Vol 25, No 5 (2006)

Computing and Informatics

Table of Contents


Formal Verification of Security Model Using SPR Tool PDF
Il Gon Kim, Miyoung Kang, Jin Young Choi, Peter D. Zegzhda, Maxim O. Kalinin, Dmitry P. Zegzhda, Inhye Kang 353-368
Speaker Recognition in the Biometric Security Systems PDF
Filip Orság 369-391
Analysis of Greedy Algorithm for Vertex Covering of Random Graph by Cubes PDF
Eduard Toman, Martin Stanek 393-404
Using Heuristic Search for Solving Single Machine Batch Processing Problems PDF
Thanh Tung Dang, Baltazár Frankovic, Ivana Budinská, Ben Flood, Con Sheahan, Bao Lam Dang 405-420
AgentOWL: Semantic Knowledge Model and Agent Architecture PDF
Michal Laclavík, Zoltán Balogh, Marian Babík, Ladislav Hluchý 421-439
Testability Analysis and Improvements of Register-Transfer Level Digital Circuits PDF
Josef Strnadel 441-464

ISSN: 2585-8807