


default search action
Computer Science and Information Systems, Volume 11
Volume 11, Number 1, 2014
- Feng Chen, Da Tang, Hongji Yang, Mohammed Alawairdhi:

A precondition-based approach to workflow oriented software re-engineering. 1-27 - Ricardo Colomo-Palacios

, José Luis López Cuadrado, Israel González-Carrasco
, Francisco José García-Peñalvo
:
SABUMO-dTest: Design and evaluation of an intelligent collaborative distributed testing framework. 29-45 - Patricia Conde

, Francisco Ortin
:
JINDY: A java library to support invokedynamic. 47-68 - Anna Yarygina

, Boris Novikov
:
Optimizing resource allocation for approximate real-time query processing. 69-88 - Vladimir Rankovic

, Mikica Drenovak
, Boban S. Stojanovic
, Zoran Kalinic
, Zora Arsovski
:
The mean-value at risk static portfolio optimization using genetic algorithm. 89-109 - Tomas Grigalis, Antanas Cenys

:
Using XPaths of inbound links to cluster template-generated web pages. 111-131 - Nicolas Béchet, Jacques Chauché, Violaine Prince, Mathieu Roche

:
How to combine text-mining methods to validate induced Verb-Object relations? 133-155 - Dongjin Choi, Myunggwon Hwang, Jeongin Kim, Byeong-Kyu Ko, Pankoo Kim:

Tracing trending topics by analyzing the sentiment status of tweets. 157-169 - Grzegorz J. Nalepa

, Szymon Bobek
:
Rule-based solution for context-aware reasoning on mobile devices. 171-193 - Antonio González-Pardo

, Angeles Rosa, David Camacho
:
Behaviour-based identification of student communities in virtual worlds. 195-213 - Duc Nguyen Trung, Jason J. Jung

:
Sentiment analysis based on fuzzy propagation in online social networks: A case study on TweetScope. 215-228 - Rafeeque Pandara Chalil, Sendhilkumar Selvaraju

:
Same wavelength group identification from online social networks: A general framework. 229-239 - Namhee Lee, Jason J. Jung

, Ali Selamat, Dosam Hwang:
Black-box testing of practical movie recommendation systems: A comparative study. 241-249 - Manamiary Bruno Andriamiarina, Dominique Méry, Neeraj Kumar Singh:

Revisiting snapshot algorithms by refinement-based techniques. 251-270 - Xiuqiao Li, Limin Xiao, Ke Xie, Bin Dong, Ruan Li, Dongmei Liu:

Towards hybrid client-side cache management in network-based file systems. 271-289 - Yining Zhao, Alan Wood:

Duplication problem in treaty systems: Causes and solutions. 291-308 - Hui Tian, Yingpeng Sang, Hong Shen, Chunyue Zhou:

Probability-model based network traffic matrix estimation. 309-320 - Alexander Nussbaumer

, Daniel Dahrendorf, Hans-Christian Schmitz, Milos Kravcik, Marcel Berthold, Dietrich Albert
:
Recommender and guidance strategies for creating personal mashup learning environments. 321-342 - Athanasios Staikopoulos, Ian O'Keeffe

, Rachael Rafter, Eddie Walsh, Bilal Yousuf
, Owen Conlan
, Vincent Wade:
AMASE: A framework for supporting personalised activity-based learning on the web. 343-367 - Javier Torrente, Ángel del Blanco, Ángel Serrano-Laguna, Jose Angel Vallejo Pinto, Pablo Moreno-Ger

, Baltasar Fernández-Manjón
:
Towards a low cost adaptation of educational games for people with disabilities. 369-391 - Killian Levacher, Séamus Lawless

, Vincent Wade:
Slicepedia: Content-agnostic slicing resource production for adaptive hypermedia. 393-417 - Mart Laanpere

, Kai Pata
, Peeter Normak, Hans Poldoja:
Pedagogy-driven design of digital learning ecosystems. 419-442 - Evgeny Bogdanov, Carsten Ullrich

, Erik Isaksson, Matthias Palmér, Denis Gillet:
Towards PLEs throughwidget spaces in Moodle. 443-460
Volume 11, Number 2, 2014
- Nuno Castela

, Paulo Dias, Marielba Zacarias
, José Tribolet
:
Collaborative method to maintain business process models updated. 461-480 - Clemente Rafael Borges

, José A. Macías
:
Facilitating the interaction with data warehouse schemas through a visual web-based approach. 481-501 - Ondrej Macek, Karel Richta:

Application and relational database co-refactoring. 503-524 - George Drosatos

, Pavlos S. Efraimidis:
User-centric privacy-preserving statistical analysis of ubiquitous health monitoring data. 525-548 - Péter Szilágyi:

