353 | -- | 368 | Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang. Formal Verification of Security Model Using SPR Tool |
369 | -- | 391 | Filip Orság. Speaker Recognition in the Biometric Security Systems |
393 | -- | 404 | Eduard Toman, Martin Stanek. Analysis of Greedy Algorithm for Vertex Covering of Random Graph by Cubes |
405 | -- | 420 | T. T. Dang, Baltazár Frankovic, Ivana Budinska, Ben Flood, Con Sheahan, Bao-Lam Dang. Using Heuristic Search for Solving Single Machine Batch Processing Problems |
421 | -- | 439 | Michal Laclavik, Zoltan Balogh, Marian Babik, Ladislav Hluchý. AgentOWL: Semantic Knowledge Model and Agent Architecture |
441 | -- | 464 | Josef Strnadel. Testability Analysis and Improvements of Register-Transfer Level Digital Circuits |