


default search action
Computer Science and Information Systems, Volume 12
Volume 12, Number 1, 2015
- Vuk Batanovic

, Dragan Bojic
:
Using part-of-speech tags as deep-syntax indicators in determining short-text semantic similarity. 1-31 - Balázs Kósa, Márton Balassi, Péter Englert, Attila Kiss

:
Betweenness versus Linerank. 33-48 - Darius Birvinskas, Vacius Jusas

, Ignas Martisius, Robertas Damasevicius:
Fast DCT algorithms for EEG data compression in embedded systems. 49-62 - Mirjana Maksimovic

, Vladimir Vujovic, Branko Perisic
, Vladimir Milosevic:
Developing a fuzzy logic based system for monitoring and early detection of residential fire based on thermistor sensors. 63-89 - Víctor M. Prieto, Manuel Álvarez

, Victor Carneiro
, Fidel Cacheda
:
Distributed and collaborative Web Change Detection system. 91-114 - Nikos Vesyropoulos, Christos K. Georgiadis

:
Customized QoS-based mashups for the web of things: An application of AHP. 115-133 - Francesco Di Tria, Ezio Lefons, Filippo Tangorra:

Academic data warehouse design using a hybrid methodology. 135-160 - Belén Cruz Zapata, José Luis Fernández-Alemán, Ambrosio Toval:

Security in cloud computing: A mapping study. 161-184 - Tuong Tri Nguyen, Jason J. Jung

:
Exploiting geotagged resources to spatial ranking by extending HITS algorithm. 185-201 - Pedro J. Muñoz Merino

, Carlos Delgado Kloos
, Mario Muñoz Organero
, Abelardo Pardo
:
A software engineering model for the development of adaptation rules and its application in a hinting adaptive e-learning system. 203-231 - Enayat Rajabi, Miguel-Ángel Sicilia

, Salvador Sánchez-Alonso
:
Interlinking educational resources to Web of Data through IEEE LOM. 233-255 - Juan Manuel Carrillo de Gea

, Joaquín Nicolás, José Luis Fernández-Alemán, Ambrosio Toval, Christof Ebert, Aurora Vizcaíno
:
Commonalities and differences between requirements engineering tools: A quantitative approach. 257-288 - Chao Wang

, Aiye Shi, Xin Wang, Fengchen Huang, Hui Liu:
A novel registration method for high resolution remote sensing images based on JSEG and NMI. 289-306 - Laksono Kurnianggoro, Van-Dung Hoang

, Kang-Hyun Jo
:
Calibration of a 2D laser scanner system and rotating platform using a point-plane constraint. 307-322 - Laura C. Rodríguez-Martínez, Hector A. Duran-Limon, Ricardo Mendoza González, Jaime Muñoz Arteaga:

Identifying common activities in the graphical user interface development process and their integration into the software-system development life cycle. 323-348
Volume 12, Number 2, 2015
- Jian Wang, Baigen Cai, Jiang Liu, Wei ShangGuan:

A lane-changing behavioral preferences learning agent with its applications. 349-374 - Sohaib Hamioud, Fadila Atil:

Model-driven Java code refactoring. 375-403 - Sanja Maksimovic-Moicevic, Zeljko Lukac, Miodrag R. Temerinac:

Edge-texture 2D image quality metrics suitable for evaluation of image interpolation algorithms. 405-425 - Fan Zhang

, Zhike Han, Hanyu Ge, Yingping Zhu:
Optimization design of traffic flow under security based on cellular automata model. 427-443 - Paulo Pombinho de Matos

, Maria Beatriz Carmo
, Ana Paula Afonso
:
Adaptive mobile visualization - the chameleon framework. 445-464 - Dejan I. Mancev, Branimir Todorovic:

K-best max-margin approaches for sequence labeling. 465-486 - Jovana Bozic, Djordje Babic

:
EUR/RSD exchange rate forecasting using hybrid wavelet-neural model: A case study. 487-508 - Mateja Kocbek

, Gregor Jost, Marjan Hericko, Gregor Polancic:
Business process model and notation: The current state of affairs. 509-539 - Carlos Blanco

, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
, Juan Trujillo
:
An MDA approach for developing secure OLAP applications: Metamodels and transformations. 541-565 - Eloy Vicente, Alfonso Mateos

, Antonio Jiménez-Martín
:
Fuzzified risk management: Selection of safeguards to minimize the maximum risk. 567-585 - Mirko Suznjevic, Lea Skorin-Kapov

, Iztok Humar:
Statistical user behavior detection and QoE evaluation for thin client services. 587-605 - Flávio Rodrigues, Nuno Oliveira, Luís Soares Barbosa

:
Towards an engine for coordination-based architectural reconfigurations. 607-634 - José Paulo Leal

, Teresa Costa:
Tuning a semantic relatedness algorithm using a multiscale approach. 635-654 - Tomás Cerný

, Miroslav Macik, Michael J. Donahoo, Jan Janousek
:
On distributed concern delivery in user interface design. 655-681 - Jaroslav Porubän

, Michaela Bacíková
, Sergej Chodarev
, Milan Nosál
:
Teaching pragmatic model-driven software development. 683-705 - Tomasz Straszak, Michal Smialek

:
Model-driven acceptance test automation based on use cases. 707-728 - Juan Luo

, Qiu Pan, Zanyi He:
VANET middleware for service sharing based on OSGI. 729-742 - Zongchen Fan, Xiaogang Qiu, Weihui Dai