Iris: A decentralized approach to backend messaging middlewares. 549-567 - Dragoljub Krneta, Vladan Jovanovic, Zoran Marjanovic

:
A direct approach to physical Data Vault design. 569-599 - Yousef Abuadlla, Goran S. Kvascev

, Slavko Gajin
, Zoran Jovanovic:
Flow-based anomaly intrusion detection system using two neural network stages. 601-622 - Emhimed Salem Alatrish, Dusan Tosic, Nikola Milenkovic:

Building ontologies for different natural languages. 623-644 - Luka Pavlic, Vili Podgorelec

, Marjan Hericko:
A question-based design pattern advisement approach. 645-664 - Stefanos Ougiaroglou

, Georgios Evangelidis:
Efficient data abstraction using weighted IB2 prototypes. 665-678 - Sonja Ristic, Slavica Aleksic, Milan Celikovic, Ivan Lukovic

:
Generic and standard database constraint meta-models. 679-696 - Costin Badica

, Nick Bassiliades
, Sorin Ilie
, Kalliopi Kravari
:
Agent reasoning on the web using web services? 697-721 - Eirini Christinaki

, Nikolas Vidakis
, Georgios A. Triantafyllidis
:
A novel educational game for teaching emotion identification skills to preschoolers with autism diagnosis. 723-743 - Dimitrios Karapiperis

, Vassilios S. Verykios
:
A distributed near-optimal LSH-based framework for privacy-preserving record linkage. 745-763 - Julio Rojas-Mora

, Jaime Maria Gil-Lafuente:
An asymmetric index to compare trapezoidal fuzzy numbers. 765-778 - Anna Maria Gil Lafuente, Anna Klimova:

Approximation to the theory of affinities to manage the problems of the grouping process. 779-796 - Yehun Xu, Carlos Llopis-Albert

, Joaquín González:
An application of structural equation modeling for continuous improvement. 797-808 - Eduard Edelhauser

, Andreea Ionica
:
A business intelligence software made in Romania: A solution for Romanian companies during the economic crisis. 809-823 - Jorge de Andrés-Sánchez:

Fuzzy claim reserving in non-life insurance. 825-838 - Shouzhen Zeng

, Qifeng Wang, José M. Merigó
, Tiejun Pan:
Induced intuitionistic fuzzy ordered weighted averaging: Weighted average operator and its application to business decision-making. 839-857 - Antonio Terceño Gómez, Glòria M. Barberà-Mariné

, Hernán Pedro Vigier, Yanina Laumann:
Stability of beta coefficients of sector and subsector portfolios in an uncertain environment. 859-880 - Vasile Georgescu:

Joint propagation of ontological and epistemic uncertainty across risk assessment and fuzzy time series models. 881-904
Volume 11, Number 3, 2014
- Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, William Cheng-Chung Chu:

A true Random-Number Encryption Method employing block cipher and PRNG. 905-924 - Chin-Ling Chen, Woei-Jiunn Tsaur, Yu-Yi Chen, Yao-Chung Chang:

A secure mobile DRM system based on cloud architecture. 925-941 - Mohammadreza Sahebi Shahamabadi, Borhanuddin Mohd Ali, Nor Kamariah Noordin, Mohd Fadlee A. Rasid, Pooria Varahram

, Antonio J. Jara
:
A NEMO-HWSN solution to support 6LoWPAN network mobility in hospital wireless sensor network. 943-960 - Hae-Min Moon, Sung Bum Pan:

Long distance face recognition for enhanced performance of internet of things service interface. 961-974 - Tianhan Gao, Nan Guo, Kangbin Yim, Qianyi Wang:

PPS: A privacy-preserving security scheme for multi-operator wireless mesh networks with enhanced user experience. 975-999 - Hae-Duck Joshua Jeong, Sang-Kug Ye, Jiyoung Lim, Ilsun You, WooSeok Hyun:

A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies. 1001-1016 - Young-Long Chen, Mu-Yen Chen

, Fu-Kai Cheung, Yung-Chi Chang:
A new hybrid architecture with an intersection-based coverage algorithm in wireless sensor networks. 1017-1035 - Tae Rim Lee, Hyejoo Lee, Kyung Hyune Rhee, Sang-Uk Shin:

The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data. 1037-1054 - Yongman Han, JongCheon Choi, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, Minkyu Park:

A new detection scheme of software copyright infringement using software birthmark on windows systems. 1055-1069 - Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:

