Abstract. Determination of stress strain state components of butt welded joint with a mild interlayer at elasto-plastic tension is presented in this paper. Function of normal trans...
Algis Brazenas, Dainius Vaiciulis, Vytautas Kleiza
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
One important requirement of electronic cash systems is the anonymity of customers. Unconditional anonymity is also very well suited to support criminals in blackmailing. Maitland ...
Given a set of objects with profits (any, even negative, numbers) assigned not only to separate objects but also to pairs of them, the unconstrained binary quadratic optimization p...
Abstract. The aim of this paper is to demonstrate that the techniques of Computer Aided Geometric Design such as spatial rational curves and surfaces could be applied to Kinematics...
This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversa...
The paper analyses the problem of ranking accuracy in multiple criteria decision-making (MCDM) methods. The methodology for measuring the accuracy of determining the relative signi...
Edmundas Kazimieras Zavadskas, Algimantas Zakarevi...
This paper investigates a variety of statistical cache-based language models built upon three corpora: English, Lithuanian, and Lithuanian base forms. The impact of the cache size,...
This paper presents an iterative autoregressive system parameter estimation algorithm in the presence of white observation noise. The algorithm is based on the parameter estimation...