Skip to main content
Skip to main navigation menu
Skip to site footer
Acta Cybernetica
Accepted Papers
Current
Archives
Announcements
About
About the Journal
Submissions
Editorial Team
Contact
Search
Search
Register
Login
Home
/
Archives
/
Vol 22 No 3 (2016)
Published:
2016-01-01
Regular articles
Identifying Code Clones with RefactorErl
Viktória Fördős, Melinda Tóth
553-571
PDF
Improving Saturation-based Bounded Model Checking
Dániel Darvas, András Vörös, Tamás Bartha
573-589
PDF
On Cyber Attacks and the Maximum-Weight Rooted-Subtree Problem
Geir Agnarsson, Raymond Greenlaw, Sanpawat Kantabutra
591-612
PDF
A Note on the Emptiness of Intersection Problem for Left Szilárd Languages
Erkki Mäkinen
613-616
PDF
Performance Modeling of Finite-Source Cognitive Radio Networks
Béla Almási, Tamás Bérczes, Attila Kuki, János Sztrik, Jinting Wang
617-631
PDF
One-Pass Reductions
Sándor Vágvölgyi
633-655
PDF
On the Projection onto a Finitely Generated Cone
Miklós Ujvári
657-672
PDF
Robustness of BitTorrent-like VoD Protocols
Tamás Vinkó
673-685
PDF
On Nonpermutational Transformation Semigroups with an Application to Syntactic Complexity
Szabolcs Iván, Judit Nagy-György
687-701
PDF
On Chomsky Hierarchy of Palindromic Languages
Pál Dömösi, Szilárd Fazekas, Masami Ito
703-713
PDF
Open Journal Systems
Information
For Readers
For Authors
For Librarians
Make a Submission
Most read in last month
Detecting Uninitialized Variables in C++ with the Clang Static Analyzer
49
Standardized Telemedicine Software Development Kit with Hybrid Cloud Support
41
Single and Combined Algorithms for Open Set Classification on Image Datasets
37
Integer Programming Based Optimization of Power Consumption for Data Center Networks
29
Using Version Control Information to Visualize Developers' Knowledge
26
Current Issue