callback( { "result":{ "query":":facetid:toc:\"db/journals/ijcsa/ijcsa9.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.69" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"24", "@dc":"24", "@oc":"24", "@id":"43456308", "text":":facetid:toc:db/journals/ijcsa/ijcsa9.bht" } }, "hits":{ "@total":"24", "@computed":"24", "@sent":"24", "@first":"0", "hit":[{ "@score":"1", "@id":"4308183", "info":{"authors":{"author":[{"@pid":"84/98","text":"Terje Aaberge"},{"@pid":"03/6153","text":"Rajendra Akerkar"}]},"title":"Ontology and Ontology Construction: Background and Practices.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"2","pages":"32-41","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/AabergeA12","ee":"http://www.tmrfindia.org/ijcsa/v9i23.pdf","url":"https://dblp.org/rec/journals/ijcsa/AabergeA12"}, "url":"URL#4308183" }, { "@score":"1", "@id":"4308184", "info":{"authors":{"author":{"@pid":"03/6153","text":"Rajendra Akerkar"}},"title":"Editorial.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"1","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/Akerkar12","ee":"http://www.tmrfindia.org/ijcsa/v9i10.pdf","url":"https://dblp.org/rec/journals/ijcsa/Akerkar12"}, "url":"URL#4308184" }, { "@score":"1", "@id":"4308185", "info":{"authors":{"author":{"@pid":"03/6153","text":"Rajendra Akerkar"}},"title":"Editorial.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"2","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/Akerkar12a","ee":"http://www.tmrfindia.org/ijcsa/v9i20.pdf","url":"https://dblp.org/rec/journals/ijcsa/Akerkar12a"}, "url":"URL#4308185" }, { "@score":"1", "@id":"4308186", "info":{"authors":{"author":[{"@pid":"29/10826","text":"Fatemeh Alamdar"},{"@pid":"88/5924","text":"Mohammadreza Keyvanpour"}]},"title":"Effects of Quaghistogram on Image Retrievl and Clustering.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","pages":"141-153","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/AlamdarK12","ee":"http://www.tmrfindia.org/ijcsa/v9i310.pdf","url":"https://dblp.org/rec/journals/ijcsa/AlamdarK12"}, "url":"URL#4308186" }, { "@score":"1", "@id":"4308187", "info":{"authors":{"author":[{"@pid":"86/10425","text":"Sergey Anfinogenov"},{"@pid":"32/3081","text":"Valery I. Korzhik"},{"@pid":"05/4633","text":"Guillermo Morales-Luna"}]},"title":"A Multiple Robust Digital Watermarking System for Still Images.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","pages":"37-46","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/AnfinogenovKM12","ee":"http://www.tmrfindia.org/ijcsa/v9i33.pdf","url":"https://dblp.org/rec/journals/ijcsa/AnfinogenovKM12"}, "url":"URL#4308187" }, { "@score":"1", "@id":"4308188", "info":{"authors":{"author":{"@pid":"96/2816","text":"Dumitru Dan Burdescu"}},"title":"Guest Editorial & Cover Page.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/Burdescu12","ee":"http://www.tmrfindia.org/ijcsa/v9i30.pdf","url":"https://dblp.org/rec/journals/ijcsa/Burdescu12"}, "url":"URL#4308188" }, { "@score":"1", "@id":"4308189", "info":{"authors":{"author":[{"@pid":"17/1259","text":"Jacques Calmet"},{"@pid":"00/2603","text":"Marvin Oliver Schneider"}]},"title":"Logical Fibering and Knowledge Bases.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"2","pages":"42-52","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/CalmetS12","ee":"http://www.tmrfindia.org/ijcsa/v9i24.pdf","url":"https://dblp.org/rec/journals/ijcsa/CalmetS12"}, "url":"URL#4308189" }, { "@score":"1", "@id":"4308190", "info":{"authors":{"author":[{"@pid":"76/7439","text":"Brett Drury"},{"@pid":"60/1153","text":"Luís Torgo"},{"@pid":"93/5031","text":"José João Almeida"}]},"title":"Classifying News Stories with a Constrained Learning Strategy to Estimate the Direction of a Market Index.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"1","pages":"1-22","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/DruryTA12","ee":"http://www.tmrfindia.org/ijcsa/v9i11.pdf","url":"https://dblp.org/rec/journals/ijcsa/DruryTA12"}, "url":"URL#4308190" }, { "@score":"1", "@id":"4308191", "info":{"authors":{"author":[{"@pid":"21/7042","text":"Tatiana Evreinova"},{"@pid":"e/GrigoriEEvreinov","text":"Grigori E. Evreinov"},{"@pid":"02/4869","text":"Roope Raisamo"}]},"title":"Evaluation of Effectiveness of the Stickgrip Device for Detecting the Topographic Heights on Digital Maps.