default search action
Computer Science and Information Systems, Volume 15
Volume 15, Number 1, 2018
- Gordana Milosavljevic, Goran Sladic, Branko Milosavljevic, Miroslav Zaric, Stevan Gostojic, Jelena Slivka:
Context-sensitive constraints for access control of business processes. 1-30 - Titas Savickas, Olegas Vasilecas:
An approach to business process simulation using mined probabilistic models. 31-50 - Marek Krótkiewicz:
A novel inheritance mechanism for modeling knowledge representation systems. 51-78 - Predrag Matkovic, Mirjana Maric, Pere Tumbas, Marton Sakal:
Traditionalisation of agile processes: Architectural aspects. 79-109 - Beumjin Cho, Sangho Lee, Meng Xu, Sangwoo Ji, Taesoo Kim, Jong Kim:
Prevention of cross-update privacy leaks on android. 111-137 - Miodrag Petkovic, Ilija Basicevic, Dragan Kukolj, Miroslav Popovic:
Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks. 139-162 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:
CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word. 163-185 - Ivica Slavkov, Jana Karcheska, Dragi Kocev, Saso Dzeroski:
HMC-ReliefF: Feature ranking for hierarchical multi-label classification. 187-209 - Zhou Tao, Muzhou Hou, Chunhui Liu:
Forecasting stock index with multi-objective optimization model based on optimized neural network architecture avoiding overfitting. 211-236 - Eduardas Bareisa, Vacius Jusas, Kestutis Motiejunas, Liudas Motiejunas, Rimantas Seinauskas:
Black box delay fault models for non-scan sequential circuits. 237-256
Volume 15, Number 2, 2018
- Marcelo Zambrano, Francisco J. Pérez, Manuel Esteve, Carlos Enrique Palau:
Interoperability in the emergency management. A solution based on distributed databases and P2P networks. 257-272 - Pablo Vidal, Ana Carolina Olivera:
Solving the DNA fragment assembly problem with a parallel discrete firefly algorithm implemented on GPU. 273-293 - Osama A. Mehdi, Hamidah Ibrahim, Lilly Suriani Affendey, Eric Pardede, Jinli Cao:
Exploring instances for matching heterogeneous database schemas utilizing Google similarity and regular expression. 295-320 - Shalinka Jayatilleke, Richard Lai, Karl Reed:
Managing software requirements changes through change specification and classification. 321-346 - Won-Seok Hwang, Shaoyu Li, Sang-Wook Kim, Kichun Lee:
Data imputation using a trust network for recommendation via matrix factorization. 347-368 - Dorde Petrovic, Milena Stankovic:
Use of linguistic forms mining in the link analysis of legal documents. 369-392 - Belayadi Djahida, Khaled-Walid Hidouci, Ladjel Bellatreche:
OLAPS: Online load-balancing in range-partitioned main memory database with approximate partition statistics. 393-419 - Aida Kamisalic, Marjan Hericko, Tatjana Welzer, Muhamed Turkanovic:
Experimental study on the effectiveness of a teaching approach using barker or Bachman notation for conceptual database design. 421-448 - Dani Almog, Hadas Schwartz-Chassidim, Yaron Tsubery, Miroslav Bures, Shlomo Mark:
Conceptual approach for reuse of test automation artifacts on various architectural levels. 449-472 - Vladimir N. Babenko, Anton G. Bogomolov, Roman O. Babenko, Elvira R. Galieva, Yuriy L. Orlov:
CpG islands' clustering uncovers early development genes in the human genome. 473-485
Volume 15, Number 3, 2018
- Hai-Tao Zheng, Jinxin Han, Jin-Yuan Chen, Arun Kumar Sangaiah:
A novel framework for Automatic Chinese Question Generation based on multi-feature neural network model. 487-499 - Zhijie Zhao, Cong Ren, Huadong Sun, Zhipeng Fan, Ze Gao:
Research on automatic identification technique of CT image in lung. 501-515 - Pinle Qin, Jun Chen, Kai Zhang, Rui Chai:
Convolutional neural networks and hash learning for feature extraction and of fast retrieval of pulmonary nodules. 517-531 - Weipeng Jing, Danyu Tong, Guangsheng Chen, Chuanyu Zhao, Liangkuan Zhu:
An optimized method of HDFS for massive small files storage. 533-548 - Cheng Song, Mingyue Zhang, Zongpu Jia, Wei-Ping Peng, Hairu Guo:
A lightweight batch anonymous authentication scheme for VANET based on pairing-free. 549-567 - Lei Wang, Weihua Wu, Junyan Qi, Zong-pu Jia:
Wireless sensor network coverage optimization based on whale group algorithm. 569-583 - Xu An Wang, Xiaoyuan Yang, Cong Li, Yudong Liu, Yong Ding:
Improved functional proxy re-encryption schemes for secure cloud data sharing. 585-614 - Bushra Zafar, Rehan Ashraf, Nouman Ali, Mudassar Ahmed, Sohail Jabbar, Kashif Naseer Qureshi, Awais Ahmad, Gwanggil Jeon:
Intelligent image classification-based on spatial weighted histograms of concentric circles. 615-633 - Josefa Díaz Álvarez, Francisco Chávez de la O, Pedro A. Castillo, Juan Ángel García Martínez, Francisco J. Rodríguez, Francisco Fernández de Vega:
A fuzzy rule-based system to predict energy consumption of genetic programming algorithms. 635-654 - Giovanni Ciatto, Stefano Mariani, Andrea Omicini:
ReSpecTX: Programming interaction made easy. 655-682 - Filipe Gonçalves, Davide Carneiro, José Miguel Pêgo, Paulo Novais:
X3S: A multi-modal approach to monitor and assess stress through human-computer interaction. 683-703 - Christopher Haubeck, Alexander Pokahr, Kim Reichert, Till Hohenberger, Winfried Lamersdorf:
The CRI-model: A domain-independent taxonomy for non-conformance between observed and specified behaviour. 705-731 - Rafael Nogueras, Carlos Cotta:
On the use of self-* Island-based evolutionary computation methods on complex environments. 733-750 - Lars Braubach, Kai Jander, Alexander Pokahr:
A novel distributed registry approach for efficient and resilient service discovery in megascale distributed systems? 751-774 - Petros Kefalas, Ioanna Stamatopoulou:
Using screencasts to enhance coding skills: The case of logic programming? 775-798 - Martin Bonchanoski, Katerina Zdravkova:
Learning syntactic tagging of Macedonian language. 799-820 - Jovana Vidakovic, Sonja Ristic, Slavica Kordic, Ivan Lukovic:
Extended tuple constraint type as a complex integrity constraint type in XML data model - definition and enforcement. 821-843
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.