Browsing by Department "Taikomosios informatikos institutas / Institute of Applied Computer Science"
Now showing items 1-20 of 60
-
A comparison of accuracy and efficiency of parallel solvers for fractional power diffusion problems
(PPAM 2017: 12th International Conference on Parallel Processing and Applied Mathematics, September 10-13, 2017, Lublin, Poland : book of abstracts., 2017) -
A comparison of accuracy and efficiency of parallel solvers for fractional power diffusion problems
(Parallel Processing and Applied Mathematics : 12th international conference, PPAM 2017, Lublin, Poland, September 10–13, 2017 : revised selected papers, Part I / editors Roman Wyrzykowski, Jack Dongarra, Ewa Deelman, Konrad Karczewski, 2018)In this paper, we construct and investigate parallel solvers for three dimensional problems described by fractional powers of elliptic operators. The main aim is to make a scalability analysis of parallel versions of several ... -
A goal-oriented approach to dynamic business process simulation
(Frontiers in artificial intelligence and applications. Databases and information systems IX : conference proceedings of 12th International Baltic Conference on Databases and Information Systems 2016 (DB&IS 2016), Riga, Latvia, 4-6 July 2016, 2016)Nowadays, to stay competitive businesses must be able to quickly adapt to rapidly changing marketing environment and/or exploit new market opportunities. Simulation of business process allows to analyze various business ... -
A mixed-stable approach to the management of the portfolio using high-frequency financial data
(Information Technology and Control, 2017)This paper considers the problem of portfolio selection using high-frequency fnancial time series. Such time series often exhibit the stagnation effect when the assets’ returns are not changing. This effect causes a lot of ... -
Adaptation of parallel SaaS to heterogeneous co-located cloud resources
(Applied sciences, 2023)Cloud computing has received increasing attention due to its promise of delivering on-demand, scalable, and virtually unlimited resources. However, heterogeneity or co-location of virtual cloud resources can cause severe ... -
An approach for allocation of shared resources in the rule-based business process simulation
(CompSysTech '16 : proceedings of the 17th international conference on Computer Systems and Technologies 2016, Palermo, Italy, June 23-24, 2016, 2016)Simulation is an important business process (BP) analysis technique that allows modelling various process execution scenarios under different circumstances. One of the key factors that influence process execution is the ... -
Application of deep learning methods in host-based intrusion detection systems
(11th international workshop on data analysis methods for software systems, Druskininkai, Lithuania, November 28-30, 2019 / Lithuanian Computer Society, Vilnius University Institute of Data Science and Digital Technologies, Lithuanian Academy of Sciences, 2019)Protection of information plays an important role in the daily schedule of a modern company. Various types of businesses are dealing with a huge amount of sensitive data: it can be not only data belonging to the private ... -
Bayesian belief network application in process mining
(CompSysTech'14 : Proceedings of the 15th international conference on computer cystems and technologies, Ruse, Bulgaria, June 27, 2014, 2014)Business process mining gains more and more attention from both scientific and business communities. Its value has been recognized in information systems reverse engineering field as it allows discover knowledge about the ... -
Business process event log transformation into Bayesian belief network
(Information systems development: Transforming organisations and society through information systems : proceedings of the 23rd international conference on information systems development (ISD2014 Croatia), September 2-4, 2014, Varaždin, Croatia, 2014)Business process (BP) mining has been recognized in business intelligence and reverse engineering fields because of the capabilities it has to discover knowledge about the implementation and execution of BP for analysis ... -
Business process event log use for activity sequence analysis
(Electrical, Electronic and Information Sciences (eStream) : proceedings of the 2015 Open conference, 21 Apri, 2015, Vilnius, Lithuania / Vilnius Gediminas Technical University, 2015)It is mandatory for nowadays businesses to improve their processes to survive. The basis of this improvement is business process analysis. The analysis can be done in multiple ways but one of the state of the art solutions ... -
Comparative DEM-CFD study of binary interaction and acoustic agglomeration of aerosol microparticles at low frequencies
(Chemical engineering research and design, 2018)The paper concerns the problem of acoustic agglomeration due to the acoustic wake in diluted aerosols and addresses the development of the time-accurate discrete element method (DEM) simulation technique. The case of weak ... -
Content based model transformations: solutions to existing issues with application in information security
(International journal of computers, communications & control (IJCCC), 2016)Model-Driven Engineering uses models in various stages of the software engineering. To reduce the cost of modelling and production, models are reused by transforming. Therefore the accuracy of model transformations plays ... -
Controls-based approach for evaluation of information security standards implementation costs
(Technological and economic development of economy, 2017)According to the PricewaterhouseCoopers analysis, the average cost of a single information security and data protections breaches has increased twice during 2015 (PricewaterhouseCoopers 2015). Amount of organizations who ... -
Cost- and performance-aware resource selection for parallel software on heterogeneous cloud
(Concurrency and computation-practice & experience, 2023)Cloud providers offer flexible infrastructures and on‐demand services, including the capability to deploy low cost virtual resources of many different types. However, the diversity of cloud resources followed by the important ... -
Deployment of visualization software and GPU rendering on an OpenStack cloud infrastructure
(Civil-Comp proceedings : proceedings of The fourth international conference on parallel, distributed, grid and cloud computing for engineering, Dubrovnik, Croatia 24-27 March, 2015. Vol. 107, 2015)This paper presents the development of visualization software as a service on an OpenStack cloud infrastructure. Cloud service VisLT is developed for visualization of scientific results computed and stored on the private ... -
Development of cloud services for patient-specific simulations of blood flows through aortic valves
(Advances in engineering software, 2017)The paper presents the development of cloud software services for patient-specific computational analysis of blood flows through the aortic valve on a private university cloud. The main focus is on the software service ... -
Development of cloud software services for computational analysis of blood flows
(Civil-Comp proceedings : proceedings of The fourth international conference on parallel, distributed, grid and cloud computing for engineering, Dubrovnik, Croatia 24-27 March, 2015. Vol. 107, 2015)This paper presents the development of the cloud software services for computational analysis of blood flows on a private university cloud. The main focus is on the software service level built on the top of the computational ... -
Dinaminiuose verslo procesuose naudojamų išteklių modeliavimas
(18-osios Lietuvos jaunųjų mokslininkų konferencijos „Mokslas – Lietuvos ateitis“ teminė konferencija. IT sauga ir Informacinės sistemos = Proceedings of the 18th conference of Lithuanian junior researchers "Security of IT and information systems", 2015 m. balandžio 16 d., Vilnius, 2015)Kiekvieno verslo sėkmė priklauso nuo jo viduje vykdomų procesų. Dažnai organizacijos procesų optimizavimui yra naudojami verslo procesų modeliai, kurie leidžia analizuoti juos tam tikrose būsenose. Tačiau dažniausiai šie ... -
Directed acyclic graph extraction from event logs
(Information and Software Technologies : 20th International Conference, ICIST 2014, Druskininkai, Lithuania, October 9-10, 2014 : proceedings, 2014)The usage of probabilistic models in business process mining enables analysis of business processes in a more efficient manner. Although, the Bayes-ian belief network is one of the most common probabilistic models, ... -
Distributed parallel computing for visual cryptography algorithms
(Proceedings of the second international workshop on Sustainable Ultrascale Computing Systems (NESUS 2015), Krakow, Poland, September 10-11, 2015 / editors: Jesus Carretero, Javier Garcia Blas Roman Wyrzykowski, Emmanuel Jeannot, 2015)The recent activities to construct exascale and ultrascale distributed computational systems are opening a possibility to apply parallel and distributed computing techniques for applied problems which previously were ...