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","pages":"61-76","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/EvreinovaER12","ee":"http://www.tmrfindia.org/ijcsa/v9i35.pdf","url":"https://dblp.org/rec/journals/ijcsa/EvreinovaER12"}, "url":"URL#4308191" }, { "@score":"1", "@id":"4308192", "info":{"authors":{"author":[{"@pid":"56/10427","text":"David Garrido Garrido"},{"@pid":"72/10426","text":"Leticia Carnero Pascual"},{"@pid":"64/10426","text":"Belén Ríos-Sánchez"},{"@pid":"88/10428","text":"Carmen Lastres Redondo"}]},"title":"A Computer Application for 3D Craniofacial Reconstruction and Automatic Skull-Photo Identification.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","pages":"108-127","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/GarridoPSR12","ee":"http://www.tmrfindia.org/ijcsa/v9i38.pdf","url":"https://dblp.org/rec/journals/ijcsa/GarridoPSR12"}, "url":"URL#4308192" }, { "@score":"1", "@id":"4308193", "info":{"authors":{"author":[{"@pid":"43/10429","text":"Chrysoula Gatsou"},{"@pid":"87/1142","text":"Anastasios Politis"},{"@pid":"02/8336","text":"Dimitrios Zevgolis"}]},"title":"The Importance of Mobile Interface Icons on User Interaction.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","pages":"92-107","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/GatsouPZ12","ee":"http://www.tmrfindia.org/ijcsa/v9i37.pdf","url":"https://dblp.org/rec/journals/ijcsa/GatsouPZ12"}, "url":"URL#4308193" }, { "@score":"1", "@id":"4308194", "info":{"authors":{"author":[{"@pid":"04/580","text":"Henry Hexmoor"},{"@pid":"14/11495","text":"Deepti Shetty"}]},"title":"A Culturally Aware Rescue Model for Natural Disasters.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"2","pages":"1-14","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/HexmoorS12","ee":"http://www.tmrfindia.org/ijcsa/v9i21.pdf","url":"https://dblp.org/rec/journals/ijcsa/HexmoorS12"}, "url":"URL#4308194" }, { "@score":"1", "@id":"4308195", "info":{"authors":{"author":[{"@pid":"81/6995","text":"Yutaka Hirakawa"},{"@pid":"123/3340","text":"Motohiro Take"},{"@pid":"06/1673","text":"Kazuo Ohzeki"}]},"title":"Pass-Image Authentication Method Tolerant to Random and Video-Recording Attacks.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","pages":"20-36","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/HirakawaTO12","ee":"http://www.tmrfindia.org/ijcsa/v9i32.pdf","url":"https://dblp.org/rec/journals/ijcsa/HirakawaTO12"}, "url":"URL#4308195" }, { "@score":"1", "@id":"4308196", "info":{"authors":{"author":[{"@pid":"52/731","text":"Yuh-Jong Hu"},{"@pid":"73/10257","text":"Win-Nan Wu"},{"@pid":"52/9656","text":"Jiun-Jan Yang"}]},"title":"Semantics-enabled Policies for Super-Peer Data Integration and Protection.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"1","pages":"23-49","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/HuWY12","ee":"http://www.tmrfindia.org/ijcsa/v9i12.pdf","url":"https://dblp.org/rec/journals/ijcsa/HuWY12"}, "url":"URL#4308196" }, { "@score":"1", "@id":"4308197", "info":{"authors":{"author":[{"@pid":"90/3506","text":"Randi Karlsen"},{"@pid":"86/9656","text":"Børge Jakobsen"},{"@pid":"27/10858","text":"Roger Bruun Asp Hansen"}]},"title":"Uncover What You See in Your Images: The InfoAlbum approach.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"1","pages":"50-69","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/KarlsenJH12","ee":"http://www.tmrfindia.org/ijcsa/v9i13.pdf","url":"https://dblp.org/rec/journals/ijcsa/KarlsenJH12"}, "url":"URL#4308197" }, { "@score":"1", "@id":"4308198", "info":{"authors":{"author":[{"@pid":"21/8385","text":"Giseli Rabello Lopes"},{"@pid":"91/2103","text":"Roberto da Silva"},{"@pid":"m/MirellaMouraMoro","text":"Mirella M. Moro"},{"@pid":"o/JosePalazzoMoreiradeOliveira","text":"José Palazzo Moreira de Oliveira"}]},"title":"Scientific Collaboration in Research Networks: A Quantification Method by Using Gini Coefficient.