, Yuanzheng Ge, Liang Liu, Yunsuo Duan:
A meta-modeling framework for a specific social domain: Public opinion event. 743-765 - Hui He, Yana Feng, Zhigang Li, Zhenguang Zhu, Weizhe Zhang, Albert Mo Kim Cheng

:
Dynamic load balancing technology for cloud-oriented CDN. 765-786 - Fei Zhu, Quan Liu, Shan Zhong, Yang Yang:

Human-level moving object recognition from traffic video. 787-799 - Kyoungsoo Bok, Eunkyung Ryu, Junho Park, Jaijin Jung, Jaesoo Yoo:

Multimedia congestion control in wireless sensor networks. 801-821 - Wei Liang

, Keshou Wu, Yong Xie, Jiajun Duan:
TDCM: An IP watermarking algorithm based on two dimensional chaotic mapping. 823-841 - Zuo Chen, Mengyuan Jia, Bing Yang, Xiaodong Li:

Detecting overlapping community in complex network based on node similarity. 843-855 - Muhammad Khurram Khan

, Ankita Chaturvedi, Dheerendra Mishra
, Saru Kumari
:
On the security enhancement of integrated electronic patient records information systems. 857-872 - Jiansheng Liu, Shangping Qiao:

A image segmentation algorithm based on differential evolution particle swarm optimization fuzzy c-means clustering. 873-893 - Jian Shu, Shandong Jiang, Qun Liu, Linlan Liu, Xiaotian Geng:

A connectivity monitoring model of opportunistic sensor network based on evolving graph. 895-909
Volume 12, Number 3, 2015
- Nenad Stefanovic

:
Collaborative predictive business intelligence model for spare parts inventory replenishment. 911-930 - Miguel Ferro de Beca, João Sarraipa, Carlos Agostinho

, Fernando Gigante
, Maria José Nuñez
, Ricardo Jardim-Gonçalves
:
A framework for enterprise context analysis based on semantic principles. 931-960 - Sinisa Neskovic

, Rade Matic:
Context modeling based on feature models expressed as views on ontologies via mappings. 961-977 - Milos Stojkovic

, Milan Trifunovic
, Dragan Misic, Miodrag Manic:
Towards analogy-based reasoning in semantic network. 979-1008 - Milan Zdravkovic

, Ovidiu Noran
, Hervé Panetto, Miroslav Trajanovic
:
Enabling interoperability as a property of ubiquitous systems for disaster management. 1009-1031 - Dubravka Sladic

, Aleksandra Radulovic
, Miro Govedarica
, Dusan Jovanovic
, Dorde Przulj:
The use of ontologies in cadastral systems. 1033-1053 - Milos Bogdanovic

, Aleksandar S. Stanimirovic
, Leonid Stoimenov
:
An approach for the development of context-driven web map solutions based on interoperable GIS platform. 1055-1078 - Alexis Aubry

, Hervé Panetto, Michele Dassisti
:
Toward an interoperable software platform for sustainable energy. 1079-1100 - Marija Jankovic, Miroslav Ljubicic, Nenad Anicic

, Zoran Marjanovic
:
Enhancing BPMN 2.0 informational perspective to support interoperability for cross-organizational business processes. 1101-1120
Volume 12, Number 4, 2015
- Mirjana Ivanovic

, Zoran Budimac
, Milos Radovanovic
, Vladimir Kurbalija
, Weihui Dai
, Costin Badica
, Mihaela Colhon
, Srdan Ninkovic, Dejan Mitrovic:
Emotional agents - state of the art and applications. 1121-1148 - Weiqing Huang, Chang Ding, Siye Wang:

A comprehensive method to combine RFID indoor targets positioning with real geographic environment. 1149-1169 - Jinson Zhang, Mao Lin Huang

, Zhao-Peng Meng:
Visual analytics for BigData variety and its behaviours. 1171-1191 - Hong Zhu

, Shengli Tian, Genyuan Du
, Meiyi Xie:
Anonymization on refining partition: Same privacy, more utility. 1193-1216 - Shuo Xiong, Hiroyuki Iida

:
Attractiveness of real time strategy games. 1217-1234 - Shu-Bo Zhang, Jian-Huang Lai:

An integrated information-based similarity measurement of gene ontology terms. 1235-1253 - Fei Ma

, Limin Yu, Gang Liu, Qiang Niu:
Computer aided mass detection in mammography with temporal change analysis. 1255-1272 - Ondrej Tichý

, Václav Smídl:
Estimation of input function from dynamic PET brain data using Bayesian blind source separation. 1273-1287 - Chunyue Zhou, Tong Xu, Hairong Dong

:
Distributed locating algorithm MDS-MAP (LF) based on low-frequency signal. 1289-1305 - Zhigang Lu, Hong Shen:

An accuracy-assured privacy-preserving recommender system for internet commerce. 1307-1326 - Lingjing Kong, Hong Shen:

Achieving inter-domain routing security based on distributed translator trust model. 1327-1344 - Kaizhi Chen, Chenjun Lin, Shangping Zhong, Longkun Guo:

A parallel SRM feature extraction algorithm for steganalysis based on GPU architecture. 1345-1359 - Teng Sun, Hui Tian

, Xuan Mei:
Anomaly detection and localization by diffusion wavelet-based analysis on traffic matrix. 1361-1374 - Na Liu, Di Tang, Ying Lu, Xiao-Jun Tang, Hai-Wen Wang:

Topic-sensitive multi-document summarization algorithm. 1375-1389

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














