Journal: ITC

Volume 41, Issue 4

307 -- 317Sayed Chhattan Shah, Myong-Soon Park, Wan Sik Choi, Zeeshan Hameed Mir, Sajjad Hussain Chauhdary, Ali Kashif Bashir, Fida Hussain Chandio. An Adaptive Distance-based Resource Allocation Scheme for Interdependent Tasks in Mobile Ad Hoc Computational Grids
318 -- 327Jurgita Kapociute-Dzikiene, Gailius Raskinis. Learning a Transferable World Model by Reinforcement Agent in Deterministic Observable Grid-World Environments
328 -- 331Keehang Kwon. Forward Reasoning via Sequential Queries in Logic Programming
332 -- 339Jonas Mockus, Rimantas Belevicius, Dmitrij Sesok, Juozas Kaunas, Darius Maciunas. On Bayesian Approach to Grillage Optimization
340 -- 348Heemin Park, Jae-Won Lee. Task Assignment in Wireless Sensor Networks via Task Decomposition
349 -- 355Eligijus Sakalauskas, Kestutis Luksys. Matrix Power Cipher
356 -- 367Tomas Skersys, Lina Tutkute, Rimantas Butleris, Rita Butkiene. Extending BPMN Business Process Model with SBVR Business Vocabulary and Rules
368 -- 375Algimantas Venckauskas, Nerijus Jusas, Irena Mikuckiene, Stasys Maciulevicius. Generation of the Secret Encryption Key Using the Signature of the Embedded System
376 -- 384Robertas Damasevicius, Paulius Paskevicius, Eimutis Karciauskas, Romas Marcinkevicius. Automatic Extraction of Features and Generation of Feature Models from Java Programs
385 -- 391Giedrius Liutkus, Aleksas Riskus, Arunas Tomkevicius, Antanas Lenkevicius. Issues with exchange of presentation data among CAD systems

Volume 41, Issue 3

211 -- 219Darko Brodic, Dragan R. Milivojevic. An Algorithm for the Estimation of the Initial Text Skew
220 -- 228Chin-Ling Chen, Yu-Cheng Huang, Tzay-Farn Shih. A Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards
229 -- 238Fang Jin, Qing-Quan Liu. Quantized Feedback Control Over Packet Dropout Communication Channels
239 -- 247Deividas Kancelkis, Jonas Valantinas. A New Le Gall Wavelet-Based Approach to Progressive Encoding and Transmission of Image Blocks
248 -- 257Kazys Kazlauskas, Rimantas Pupeikis. On Speedy Recognition of Non-Aliased Realization after Multifold Downsampling of an Oversampled Bandlimited Signal
258 -- 267Cheng-Chi Lee, Rui-Xiang Chang, Te-Yu Chen, Lung Albert Chen. An Improved Delegation-Based Authentication Protocol for PCSs
268 -- 273Rasa Lileikyte, Laimutis Telksnys. Quality Estimation of Speech Recognition Features for Dynamic Time Warping Classifier
274 -- 282Her-Terng Yau, Yu-Chi Pu, Simon Cimin Li. Application of a Chaotic Synchronization System to Secure Communication
283 -- 294Yifei Zheng, Lixin Jia, Hui Cao. Multi-Objective Gene Expression Programming for Clustering

Volume 41, Issue 2

103 -- 115Ernestas Vysniauskas, Lina Nemuraite, Bronius Paradauskas. Preserving Semantics of Owl 2 Ontologies in Relational Databases Using Hybrid Approach
116 -- 124Uros Legat, Anton Biasizzo, Franc Novak. On line self recovery of embedded multi-processor SOC on FPGA using dynamic partial reconfiguration
125 -- 135Saulius Minkevicius, Leonidas Sakalauskas. Modeling of the Phenomena in Multiserver Networks
136 -- 142Rytis Maskeliunas, Kastytis Ratkevicius. Hmi Modelling for Multimodal Lithuanian Applications
143 -- 150Haibin Huang, Guangfu Ma, Yufei Zhuang, Yueyong Lv. Optimal Spacecraft Formation Reconfiguration with Collision Avoidance Using Particle Swarm Optimization
151 -- 161Mao-Lun Chiang, Hui-Ching Hsieh. A New Approach to the Fault Detection Problem for Mobile P2P Network
162 -- 172Ming Liu, Quan Bing Liu, Chao Yuan Liu, Jie Cheng Sun. Data Evolvement Analysis Based on Topology Self-Adaptive Clustering algorithm
173 -- 182Yuh-Min Tseng, Chen-Hung Yu, Tsu-Yang Wu. Towards scalable key management for secure multicast communication
183 -- 198Chien-Fu Cheng, Kuo-Tang Tsai, Hsien-Chun Liao. Simple and Efficient Signature-based Consensus Protocol in the Asynchronous Distributed System

Volume 41, Issue 1

7 -- 14Povilas Treigys, Virginijus Marcinkevicius, Arturas Kaklauskas. Analysis of Iris and pupil parameters for stress Recognition
15 -- 22Shirisha Tallapally. Security enhancement on Simple Three Party PAKE Protocol
23 -- 32Vytautas Stuikys, Robertas Damasevicius, Giedrius Ziberkas. Understanding of Heterogeneous Multi-Stage Meta-Programs
33 -- 39Eligijus Sakalauskas. The multivariate quadratic Power Problem over Zn is NP-Complete
40 -- 45Vincas Laurutis, Ingrida Indrijauskiene, Raimondas Zemblys, Saulius Niauronis. Effects of Muller-Lyer Illusion on the accuracy of Primary saccades and Smooth Pursuit eye movements
46 -- 52Kestutis Jonelis, Kestutis Brazauskas, Donatas Levisauskas. A System for Dissolved oxygen Control in Industrial aeration tank
53 -- 59Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu. A Secure Password-Based Remote User Authentication Scheme without Smart Cards
60 -- 68Ya-Fen Chang, Wei-Liang Tai, Chung-Yi Lin. A Verifiable Proxy Signature Scheme Based on Bilinear Pairings with Identity-Based Cryptographic Approaches
69 -- 76Chun-Ta Li. A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications
77 -- 89Zorica Stanimirovic, Miroslav Maric, Srdjan Bozovic, Predrag Stanojevic. An Efficient Evolutionary Algorithm for Locating Long-Term Care Facilities