Computing and Informatics
Article List
Volume 25, 2006, No. 5
ISSN 1335-9150 (print)
ISSN 2585-8807 (online)
Content:
- KIM, I. - KANG, M. - CHOI, J. - D. ZEGZHDA, P. - O. KALININ, M. - P. ZEGZHDA, D. - KANG, I.: Formal Verification of Security Model Using SPR Tool. (p. 353)
- ORSÁG, F.: Speaker Recognition in the Biometric Security Systems. (p. 369)
- TOMAN, E. - STANEK, M.: Analysis of Greedy Algorithm for Vertex Covering of Random Graph by Cubes. (p. 393)
- FRANKOVIČ, B. - BUDINSKÁ, I. - DANG, T. - FLOOD, B. - SHEAHAN, C. - DANG, B.: Using Heuristic Search for Solving Single Machine Batch Processing Problems. (p. 405)
- Hluchý, L. - LACLAVÍK, M. - BALOGH, Z. - BABÍK, M.: AgentOWL: Semantic Knowledge Model and Agent Architecture. (p. 421)
- STRNADEL, J.: Testability Analysis and Improvements of Register-Transfer Level Digital Circuits. (p. 441)