


default search action
Computer Science and Information Systems, Volume 16
Volume 16, Number 1, 2019
- Hasan Ali Khattak

, Zoobia Ameer
, Ikram Ud Din
, Muhammad Khurram Khan
:
Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities. 1-17 - Laura C. Rodríguez-Martínez, Hector A. Duran-Limon, Manuel Mora

, Francisco Álvarez Rodríguez
:
SOCA-DSEM: A well-structured SOCA development systems engineering methodology. 19-44 - Mladen Matejas, Kresimir Fertalj

:
Building a BPM application in an SOA-based legacy environment. 45-74 - Marko Jankovic, Slavko Zitnik, Marko Bajec:

Reconstructing de facto software development methods. 75-104 - Demijan Grgic, Hrvoje Vdovic, Jurica Babic, Vedran Podobnik:

CrocodileAgent 2018: Robust agent-based mechanisms for power trading in competitive environments. 105-129 - Matej Senozetnik, Luka Bradesko, Tine Subic, Zala Herga, Jasna Urbancic, Primoz Skraba, Dunja Mladenic:

Estimating point-of-interest rating based on visitors geospatial behaviour. 131-154 - Kristina Andric, Damir Kalpic, Zoran Bohacek:

An insight into the effects of class imbalance and sampling on classification accuracy in credit risk assessment. 155-178 - Martin Svrcek, Michal Kompan

, Mária Bieliková:
Towards understandable personalized recommendations: Hybrid explanations. 179-203 - George Lagogiannis, Stavros Kontopoulos, Christos Makris

:
On the randomness that generates biased samples: The limited randomness approach. 205-225 - Maja Braovic

, Darko Stipanicev, Ljiljana Seric
:
Retinal blood vessel segmentation based on heuristic image analysis. 227-245 - Dinu Dragan

, Veljko B. Petrovic, Dusan B. Gajic
, Zarko Zivanov, Dragan Ivetic:
An empirical study of data visualization techniques in PACS design. 247-271 - Francisco Jurado

, Pilar Rodríguez
:
An experience in automatically building lexicons for affective computing in multiple target languages. 273-287 - Adela Ljajic

, Ulfeta Marovac
:
Improving sentiment analysis for twitter data by handling negation rules in the Serbian language. 289-311 - Leon Bosnjak

, Bostjan Brumen:
Rejecting the death of passwords: Advice for the future. 313-332
Volume 16, Number 2, 2019
- Sang-Chul Lee, Sang-Wook Kim, Sunju Park, Dong-Kyu Chae:

A tripartite-graph based recommendation framework for price-comparison services. 333-357 - Zhehua Piao, Sang-Min Park, Byung-Won On, Gyu Sang Choi, Myong-Soon Park:

Product reputation mining: bring informative review summaries to producers and consumers. 359-380 - Jiawei Li, Wenge Rong, Chuantao Yin, Zhang Xiong:

Goal-oriented dependency analysis for service identification. 381-407 - Ana Lucía Nicolini, Carlos M. Lorenzetti, Ana Gabriela Maguitman, Carlos Iván Chesñevar:

Intelligent query processing in P2P networks: Semantic issues and routing algorithms. 409-442 - Hui Liu, Chenming Li, Lizhong Xu:

Dimension reduction and classification of hyperspectral images based on neural network sensitivity analysis and multi-instance learning. 443-468 - Piotr Lasek

, Jarek Gryz:
Density-based clustering with constraints. 469-489 - Vacius Jusas

, Saulius Japertas, Tautvydas Baksys, Sandeepak Bhandari:
Logical filter approach for early stage cyber-attack detection. 491-514 - Emin Borandag, Akin Özçift, Deniz Kilinç

, Fatih Yücalar:
Majority vote feature selection algorithm in software fault prediction. 515-539 - Mathias Longo, Ana Rodriguez, Cristian Mateos, Alejandro Zunino:

Reducing energy usage in resource-intensive Java-based scientific applications via micro-benchmark based code refactorings. 541-564 - Guilherme Oliveira Campos, Edré Moreira, Wagner Meira Jr., Arthur Zimek

:
Outlier detection in graphs: A study on the impact of multiple graph models. 565-595 - Xin Liu

, Chenyi Zhuang, Tsuyoshi Murata, Kyoung-Sook Kim, Natthawut Kertkeidkachorn
:
How much topological structure is preserved by graph embeddings? 597-614 - Min-Hee Jang, Sang-Wook Kim, Woong-Kee Loh, Jung-Im Won:

On approximate k-nearest neighbor searches based on the earth mover's distance for efficient content-based multimedia information retrieval. 615-638 - Jinyan Chen

, Susanne Becken, Bela Stantic:
Lexicon based Chinese language sentiment analysis method. 639-655 - Drazen Brdjanin

, Danijela Banjac
, Goran Banjac
, Slavko Maric:
Automated two-phase business model-driven synthesis of conceptual database models. 657-688
Volume 16, Number 3, 2019
- Fei Zhu, Pai Peng, Quan Liu, Yuchen Fu, Shan Zhong:

SARSA based access control with approximation by TileCoding. 689-704 - Haoze Lv, Zhaobin Liu, Zhonglian Hu, Lihai Nie, Weijiang Liu, Xinfeng Ye:

Research on improved privacy publishing algorithm based on set cover. 705-731 - Hongsong Chen, Haiyan Zhuang, Zhiguang Shan, Chao-Hsien Lee, Zhongchuan Fu:

A novel SMP-based survivability evaluation metric and approach in wireless sensor network. 733-751 - Jianqiang Hu, Wei Liang

, Zhiyong Zeng, Yong Xie, Jianxun Eileen Yang:
A framework for Fog-assisted healthcare monitoring. 753-772 - Letian Duan, Dezhi Han, Qiuting Tian:

Design of intrusion detection system based on improved ABC_elite and BP neural networks. 773-795 - Qiuting Tian, Dezhi Han, Yanmei Jiang:

Hierarchical authority based weighted attribute encryption scheme. 797-813 - Xingchen Li, Weizhe Zhang, Desheng Wang, Bin Zhang, Hui He:

Algorithm of web page similarity comparison based on visual block. 815-830 - Xixi Yan

, Hao Ni, Yuan Liu, Dezhi Han:
Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR. 831-847 - Haijian Chen, Yonghui Dai, Heyu Gao, Dongmei Han, Shan Li:

Classification and analysis of MOOCs learner's state: The study of hidden Markov model. 849-865 - Zeyu Sun, Zhiguo Lv, Yue Hou, Chen Xu, Ben Yan:

MR-DFM: A multi-path routing algorithm based on data fusion mechanism in sensor networks. 867-890 - Zhanquan Wang, Taoli Han, Huiqun Yu:

Research of MDCOP mining based on time aggregated graph for large spatio-temproal data sets. 891-914 - Zhaobin Liu, Haoze Lv, Minghui Li, Zhiyang Li, Zhiyi Huang:

A novel self-adaptive grid-partitioning noise optimization algorithm based on differential privacy. 915-938 - Zhenxin Du, Keyin Chen:

Enhanced artificial bee colony with novel search strategy and dynamic parameter. 939-957

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














