Sciweavers

144 search results - page 12 / 29
» informaticalt 2006
Sort
View
INFORMATICALT
2010
99views more  INFORMATICALT 2010»
13 years 7 months ago
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem
The asymmetric cipher protocol, based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security of presented cipher protocol is ba...
Andrius Raulynaitis, Eligijus Sakalauskas, Saulius...
INFORMATICALT
2000
96views more  INFORMATICALT 2000»
13 years 8 months ago
Computing True Shadow Prices in Linear Programming
It is well known that in linear programming, the optimal values of the dual variables can be interpreted as shadow prices (marginal values) of the right-hand side coefficients. How...
James K. Ho
INFORMATICALT
1998
101views more  INFORMATICALT 1998»
13 years 8 months ago
Language Egineering in Lithuania
Language engineering encompassing natural language processing and speech processing became very important for a development of every nation in multilingual Europe. After the Counci...
Joana Lipeikiene, Antanas Lipeika
INFORMATICALT
2006
110views more  INFORMATICALT 2006»
13 years 8 months ago
Iterated Tabu Search for the Unconstrained Binary Quadratic Optimization Problem
Given a set of objects with profits (any, even negative, numbers) assigned not only to separate objects but also to pairs of them, the unconstrained binary quadratic optimization p...
Gintaras Palubeckis
INFORMATICALT
2006
117views more  INFORMATICALT 2006»
13 years 8 months ago
Job Sequencing with Exponential Functions of Processing Times
We study single machine scheduling problems, where processing times of the jobs are exponential functions of their start times. For increasing functions, we prove strong NP-hardnes...
Adam Janiak, Mikhail Y. Kovalyov