Filatovas:
Visualization of Pareto Front Points when Solving Multi-objective Optimization Problems. 353-361 - Vacius Jusas, Tomas Neverdauskas:
Combining Software and Hardware Test Generation Methods to Verify VHDL Models. 362-368 - Chin-Ling Chen, Wei-Chen Tsai, Yu-Yi Chen, Woei-Jiunn Tsaur:
Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET. 369-379 - Nemanja Nedic, Goran Svenda:
Workflow Management System for DMS. 380-392
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.