Pairwise and group key setup mechanism for secure machine-to-machine communication. 1071-1090 - Hsing-Chung Chen, Cheng-Ying Yang, Hui-Kai Su, Ching-Chuan Wei, Chao-Ching Lee:

A secure e-mail protocol using ID-based FNS multicast mechanism. 1091-1112 - Hyoungwoo Park, Il Yeon Yeo, Jongsuk Ruth Lee, Haengjin Jang:

Study on network architecture of big data center for the efficient control of huge data traffic. 1113-1126 - Guowei Wu, Xiaojie Chen, Lin Yao, Youngjun Lee, Kangbin Yim:

An efficient wormhole attack detection method in wireless sensor networks. 1127-1141 - Chien-Erh Weng, Jyh-Horng Wen, Hsing-Chung Chen, Lie Yang:

The performance analysis of direct/cooperative transmission to support QoS in WLANs. 1143-1156 - Guangzhi Zhang, Yunchuan Sun, Mengling Xu, Rongfang Bie:

Weibo clustering: A new approach utilizing users' reposting data in social networking services. 1157-1172 - Neng-Yih Shih, Hsing-Chung Chen:

An approach for selecting candidates in soft-handover procedure using multi-generating procedure and second grey relational analysis. 1173-1190
Volume 11, Number 4, 2014
- Nuno Ramos Carvalho

, Alberto Simões
, José João Almeida
:
DMOSS: Open source software documentation assessment. 1197-1207 - David Cunha, Pedro Neves, Pedro Nuno Miranda de Sousa:

PaaS manager: A platform-as-a-service aggregation framework. 1209-1228 - Eduardo Alves Portela Santos

, Agnelo Denis Vieira
, Sauro Schaidt, Eduardo de Freitas Rocha Loures:
Modeling constraint-based processes: A supervisory control theory application. 1229-1247 - Luís Filipe Teófilo, Luís Paulo Reis

, Henrique Lopes Cardoso
, Pedro Mendes:
Rule based strategies for large extensive-form games: A specification language for No-Limit Texas Hold'em agents. 1249-1269 - Maja Pusnik, Marjan Hericko, Zoran Budimac

, Bostjan Sumak
:
XML schema metrics for quality evaluation. 1271-1289 - Shams Zawoad, Marjan Mernik, Ragib Hasan

:
Towards building a forensics aware language for secure logging. 1291-1314 - Stanislav Böhm, Marek Behalek

, Ondrej Meca, Martin Surkovský
:
Visual programming of MPI applications: Debugging, performance analysis, and performance prediction. 1315-1336 - Jakub Kroustek, Fridolín Pokorný, Dusan Kolár:

A new approach to instruction-idioms detection in a retargetable decompiler. 1337-1359 - Reed Milewicz, Marjan Mernik, Peter Pirkelbauer:

SimpleConcepts: A lightweight extension to C++ to support constraints on generic types. 1361-1379 - Ivan Simecek

, Pavel Tvrdík:
A new code transformation technique for nested loops. 1381-1416 - Georgios Fourtounis, Nikolaos S. Papaspyrou

, Panagiotis Theofilopoulos:
Modular polymorphic defunctionalization. 1417-1434 - João Santos, Ricardo Rocha

:
A team-based scheduling model for interfacing or-parallel prolog engines. 1435-1454 - Milan Nosál

, Jaroslav Porubän
:
XML to annotations mapping definition with patterns. 1455-1477 - Ricardo Queirós

, José Paulo Leal
, José Campos:
Sequencing educational resources with Seqins. 1479-1497 - Gergely Dévai, Zoltán Gera, Zoltán Kelemen:

Language abstractions for low level optimization techniques. 1499-1514 - Tomas Skersys

, Kestutis Kapocius, Rimantas Butleris
, Tomas Danikauskas:
Extracting business vocabularies from business process models: SBVR and BPNM standards-based approach. 1515-1535 - Christos Malliarakis

, Maya Satratzemi, Stelios Xinogalos
:
Optimization of server performance in the CMX educational MMORPG for computer programming. 1537-1553 - Jakub Flotynski

, Krzysztof Walczak
:
Semantic representation of multi-platform 3D content. 1555-1580 - Valery I. Korzhik, Guillermo Morales-Luna, Alexander Kochkarev, Dmitriy Flaxman:

Concatenated digital watermarking system robust to different removal attacks. 1581-1594 - Marco Querini

, Giuseppe F. Italiano
:
Reliability and data density in high capacity color barcodes. 1595-1615 - Tomasz Kryjak

, Mateusz Komorkiewicz, Marek Gorgon:
Real-time implementation of foreground object detection from a moving camera using the ViBe algorithm. 1617-1637

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