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"2","pages":"15-31","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/LopesSMO12","ee":"http://www.tmrfindia.org/ijcsa/v9i22.pdf","url":"https://dblp.org/rec/journals/ijcsa/LopesSMO12"}, "url":"URL#4308198" }, { "@score":"1", "@id":"4308199", "info":{"authors":{"author":{"@pid":"03/2812","text":"Marian Cristian Mihaescu"}},"title":"Using Learner's Classification Methodology for Building Intelligent Interaction Design.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","pages":"128-140","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/Mihaescu12","ee":"http://www.tmrfindia.org/ijcsa/v9i39.pdf","url":"https://dblp.org/rec/journals/ijcsa/Mihaescu12"}, "url":"URL#4308199" }, { "@score":"1", "@id":"4308200", "info":{"authors":{"author":[{"@pid":"11/10426","text":"Cosmin Marian Poteras"},{"@pid":"19/3790","text":"Mihai Mocanu"},{"@pid":"03/2812","text":"Marian Cristian Mihaescu"}]},"title":"DCFMS: Data Handling Distributed System for Achieving High Data Availability.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","pages":"77-91","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/PoterasMM12","ee":"http://www.tmrfindia.org/ijcsa/v9i36.pdf","url":"https://dblp.org/rec/journals/ijcsa/PoterasMM12"}, "url":"URL#4308200" }, { "@score":"1", "@id":"4308201", "info":{"authors":{"author":[{"@pid":"22/10858","text":"Shaliz Rezaee"},{"@pid":"55/1994","text":"Niklas Lavesson"},{"@pid":"54/5348","text":"Henric Johnson"}]},"title":"E-Mail Prioritization using Online Social Network Profile Distance.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"1","pages":"70-87","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/RezaeeLJ12","ee":"http://www.tmrfindia.org/ijcsa/v9i14.pdf","url":"https://dblp.org/rec/journals/ijcsa/RezaeeLJ12"}, "url":"URL#4308201" }, { "@score":"1", "@id":"4308202", "info":{"authors":{"author":[{"@pid":"32/175","text":"Andrzej Romanowski"},{"@pid":"36/11536","text":"Pawel W. Wozniak"},{"@pid":"123/3313","text":"Juliusz Gonera"}]},"title":"Simplified Centralized Operational Transformation Algorithm for Concurrent Collaborative Systems.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","pages":"47-60","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/RomanowskiWG12","ee":"http://www.tmrfindia.org/ijcsa/v9i34.pdf","url":"https://dblp.org/rec/journals/ijcsa/RomanowskiWG12"}, "url":"URL#4308202" }, { "@score":"1", "@id":"4308203", "info":{"authors":{"author":[{"@pid":"29/3125","text":"Florian Skopik"},{"@pid":"11/1123","text":"Daniel Schall 0001"},{"@pid":"d/SDustdar","text":"Schahram Dustdar"}]},"title":"Trusted Information Sharing using SOA-Based Social Overlay Networks.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"1","pages":"116-151","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/SkopikSD12","ee":"http://www.tmrfindia.org/ijcsa/v9i16.pdf","url":"https://dblp.org/rec/journals/ijcsa/SkopikSD12"}, "url":"URL#4308203" }, { "@score":"1", "@id":"4308204", "info":{"authors":{"author":{"@pid":"94/2367","text":"Cosmin Stoica Spahiu"}},"title":"Multiple Users Concurrency Performance for an Original Multimedia Database System.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","pages":"154-164","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/Spahiu12","ee":"http://www.tmrfindia.org/ijcsa/v9i311.pdf","url":"https://dblp.org/rec/journals/ijcsa/Spahiu12"}, "url":"URL#4308204" }, { "@score":"1", "@id":"4308205", "info":{"authors":{"author":[{"@pid":"19/3866","text":"Liana Stanescu"},{"@pid":"22/3866","text":"Gabriel Mihai"}]},"title":"Automated annotation of natural images using an extended annotation model.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"3","pages":"1-19","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/StanescuM12","ee":"http://www.tmrfindia.org/ijcsa/v9i31.pdf","url":"https://dblp.org/rec/journals/ijcsa/StanescuM12"}, "url":"URL#4308205" }, { "@score":"1", "@id":"4308206", "info":{"authors":{"author":[{"@pid":"46/8427","text":"Surender Reddy Yerva"},{"@pid":"82/31-1","text":"Zoltán Miklós 0001"},{"@pid":"a/KarlAberer","text":"Karl Aberer"}]},"title":"Entity-based Classification of Twitter Messages.","venue":"Int. J. Comput. Sci. Appl.","volume":"9","number":"1","pages":"88-115","year":"2012","type":"Journal Articles","access":"unavailable","key":"journals/ijcsa/YervaMA12","ee":"http://www.tmrfindia.org/ijcsa/v9i15.pdf","url":"https://dblp.org/rec/journals/ijcsa/YervaMA12"}, "url":"URL#4308206" } ] } } } )