Sciweavers

INFORMATICALT
2010
103views more  INFORMATICALT 2010»
12 years 11 months ago
Multistage K-Means Clustering for Scenario Tree Construction
Abstract. In stochastic programming and decision analysis, an important issue consists in the approximate representation of the multidimensional stochastic underlying process in th...
Kristina Sutiene, Dalius Makackas, Henrikas Pranev...
INFORMATICALT
2010
94views more  INFORMATICALT 2010»
13 years 1 months ago
Statistical Classification of Scientific Publications
The problem of automatic classification of scientific texts is considered. Methods based on statistical analysis of probabilistic distributions of scientific terms in texts are dis...
Vaidas Balys, Rimantas Rudzkis
INFORMATICALT
2010
118views more  INFORMATICALT 2010»
13 years 1 months ago
Facilitating Ontology Development with Continuous Evaluation
In this paper we propose facilitating ontology development by constant evaluation of steps in the process of ontology development. Existing methodologies for ontology development a...
Dejan Lavbic, Marjan Krisper
INFORMATICALT
2010
148views more  INFORMATICALT 2010»
13 years 1 months ago
A Novel Combinatorial Public Key Cryptosystem
Combinatorial problems serve as an important resource for developing practical public key cryptosystems and several combinatorial cryptosystems have been proposed in the cryptograp...
Baocang Wang, Yupu Hu
INFORMATICALT
2010
138views more  INFORMATICALT 2010»
13 years 1 months ago
Recognition of Human Emotions in Reasoning Algorithms of Wheelchair Type Robots
This paper analyses the possibilities of integrating different technological and knowledge representation techniques for the development of a framework for the remote control of mu...
Dale Dzemydiene, Antanas Andrius Bielskis, Arunas ...
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
13 years 1 months ago
An Entire Chaos-Based Biometric Remote User Authentication Scheme on Tokens Without Using Password
This paper presents an entire chaos-based biometric remote user authentication scheme on tokens without using passwords. The proposed scheme is based on the chaotic hash function a...
Eun-Jun Yoon, Kee-Young Yoo
INFORMATICALT
2010
118views more  INFORMATICALT 2010»
13 years 1 months ago
A Novel Method for Multiple Criteria Analysis: Grey Additive Ratio Assessment (ARAS-G) Method
The paper presents the process of the selection of a potential supplier, which have to be the most appropriate to stakeholders. The selection is based on a set of criteria: Deliver...
Zenonas Turskis, Edmundas Kazimieras Zavadskas
INFORMATICALT
2010
116views more  INFORMATICALT 2010»
13 years 1 months ago
A Dynamic Network Interdiction Problem
We present a novel dynamic network interdiction model that accounts for interactions between an interdictor deploying resources on arcs in a digraph and an evader traversing the ne...
Brian J. Lunday, Hanif D. Sherali
INFORMATICALT
2010
110views more  INFORMATICALT 2010»
13 years 1 months ago
From XML to Relational Models
For many businesses and organizations, the achievement of interoperability has proven to be a highly desirable goal. However, without efficient schema mapping mechanisms or models ...
Elena Castro, Dolores Cuadra, Manuel Velasco
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
13 years 1 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...