


default search action
CompSysTech 2017: Ruse, Bulgaria
- Boris Rachev, Angel Smrikarov:

Proceedings of the 18th International Conference on Computer Systems and Technologies, CompSysTech 2017, Ruse, Bulgaria, June 23-24, 2017. ACM 2017, ISBN 978-1-4503-5234-5
Keynotes
- Marite Kirikova

:
Continuous Requirements Engineering. 1-10 - Darina Dicheva:

Gamification in Education: A Passing Trend or a Genuine Potential? 11
Artificial Intelligence
- Milena Karova, Nikola Vasilev, Ivaylo Penev:

Ant Colony Optimization Algorithm for Traffic Flow Estimation. 12-19 - Vadim Borisov, Alexander S. Fedulov, Yaroslav Fedulov

:
"Compatible" Fuzzy Cognitive Maps for Direct and Inverse Inference. 20-27 - Michael Zernov:

Situation Calculus for Multiple Action Representation. 28-35 - Antonio Maratea, Alfredo Petrosino, Mario Manzo

:
Extended Graph Backbone for Motif Analysis. 36-43 - Roman Guralnik

:
Incremental Rerouting Algorithm for single-vehicle VRPPD. 44-51 - Roumen Trifonov, Dilyana Valkova Budakova, Galya Pavlova:

Neural Network Application in Financial Area. 52-57 - Alexander I. Iliev

, Peter L. Stanchev:
Smart Multifunctional Digital Content Ecosystem Using Emotion Analysis of Voice. 58-64
Artificial Intelligence and Information Retrieval
- Kaja Zupanc, Milos Savic, Zoran Bosnic, Mirjana Ivanovic

:
Evaluating Coherence of Essays using Sentence-similarity Networks. 65-72 - Irina Kakanakova, Stefan Stoyanov:

Outlier Detection via Deep Learning Architecture. 73-79 - Peter Krátky, Tomás Repiský, Daniela Chudá:

Is the Visitor Reading or Navigating? 80-87 - Dessislava Petrova-Antonova, Olga Georgieva, Sylvia Ilieva

:
Modelling of Educational Data Following Big Data Value Chain. 88-95 - Angel Ivanov, Stanimira Deleva

, Milena Georgieva, Daniela Orozova
:
A Conceptual Model of a Virtual Collaboration Space for Bat Scientists. 96-102 - Tsvetanka Georgieva-Trifonova

:
Text Classification Based on Enriched Vector Space Model. 103-110 - Borislav Banchev:

Text Mining Based Adaptive Case Management Automation in the Field of Forensic Medicine. 111-118 - Rosen Ivanov

:
An Algorithm for Micro-localization in Large Public Buildings. 119-126
Operating Systems and Network Security
- Dobrin Tashev:

A Practical Approach to Spam Mitigation. 127-132 - Jarko Papalitsas, Sampsa Rauti, Ville Leppänen

:
A Comparison of Record and Play Honeypot Designs. 133-140 - Samuel Laurén, Sampsa Rauti, Ville Leppänen

:
A Survey on Application Sandboxing Techniques. 141-148 - Dimo Dimov, Yulian Tzonev

:
Pass-the-Hash: One of the Most Prevalent Yet Underrated Attacks for Credentials Theft and Reuse. 149-154 - Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis:

Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol. 155-162 - Dimitar Karev, Christopher McCubbin, Ruslan Vaulin:

Cyber Threat Hunting Through the Use of an Isolation Forest. 163-170 - Oskari Jahkola, Ari Happonen

, Antti Knutas
, Jouni Ikonen:
What Should Application Developers Understand about Mobile Phone Position Data. 171-178
Software Engineering
- Marko Saarela, Shohreh Hosseinzadeh, Sami Hyrynsalmi

, Ville Leppänen
:
Measuring Software Security from the Design of Software. 179-186 - Ekaterina A. Gorshkova, Boris Novikov

, Manoj Kumar Shukla:
A Fine-Grained Access Control Model and Implementation. 187-194 - Ján Lang, Peter Gabas:

Limited Resources Platform Implementation of Complex Event Processing System. 195-202 - Pekka Mäkiaho, Timo Poranen, Zheying Zhang

:
Requirements Management in Students' Software Development Projects. 203-210 - Dimitar Z. Dimitrov:

A System for Website Data Management in a Website Building System. 211-218 - Adela Bara

, Simona-Vasilica Oprea, Adina Uta, Osman Bülent Tör, Mahmut Erkut Cebeci:
Informatics Solutions for Smart Trading on Wholesale Electricity Markets Containing RES Bidders. 219-225
Image Processing and Computer Vision
- Mariana Stoeva

, Violeta Bozhikova
:
An Approach for Mammography Image Segmentation. 226-232 - Antoniya Tasheva, Zhaneta Tasheva

, Plamen Nakov:
Image Based Steganography Using Modified LSB Insertion Method with Contrast Stretching. 233-240 - Atanaska Bosakova-Ardenska

, Hristina Andreeva, Petya Boyanova, Peter Panayotov:
CutSurf: a Software Tool for Cut Surface Evaluation of White Cheese. 241-248 - Vesselin Pezhgorski, Milena Lazarova

:
Real Time GPU Accelerated Radar Scan Conversion and Visualization. 249-256 - Tzvetomir Ivanov Vassilev

:
Mass-spring Cloth Simulation with Shape Matching. 257-264
Hardware
- Ivan Ivanov, Vasilen Tsvetkov:

Intelligent Planting. 265-271 - Svetozar Ilchev

, Zlatoliliya Ilcheva:
Internet-of-Things Communication Protocol for Low-Cost Devices in Heterogeneous Wireless Networks. 272-279 - Aleksey Senkov, Aleksander Chepikov:

Fuzzy Model of an Intelligent Agent Behaviour and Method of Fire Extinguishing Control. 280-287
e-Learning
- Léon J. M. Rothkrantz:

An Affective Distant Learning Model Using Avatars as User Stand-in. 288-295 - Greta Koleva

, Despina Georgieva
, Yavor Stefanov:
A Conceptual Model of an Electronic Appendix Called "Nursing file for palliative care", for Training Students from the Speciality of Nurse. 296-301 - Valentina Terzieva

, Katia Todorova, Yuri Pavlov, Petia Kademova-Katzarova:
Utility and Optimal Usage of ICT in Schools. 302-309 - Galya Shivacheva, Veselina Ivanova Nedeva

, Svetoslav Atanasov
:
Designing a Virtual Laboratory for Teaching Programming. 310-317 - Yuksel Aliev

, Vasil Kozov
, Galina Ivanova
, Aleksandar Ivanov
:
3D Augmented Reality Software Solution for Mechanical Engineering Education. 318-325 - Adriana N. Borodzhieva

:
MATLAB-Based Software Tool for Implementation of Bifid Ciphers. 326-333

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














