


default search action
Computer Science and Information Systems, Volume 10
Volume 10, Number 1, 2013
- Vesna Pajic, Dusko Vitas, Gordana Pavlovic-Lazetic, Milos Pajic:
WebMonitoring software system: Finite state machines for monitoring the web. 1-23 - Dusan Okanovic, André van Hoorn, Zora Konjovic, Milan Vidakovic:
SLA-driven adaptive monitoring of distributed applications for performance problem localization. 25-50 - Juan M. Alberola
, Jose M. Such, Vicente J. Botti
, Agustín Espinosa
, Ana García-Fornes
:
A scalable multiagent platform for large systems. 51-77 - Guillem Rull, Carles Farré
, Ernest Teniente, Toni Urpí:
Validation of schema mappings with nested queries. 79-104 - Ayman Jaradat
, Ahmed Patel, M. N. Zakaria, Muhamad A. H. Amina:
Accessibility algorithm based on site availability to enhance replica selection in a data grid environment. 105-132 - Raka Jovanovic
, Milan Tuba
:
Ant colony optimization algorithm with pheromone correction strategy for the minimum connected dominating set problem. 133-149 - Stevan Gostojic
, Branko Milosavljevic
, Zora Konjovic:
Ontological model of legal norms for creating and using legislation. 151-171 - George Lagogiannis, Nikos A. Lorentzos, Alexander B. Sideridis:
Indexing moving objects: A real time approach. 173-195 - Jian Shu, Ming Hong, Wei Zheng, Limin Sun, Xu Ge:
Multi-sensor data fusion based on consistency test and sliding window variance weighted algorithm in sensor networks. 197-214 - Yong-Xin Zhang, Qing-Zhong Li, Zhao-Hui Peng:
A novel method for data conflict resolution using multiple rules. 215-235 - Boban Vesin
, Mirjana Ivanovic
, Aleksandra Klasnja-Milicevic
, Zoran Budimac
:
Ontology-based architecture with recommendation strategy in java tutoring system. 237-261 - George S. Oreku, Fredrick Japhet Mtenzi
, Ali Al-Dahoud:
A viewpoint of Tanzania e-commerce and implementation barriers. 263-281 - Slavica Aleksic, Sonja Ristic, Ivan Lukovic
, Milan Celikovic:
A design specification and a server implementation of the inverse referential integrity constraints. 283-320 - Tomas Potuzak
:
Methods for division of road traffic network for distributed simulation performed on heterogeneous clusters. 321-348 - Andreas Attenberger, Klaus Buchenrieder
:
Modeling and visualization of classification-based control schemes for upper limb prostheses. 349-367 - Miroslav Popovic
, Miodrag Djukic
, Vladimir Marinkovic, Nikola Vranic:
On task tree executor architectures based on intel parallel building blocks. 369-392 - Xi Wu, Huibiao Zhu, Yongxin Zhao, Zheng Wang, Si Liu
:
Modeling and verifying the Ariadne protocol using process algebra. 393-421 - Bojan Mrazovac, Milan Z. Bjelica
, Dragan Kukolj
, Branislav M. Todorovic
, Sasa Vukosavljev:
System design for passive human detection using principal components of the signal strength space. 423-452 - Saad Mubeen
, Jukka Mäki-Turja, Mikael Sjödin:
Support for end-to-end response-time and delay analysis in the industrial tool suite: Issues, experiences and a case study. 453-482 - Bernd Tessendorf, Matjaz Debevc, Peter Derleth, Manuela Feilner, Franz Gravenhorst, Daniel Roggen
, Thomas Stiefmeier, Gerhard Tröster:
Design of a multimodal hearing system. 483-501 - Radovan Stojanovic, Sasa Knezevic, Dejan Karadaglic
, Goran Devedzic
:
Optimization and implementation of the wavelet based algorithms for embedded biomedical signal processing. 502-523 - Nenad Filipovic, Velibor Isailovic, Dalibor Nikolic
, Aleksandar Peulic, Nikola Mijailovic, Suzana Petrovic
, Sasa Cukovic
, Radun Vulovic
, Aleksandar Matic, Nebojsa Zdravkovic
, Goran Devedzic
, Branko Ristic:
Biomechanical modeling of knee for specific patients with chronic anterior cruciate ligament injury. 525-545 - Aleksandar Peulic
, Natasa Milojevic, Emil Jovanov
, Milos D. Radovic, Igor Saveljic
, Nebojsa Zdravkovic
, Nenad Filipovic:
Modeling of arterial stiffness using variations of pulse transit time. 547-565
Volume 10, Number 2, 2013
- Fei Song, Huachun Zhou, Sidong Zhang, Hongke Zhang, Ilsun You:
