Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
Announcements
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Subscription
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 25 No. 5 (2006): Computing and Informatics
Vol. 25 No. 5 (2006): Computing and Informatics
Published:
2012-01-26
Articles
Formal Verification of Security Model Using SPR Tool
Il Gon Kim, Miyoung Kang, Jin Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang
353-368
PDF
Speaker Recognition in the Biometric Security Systems
Filip Orság
369-391
PDF
Analysis of Greedy Algorithm for Vertex Covering of Random Graph by Cubes
Eduard Toman, Martin Stanek
393-404
PDF
Using Heuristic Search for Solving Single Machine Batch Processing Problems
Thanh Tung Dang, Baltazár Frankovic, Ivana Budinská, Ben Flood, Con Sheahan, Bao Lam Dang
405-420
PDF
AgentOWL: Semantic Knowledge Model and Agent Architecture
Michal Laclavík, Zoltán Balogh, Marian Babík, Ladislav Hluchý
421-439
PDF
Testability Analysis and Improvements of Register-Transfer Level Digital Circuits
Josef Strnadel
441-464
PDF
Information
For Readers
For Authors
For Librarians
Make a Submission
Make a Submission
Keywords