


default search action
Informatica (Slovenia), Volume 33
Volume 33, Number 1, 2009
- Shiguo Lian, Dimitris Kanellopoulos, Giancarlo Ruffo:

Editorial. 1-2 - Shiguo Lian, Dimitris Kanellopoulos, Giancarlo Ruffo:

Recent Advances in Multimedia Information System Security. 3-24 - S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj:

Detection of Stego Anomalies in Images Exploiting the Content Independent Statistical Footprints of the Steganograms. 25-40 - Xinpeng Zhang, Shuozhong Wang, Weiming Zhang:

Steganography Combining Data Decomposition Mechanism and Stego-coding Method. 41-48 - Hafiz Malik:

Blind Watermark Estimation Attack for Spread Spectrum Watermarking. 49-68 - Ye Yao, Zhengquan Xu, Jing Sun:

Visual Security Assessment for Cipher-Images based on Neighborhood Similarity. 69-76 - Marco Furini:

Secure, Portable, and Customizable Video Lectures for E-learning on the Move. 77-84 - Walter Allasia, Francesco Gallo, Marco Milanesio, Rossano Schifanella:

Indexing and Retrieval of Multimedia Metadata on a Secure DHT. 85-100 - Rok Gajsek, Vitomir Struc, France Mihelic, Anja Podlesek, Luka Komidar, Gregor Socan, Bostjan Bajec:

Multi-Modal Emotional Database: AvID. 101-106 - Damir Cavar, Ivo-Pavao Jazbec, Sinisa Runjaic:

Efficient Morphological Parsing with a Weighted Finite State Transducer. 107-113
Volume 33, Number 2, 2009
- Chiu-Hsiung Liao, Hon-Chan Chen, Ching-Te Wang:

An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card. 117-124 - Ami Marowka:

Routing Scalability in Multicore-Based Ad Hoc Networks. 125-134 - Melita Hajdinjak, Andrej Bauer:

Similarity Measures for Relational Databases. 135-141 - Sofiane Gherbi, Said Yahmedi, Moussa Sedraoui:

Robust H_Infinity Control of a Doubly Fed Asynchronous Machine. 143-150 - Mohsen Amini Salehi, Hossein Deldari, Bahare Mokarram Dorri:

Balancing Load in a Computational Grid Applying Adaptive, Intelligent Colonies of Ants. 151-159 - Zeljko Agic, Zdravko Dovedan, Marko Tadic:

Improving Part-of-Speech Tagging Accuracy for Croatian by Morphological Analysis. 161-167 - I. Elizabeth Shanthi, R. Nadarajan:

Applying SD-Tree for Object-Oriented query processing. 169-179 - Luka Pavlic, Marjan Hericko, Vili Podgorelec, Ivan Rozman:

Improving Design Pattern Adoption with An Ontology-Based Repository. 181-189 - William Leigh, Russell L. Purvis:

Historical Impulse Response of Return Analysis Shows Information Technology Improves Stock Market Efficiency. 191-195 - Mitja Lustrek, Bostjan Kaluza:

Fall Detection and Activity Recognition with Machine Learning. 197-204 - Ekambaram Naidu Mandalapu, E. G. Rajan:

Rajan Transform and its uses in Pattern Recognition. 205-212 - King Sing Cheung, Paul Kai-On Chow:

A Petri-Net Approach to Refining Object Behavioural Specifications. 213-224 - Gjorgji Madzarov, Dejan Gjorgjevikj, Ivan Chorbev:

A Multi-class SVM Classifier Utilizing Binary Decision Tree. 225-233 - Dzulijana Popovic, Bojana Dalbelo Basic:

Churn Prediction Model in Retail Banking Using Fuzzy C-Means Algorithm. 235-239
Volume 33, Number 3, 2009
- Reda Alhajj, Kang Zhang:

Special Issue on Information Reuse and Integration. 243 - Andres Folleco, Taghi M. Khoshgoftaar, Jason Van Hulse, Amri Napolitano:

Identifying Learners Robust to Low Quality Data. 245-259 - Behrouz H. Far, Vani Mudigonda, Abdel Halim Elamy:

A General Purpose Software Evaluation System. 261-270 - Tansel Özyer:

Online WordNet Based Tagging System for Social Sharing and Retrieval of Images on Visited Pages. 271-276 - Masahiro Shibata, Tomomi Nishiguchi, Yoichi Tomiura:

Dialog System for Open-Ended Conversation Using Web Documents. 277-284 - M. Faraz Rafi, Abbas K. Zaidi, Alexander H. Levis, P. Papantoni-Kazakos:

Optimization of Actions in Activation Timed Influence Nets. 285-296 - Taher Naser, Reda Alhajj, Mick J. Ridley:

Two-Way Mapping between Object-Oriented Databases and XML. 297-308 - James F. Glazebrook, Rodrick Wallace:

Rate Distortion Manifolds as Model Spaces for Cognitive Information. 309-345 - Marko Hölbl, Tatjana Welzer, Bostjan Brumen:

Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols. 347-355 - Delia Rusu, Blaz Fortuna, Marko Grobelnik, Dunja Mladenic:

Semantic Graphs Derived From Triplets with Application in Document Summarization. 357-362 - Przemyslaw Skibinski:

Improving HTML Compression. 363-373 - Henry Hexmoor, Shahram Rahimi, Jody T. Little:

Coordinated UAV Manoeuvring Flight Formation. 375-383 - Andrej Bregar, József Györkös, Matjaz B. Juric:

Robustness and Visualization of Decision Models. 385-395 - Saso Greiner:

Run-time Manipulation of Programs in a Statically-Typed Language. 397-398
Volume 33, Number 4, 2009
- Anna Derezinska:

Editor's Introduction to the Special Issue on System Modeling and Transformation Principles. 403 - Slawomir Samolej, Tomasz Rak:

Simulation and Performance Analysis of Distributed Internet Systems Using TCPNs. 405-415 - Tadeusz Pankowski, Tomasz Pilka:

Transformation of XML Data into XML Normal Form. 417-430 - Anna Derezinska, Romuald Pilitowski:

Realization of UML Class and State Machine Models in the C# Code Generation and Execution Framework. 431-440 - Vinod Patidar, Krishan K. Sud, Narendra K. Pareek:

A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing. 441-452 - Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:

Computational Reduction of Wilson's Primality Test for Modern Cryptosystems. 453-458 - Samo Drobne, Anka Lisec:

Multi-attribute Decision Analysis in GIS: Weighted Linear Combination and Ordered Weighted Averaging. 459-474 - Ghassan J. Mohammed, Bingrong Hong, Ann A. Jarjes:

Eyeball Localization Based on Angular Integral Projection Function. 475-480 - Tzong-Sun Wu, Han-Yu Lin:

Secure Convertible Authenticated Encryption Scheme Based on RSA. 481-486 - Igor Kononenko, Matjaz Bevk:

Extended Symbolic Mining of Textures with Association Rules. 487-497 - Abdelkrim Amirat, Mourad Oussalah:

Systematic Construction of Software Architecture Supported by Enhanced First-Class Connectors. 499-509 - Monika Kapus-Kolar:

Improvements to a Roll-Back Mechanism for Asynchronous Checkpointing and Recovery. 511-519

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