The throughput critical condition study for reliable multipath transport. 567-587 - Chin-Ling Chen, Yu-Ting Tsai, Aniello Castiglione
, Francesco Palmieri
:
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks. 589-609 - Jinjing Zhao, Yan Wen:
Evaluation on the influence of internet prefix hijacking events. 611-631 - Byungha Choi, Kyungsan Cho:
Two-step hierarchical scheme for detecting detoured attacks to the web server. 633-649 - Der-Chen Huang, Yi-Wei Lee, Hsiang-Wei Wu:
An efficient GTS allocation scheme for IEEE 802.15.4 MAC layer. 651-665 - Jianfeng Wang
, Hua Ma, Qiang Tang
, Jin Li, Hui Zhu, Siqi Ma
, Xiaofeng Chen:
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. 667-684 - Ho-Seok Kang, Sung-Ryul Kim, Pankoo Kim:
Traffic deflection method for dos attack defense using a location-based routing protocol in the sensor network. 685-701 - Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
Design and implementation of E-discovery as a service based on cloud computing. 703-724 - Jinhai Huo, Bowen Deng, Shuhang Wu, Jian Yuan, Ilsun You:
A topographic-awareness and situational-perception based mobility model with artificial bee colony algorithm for tactical MANET. 725-746 - Hae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun, Arisu An:
A real-time location-based SNS smartphone application for the disabled population. 747-765 - Myunggwon Hwang, Do-Heon Jeong, Jinhyung Kim, Sa-Kwang Song, Hanmin Jung:
Activity inference for constructing user intention model. 767-778 - Hsing-Chung Chen, Marsha Anjanette Violetta, Chien-Erh Weng, Tzu-Liang Kung:
Cognitive RBAC in mobile heterogeneous networks. 779-806 - Yong-Hwan Lee, Bonam Kim, Sang-Burm Rhee:
Content-based image retrieval using spatial-color and Gabor texture on a mobile device. 807-823 - Jen-Wei Hu
, Chu-Sing Yang, Te-Lung Liu:
Design and implementation of an efficient and programmable future internet testbed in Taiwan. 825-842 - Inshil Doh, Jiyoung Lim, Kijoon Chae:
Key management approach for secure mobile open IPTV service. 843-864 - Bing Bai, Zhenqian Feng, Baokang Zhao, Jinshu Su
:
Benefiting from the community structure in opportunistic forwarding. 865-876 - Jyh-Horng Wen, Yung-Cheng Yao, Ying-Chih Kuo:
Wiener-based ICI cancellation schemes for OFDM systems over fading channels. 877-896 - Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai:
Efficient implementation for QUAD stream cipher with GPUs. 897-911 - Tianhan Gao, Nan Guo, Kangbin Yim:
A hybrid approach to secure hierarchical mobile IPv6 networks. 913-938
Volume 10, Number 3, 2013
- Goran Sladic, Branko Milosavljevic
, Zora Konjovic:
Context-sensitive access control model for business processes. 939-972 - A. J. Gilbert Silvius
, Joanna Turkiewicz
, Aleksandar Keratsinov, Harm Spoor:
The relationship between it outsourcing and business and it alignment: An explorative study. 973-998 - José Ignacio Panach
, Natalia Juristo Juzgado, Oscar Pastor
:
Including functional usability features in a model-driven development method. 999-1024 - Luka Vrdoljak, Vedran Podobnik, Gordan Jezic:
Forecasting the acceptance of new information services by using the semantic-aware prediction model. 1025-1052 - Anna Formica
, Elaheh Pourabbas, Maurizio Rafanelli:
Constraint relaxation of the polygon-polyline topological relation for geographic pictorial query languages. 1053-1075 - Justin Terry, Bela Stantic:
Indexing method for multidimensional vector data. 1077-1104 - Jiafu Wan
, Min Chen, Feng Xia
, Di Li, Keliang Zhou:
From machine-to-machine communications towards cyber-physical systems. 1105-1128 - Cristian Mateos
, Alejandro Zunino
, Matías Hirsch
:
EasyFJP: Providing hybrid parallelism as a concern for divide and conquer java applications. 1129-1163 - Eduardas Bareisa, Vacius Jusas
, Kestutis Motiejunas, Rimantas Seinauskas:
Functional delay test generation approach using a software prototype of the circuit. 1165-1184 - Tatjana Lutovac, James Harland
:
A contribution to automated-oriented reasoning about permutability of sequent calculi rules. 1185-1210 - Jinho Ahn:
