Skip to main content
Skip to main navigation menu
Skip to site footer
Acta Cybernetica
Accepted Papers
Current
Archives
Announcements
About
About the Journal
Submissions
Editorial Team
Contact
Search
Search
Register
Login
Home
/
Archives
/
Vol 22 No 3 (2016)
Published:
2016-01-01
Regular articles
Identifying Code Clones with RefactorErl
Viktória Fördős, Melinda Tóth
553-571
PDF
Improving Saturation-based Bounded Model Checking
Dániel Darvas, András Vörös, Tamás Bartha
573-589
PDF
On Cyber Attacks and the Maximum-Weight Rooted-Subtree Problem
Geir Agnarsson, Raymond Greenlaw, Sanpawat Kantabutra
591-612
PDF
A Note on the Emptiness of Intersection Problem for Left Szilárd Languages
Erkki Mäkinen
613-616
PDF
Performance Modeling of Finite-Source Cognitive Radio Networks
Béla Almási, Tamás Bérczes, Attila Kuki, János Sztrik, Jinting Wang
617-631
PDF
One-Pass Reductions
Sándor Vágvölgyi
633-655
PDF
On the Projection onto a Finitely Generated Cone
Miklós Ujvári
657-672
PDF
Robustness of BitTorrent-like VoD Protocols
Tamás Vinkó
673-685
PDF
On Nonpermutational Transformation Semigroups with an Application to Syntactic Complexity
Szabolcs Iván, Judit Nagy-György
687-701
PDF
On Chomsky Hierarchy of Palindromic Languages
Pál Dömösi, Szilárd Fazekas, Masami Ito
703-713
PDF
Open Journal Systems
Information
For Readers
For Authors
For Librarians
Make a Submission
Most read in last month
Detecting Uninitialized Variables in C++ with the Clang Static Analyzer
41
A Constraint Programming Approach for Polytopic Simulation of Ordinary Differential Equations
36
RISC-V Based Hardware Acceleration of Interval Contractor Primitives in the Context of Mobile Robotics
35
Exponential State Enclosure Techniques for the Implementation of Validated Model Predictive Control
32
Robust Control and Actuator Fault Detection Based on an Iterative LMI Approach: Application on a Quadrotor
30
Current Issue