Journal: ITC

Volume 43, Issue 4

347 -- 358Vicente Alarcón Aquino, Juan Manuel Ramírez-Cortés, Pilar Gómez-Gil, Oleg Starostenko, Y. Garcia-Gonzalez. Network Intrusion Detection Using Self-Recurrent Wavelet Neural Network with Multidimensional Radial Wavelons
359 -- 370J. Apolinar Munoz Rodriguez. Improving the Modeling of the Plantar Surface via Bezier Networks and Laser Projection
371 -- 380Safdar Zaman, Wolfgang Slany. Smartphone-Based Online and Offline Speech Recognition System for ROS-Based Robots
381 -- 389Chien-Lung Hsu, Yu-Hao Chuang, Pei-Ling Tsai, Atif Almari, Sk. Md. Mizanur Rahman. Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions
390 -- 401Yuanyuan Zhang, Jianhua Chen, Baojun Huang, Cong Peng. An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
402 -- 413Daiva Sveikauskiene, Laimutis Telksnys. Accuracy of the Parsing of Lithuanian Simple Sentences
414 -- 432Mitja Trampus, Dunja Mladenic. Constructing Domain Templates with Concept Hierarchy as Background Knowledge
433 -- 439Metin Turan, Coskun Sönmez, Murat Can Ganiz. The Benchmark of Paragraph and Sentence Extraction Summaries on Outlier Document Filtering Applied Multi-Document Summarizer
440 -- 446Vacius Jusas, Tomas Neverdauskas. Stimuli generation framework for testing multiple processes in VHDL
447 -- 454Vytautas Kaminskas, Gediminas Liaucius. Predictor-based Self-tuning Control of Pressure Plants
455 -- 459. Summaries

Volume 43, Issue 3

217 -- 229Majid Abdolrazzagh-Nezhad, Salwani Abdullah. A Robust Intelligent Construction Procedure for Job-Shop Scheduling
230 -- 243Rok Zontar, Ivan Rozman, Vili Podgorelec. Mapping Ontologies to Objects using a Transformation based on Description Logics
244 -- 251Raed T. Al-Zubi, Khalid A. Darabkh, Yaser Jararweh. A Powerful Yet Efficient Iris Recognition Based on Local Binary Quantization
252 -- 263Han-Yu Lin. Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its Extension
264 -- 276Ying-Hao Hung, Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang. Strongly Secure Revocable ID-based Signature without Random Oracles
277 -- 288Min-Shiang Hwang, Shih-Ting Hsu, Cheng-Chi Lee. A New Public Key Encryption with Conjunctive Field Keyword Search Scheme
289 -- 302Jaroslav Karpovic, Gintare Krisciuniene, Linas Ablonskis, Lina Nemuraite. The Comprehensive Mapping of Semantics of Business Vocabulary and Business Rules (SBVR) to OWL 2 Ontologies
303 -- 314Hui Cao, Yanbin Zhang, Lixin Jia, Gangquan Si. A Fuzzy Sequential Pattern Mining Algorithm Based on Independent Pruning Strategy for Parameters Optimization of Ball Mill Pulverizing System
315 -- 320Wojciech P. Hunek, Piotr Dzierwa. New Results in Generalized Minimum Variance Control of Computer Networks
321 -- 332Jurgita Kapociute-Dzikiene, Algis Krupavicius. Predicting Party Group from the Lithuanian Parliamentary Speeches
333 -- 338. Summaries

Volume 43, Issue 2

121 -- 132Loreta Savulioniene, Leonidas Sakalauskas. A Stochastic Algorithm of Frequent Set Search for Mining Association Rules
133 -- 142Henrikas Pranevicius, M. Pranevicius, O. Pranevicius, Mindaugas Snipas, N. Paulauskas, F. Bukauskas. Continuous Time Markov Chain Models of Voltage Gating of Gap Junction Channels
143 -- 150Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari. An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems
151 -- 156Wen-Chung Kuo, Hong-Ji Wei, Jiin-Chiou Cheng. Enhanced Secure Authentication Scheme with Anonymity for Roaming in Mobility Networks
157 -- 165P. Teppa-Garran, G. Garcia. ADRC Tuning Employing the LQR Approach for Decoupling Uncertain MIMO Systems
166 -- 174Ugur Erkin Kocamaz, Yilmaz Uyaroglu. Non-Identical Synchronization, Anti-Synchronization and Control of Single-Machine Infinite-Bus Power System via Active Control
175 -- 182Y. Wang, P. Zhou, Q. Wang, D. Duan. Reliable Robust Sampled-Data H∞ Output Tracking Control with Application to Flight Control
183 -- 187C.-P. Chu, C. Y. Yeh, S.-H. Hwang. An Efficient Search Strategy for ACELP Algebraic Codebook by Means of Reduced Candidate Mechanism and Iteration-Free Pulse Replacement
188 -- 198A. Azarfar, H. T. Shandiz, M. Shafiee. Adaptive Control for Nonlinear Singular Systems
199 -- 204N. Tiwari, S. Padhye, D. He. Provably Secure Proxy Multi-Signature Scheme Based on ECC

Volume 43, Issue 1

7 -- 13J. Zhang. Synchronization of Nonlinear Continuous-time Systems by Sampled-data Output Feedback Control
14 -- 27Vytautas Stuikys, Kristina Bespalova, Renata Burbaite. Refactoring of Heterogeneous Meta-Program into k-stage Meta-Program
28 -- 36Uros Kac, Franc Novak. Practical Considerations in Oscillation Based Test of SC Biquad Filters
37 -- 46Pavel Stefanovic, Olga Kurasova. Creation of Text Document Matrices and Visualization by Self-Organizing Map
47 -- 56Egidijus Vaskevicius, Ausra Vidugiriene, Vytautas Kaminskas. Identification of Human Response to Virtual 3D Face Stimuli
57 -- 63H. Tu, H. Shen, D. He, J. Chen. Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol
64 -- 0Stasys Kazlauskas. Preface
65 -- 72Alex Muscar, Costin Badica. Monadic Foundations for Promises in Jason
73 -- 87Katarzyna Wasielewska, Maria Ganzha, Marcin Paprzycki, Pawel Szmeja, Michal Drozdowicz, Ivan Lirkov, Costin Badica. Applying Saaty's Multicriterial Decision Making Approach in Grid Resource Management
88 -- 97Dejan Mitrovic, Mirjana Ivanovic, Zoltan Geler. Agent-Based Distributed Computing for Dynamic Networks
98 -- 109I. Gabriel, Viorel Negru, Daniela Zaharie. Neuroevolution Based Multi-Agent System with Ontology Based Template Creation for Micromanagement in Real-Time Strategy Games