Mobile agent group communication ensuring reliability and totally-ordered delivery. 1211-1228 - Atif Alamri, M. Anwar Hossain, Mohammad Mehedi Hassan, M. Shamim Hossain, Mohammed Abdullah Alnuem, Dewan Tanvir Ahmed, Abdulmotaleb El-Saddik
:
A cloud-based pervasive serious game framework to support obesity treatment. 1229-1246 - Alaa Ismail Elnashar, Sultan Aljahdali:
Experimental and theoretical speedup prediction of MPI-based applications. 1247-1267 - Zhenhua Tan
, Guangming Yang, Wei Cheng, Xingwei Wang:
Distributed secret sharing scheme based on personalized spherical coordinates space. 1269-1291 - Yanwei Yu, Qin Wang, Xiaodong Wang, Huan Wang, Jie He:
Online clustering for trajectory data stream of moving objects. 1293-1317 - Elnomery Allam Zanaty, Ahmed S. Ghiduk
:
A novel approach based on genetic algorithms and region growing for magnetic resonance image (MRI) segmentation. 1319-1342 - Lingling Zi, Junping Du, Lisha Hou, Xiangda Sun, Jangmyung Lee:
Perception-driven resizing for dynamic image sequences. 1343-1357 - Vanja Lukovic
, Danijela Milosevic, Goran Devedzic
, Sasa Cukovic
:
Converting OBR-scolio ontology in OWL DL. 1359-1385 - Michele Fiorentino
, Antonio E. Uva
, Mario Massimo Foglia
, Vitoantonio Bevilacqua
:
Asymmetry measurement for vibroactive correction in lower limbs mobility. 1387-1406 - Rupesh Ghyar, Karupppasamy Subburaj
, Bhallamudi Ravi, Manish Agarwal
:
Adaptive probabilistic approach for selecting tumour knee prosthesis. 1407-1428 - Petar Rajkovic, Dragan Jankovic
, Aleksandar Milenkovic
:
Developing and deploying medical information systems for Serbian public healthcare: Challenges, lessons learned and guidelines. 1429-1454 - Igor Kulev, Elena Vlahu-Gjorgievska
, Vladimir Trajkovik
, Saso Koceski
:
Development of a novel recommendation algorithm for collaborative health: Care system model. 1455-1471 - Nikola Vitkovic
, Jelena Milovanovic
, Nikola Korunovic
, Miroslav Trajanovic
, Milos Stojkovic
, Dragan Misic
, Stojanka Arsic:
Software system for creation of human femur customized polygonal models. 1473-1497
Volume 10, Number 4, 2013
- Wiktor Nowakowski, Michal Smialek
, Albert Ambroziewicz, Tomasz Straszak:
Requirements-level language and tools for capturing software system essence. 1499-1524 - Sebla Demirkol, Moharram Challenger
, Sinem Getir, Tomaz Kosar, Geylani Kardas
, Marjan Mernik:
A DSL for the development of software agents working within a semantic web environment. 1525-1556 - Igor Rozanc, Bostjan Slivnik:
Using reverse engineering to construct the platform independent model of a web application for student information systems. 1557-1583 - Verislav Djukic
, Ivan Lukovic
, Aleksandar Popovic, Vladimir Ivancevic:
Model execution: An approach based on extending domain-specific modeling with action reports. 1585-1620 - Zdenek Rybola, Karel Richta:
Possible realizations of multiplicity constraints. 1621-1646 - Dániel Leskó
, Máté Tejfel
:
Testing framework for embedded languages. 1647-1659 - Hemang Mehta, S. J. Balaji, Dharanipragada Janakiram:
Extending programming language to support object orientation in legacy systems. 1661-1672 - Jakub Kroustek, Dusan Kolár:
Context parsing (not only) of the object-file-format description language. 1673-1701 - Peter J. Hancox, Nikolaos Polatidis
:
An evaluation of keyword, string similarity and very shallow syntactic matching for a university admissions processing infobot. 1703-1726 - José Paulo Leal
:
Using proximity to compute semantic relatedness in RDF graphs. 1727-1746 - Carlos Monteiro, José Paulo Leal
:
Managing experiments on cognitive processes in writing with HandSpy. 1747-1773 - Miguel Areias
, Ricardo Rocha
:
Batched evaluation of linear tabled logic programs. 1775-1797 - Gregor Rohbogner, Ulf Hahnel, Pascal Benoit, Simon Fey:
Multi-agent systems' asset for smart grid applications. 1799-1822 - Jörg Bremer, Michael Sonnenschein:
Model-based integration of constrained search spaces into distributed planning of active power provision. 1823-1854

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.