H.4.2 Types of Systems | Article |
UTILITY FUNCTION DESIGN ON THE BASE OF THE PAIRED COMPARISON MATRIX* |
Abstract: In the multi-attribute utility theory the utility functions are usually constructed by dots. It concerns both the lottery’s method and the value increasing method. In the both cases the ut |
D.1 PROGRAMMING TECHNIQUES | Article |
VARIETIES OF BIOLOGICAL INFORMATION: A MOLECULAR RECOGNITION APPROACH TO ... |
Abstract: Bioinformatic and systems biology developments should be accompanied not only by a plethora of
computer tools, but also by an in-depth reflection on the distinctive nature of biological inf |
G.2.1 Combinatorics | Article |
VECTOR COMBINATORIAL PROBLEMS IN A SPACE OF COMBINATIONS ... |
Abstract: The paper considers vector discrete optimization problem with linear fractional functions of criteria on a
feasible set that has combinatorial properties of combinations. Structural propert |
G.1.6 Optimization | Article |
VECTORS AND MATRIXES IN GROUPING INFORMATION PROBLEM |
Abstract: Grouping information problem appears in application in two main forms. These are the problem of
recovering function, represented by its observations and the problem of classification (clust |
G.1.6 Optimization | Article |
VECTORS AND MATRIXES LEAST SQUARES METHOD: FOUNDATION AND APPLICATION ... |
Abstract: In this paper the application of the least squares method (LSM) has been substantiated. Case of matrix
of observations for the arguments and values of the renewable function of the linear r |
I.2.7 Natural Language Processing | Article |
VERBAL DIALOGUE VERSUS WRITTEN DIALOGUE |
Abstract: Modern technology has moved on and completely changed the way that people can use the telephone
or mobile to dialogue with information held on computers. Well developed “written speech an |
D.4.6 Security and Protection | Article |
VERIFICATION AND APPLICATION OF CONCEPTUAL MODEL AND SECURITY ... |
Abstract: The paper represents a verification of a previously developed conceptual model of security related
processes in DRM implementation. The applicability of established security requirements in |
C.4 PERFORMANCE OF SYSTEMS | Article |
VHDL-MODELING OF A GAS LASER’S GAS DISCHARGE CIRCUIT |
Abstract: Usage of modeling for construction of laser installations today is actual in connection with automation
of manufacture. The automated designing is used at forecasting behavior of modeled ob |
I.6.3 Applications | Article |
VIABLE MODEL OF THE ENTERPRISE – A CYBERNETIC APPROACH ... |
Abstract: The purpose of the current paper is to present the developed methodology of viable model based
enterprise management, which is needed for modern enterprises to survive and growth in the inf |
H.3.7 Digital Libraries | Article |
VIRTUAL ENCYCLOPAEDIA OF THE BULGARIAN ICONOGRAPHY |
Abstract: East-Christian icon art is recognised as one of the most significant areas of the art of painting.
Regrettably, it is still being neglected in the digital documentation and the registry of |
H.1 MODELS AND PRINCIPLES | Article |
VIRTUAL EXPOSITIONS MODELING IN THE BULGARIAN FOLKLORE |
Abstract: In this paper we discuss the process of virtual exposition modeling for the folklore domain. Two folklore
information systems are chosen as a source of the content – the Bulgarian folklor |
D.1.m Miscellaneous | Article |
VIRTUAL MEMBRANE SYSTEMS |
Abstract: Within the membrane computing research field, there are many papers about software simulations and
a few about hardware implementations. In both cases, algorithms for implementing membrane |
J. Computer Applications | Article |
VISUALIZATION OPTIONS OF ASSEMBLY PROCEDURE |
Abstract: A current computing performance of PC technique and software support allows to virtual model and
test of an entire production process, saving considerable financial and human resources that |
C.4 PERFORMANCE OF SYSTEMS | Article |
VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS |
Abstract: This paper represents VoIP shaping analyses in devices that apply the three Quality of Service
techniques – IntServ, DiffServ and RSVP. The results show queue management and packet stream |
I.5 PATTERN RECOGNITION | Article |
WAVELET TRANSFORM IN INVESTIGATIONS OF STUDENTS EDUCABILITY DEPENDENTLY ... |
Abstract: Application of 2-level 2-D Haar Discrete Wavelet Transform of images with special words repeated by
hand is offered. Metric of similarity for images with pattern words and images with stude |
H.5.2 User Interfaces (D.2.2, H.1.2, I.3.6) | Article |
WEB INTERFACES DESTINED FOR PEOPLE WITH DISABILITIES |
Abstract: One of the main characteristics of the world that we live in is the access to information and one of the
main ways to reach the information is the Internet. Most Internet sites put accessib |