default search action
Computer Science and Information Systems, Volume 11
Volume 11, Number 1, 2014
- Feng Chen, Da Tang, Hongji Yang, Mohammed Alawairdhi:
A precondition-based approach to workflow oriented software re-engineering. 1-27 - Ricardo Colomo Palacios, José Luis López Cuadrado, Israel González-Carrasco, Francisco José García-Peñalvo:
SABUMO-dTest: Design and evaluation of an intelligent collaborative distributed testing framework. 29-45 - Patricia Conde, Francisco Ortin:
JINDY: A java library to support invokedynamic. 47-68 - Anna Yarygina, Boris Novikov:
Optimizing resource allocation for approximate real-time query processing. 69-88 - Vladimir Rankovic, Mikica Drenovak, Boban S. Stojanovic, Zoran Kalinic, Zora Arsovski:
The mean-value at risk static portfolio optimization using genetic algorithm. 89-109 - Tomas Grigalis, Antanas Cenys:
Using XPaths of inbound links to cluster template-generated web pages. 111-131 - Nicolas Béchet, Jacques Chauché, Violaine Prince, Mathieu Roche:
How to combine text-mining methods to validate induced Verb-Object relations? 133-155 - Dongjin Choi, Myunggwon Hwang, Jeongin Kim, Byeong-Kyu Ko, Pankoo Kim:
Tracing trending topics by analyzing the sentiment status of tweets. 157-169 - Grzegorz J. Nalepa, Szymon Bobek:
Rule-based solution for context-aware reasoning on mobile devices. 171-193 - Antonio González-Pardo, Angeles Rosa, David Camacho:
Behaviour-based identification of student communities in virtual worlds. 195-213 - Duc Nguyen Trung, Jason J. Jung:
Sentiment analysis based on fuzzy propagation in online social networks: A case study on TweetScope. 215-228 - Rafeeque Pandara Chalil, Sendhilkumar Selvaraju:
Same wavelength group identification from online social networks: A general framework. 229-239 - Namhee Lee, Jason J. Jung, Ali Selamat, Dosam Hwang:
Black-box testing of practical movie recommendation systems: A comparative study. 241-249 - Manamiary Bruno Andriamiarina, Dominique Méry, Neeraj Kumar Singh:
Revisiting snapshot algorithms by refinement-based techniques. 251-270 - Xiuqiao Li, Limin Xiao, Ke Xie, Bin Dong, Ruan Li, Dongmei Liu:
Towards hybrid client-side cache management in network-based file systems. 271-289 - Yining Zhao, Alan Wood:
Duplication problem in treaty systems: Causes and solutions. 291-308 - Hui Tian, Yingpeng Sang, Hong Shen, Chunyue Zhou:
Probability-model based network traffic matrix estimation. 309-320 - Alexander Nussbaumer, Daniel Dahrendorf, Hans-Christian Schmitz, Milos Kravcik, Marcel Berthold, Dietrich Albert:
Recommender and guidance strategies for creating personal mashup learning environments. 321-342 - Athanasios Staikopoulos, Ian O'Keeffe, Rachael Rafter, Eddie Walsh, Bilal Yousuf, Owen Conlan, Vincent Wade:
AMASE: A framework for supporting personalised activity-based learning on the web. 343-367 - Javier Torrente, Ángel del Blanco, Ángel Serrano-Laguna, Jose Angel Vallejo Pinto, Pablo Moreno-Ger, Baltasar Fernández-Manjón:
Towards a low cost adaptation of educational games for people with disabilities. 369-391 - Killian Levacher, Séamus Lawless, Vincent Wade:
Slicepedia: Content-agnostic slicing resource production for adaptive hypermedia. 393-417 - Mart Laanpere, Kai Pata, Peeter Normak, Hans Poldoja:
Pedagogy-driven design of digital learning ecosystems. 419-442 - Evgeny Bogdanov, Carsten Ullrich, Erik Isaksson, Matthias Palmér, Denis Gillet:
Towards PLEs throughwidget spaces in Moodle. 443-460
Volume 11, Number 2, 2014
- Nuno Castela, Paulo Dias, Marielba Zacarias, José Tribolet:
Collaborative method to maintain business process models updated. 461-480 - Clemente Rafael Borges, José A. Macías:
Facilitating the interaction with data warehouse schemas through a visual web-based approach. 481-501 - Ondrej Macek, Karel Richta:
Application and relational database co-refactoring. 503-524 - George Drosatos, Pavlos S. Efraimidis:
User-centric privacy-preserving statistical analysis of ubiquitous health monitoring data. 525-548 - Péter Szilágyi:
Iris: A decentralized approach to backend messaging middlewares. 549-567 - Dragoljub Krneta, Vladan Jovanovic, Zoran Marjanovic:
A direct approach to physical Data Vault design. 569-599 - Yousef Abuadlla, Goran S. Kvascev, Slavko Gajin, Zoran Jovanovic:
Flow-based anomaly intrusion detection system using two neural network stages. 601-622 - Emhimed Salem Alatrish, Dusan Tosic, Nikola Milenkovic:
Building ontologies for different natural languages. 623-644 - Luka Pavlic, Vili Podgorelec, Marjan Hericko:
A question-based design pattern advisement approach. 645-664 - Stefanos Ougiaroglou, Georgios Evangelidis:
Efficient data abstraction using weighted IB2 prototypes. 665-678 - Sonja Ristic, Slavica Aleksic, Milan Celikovic, Ivan Lukovic:
Generic and standard database constraint meta-models. 679-696 - Costin Badica, Nick Bassiliades, Sorin Ilie, Kalliopi Kravari:
Agent reasoning on the web using web services? 697-721 - Eirini Christinaki, Nikolas Vidakis, Georgios A. Triantafyllidis:
A novel educational game for teaching emotion identification skills to preschoolers with autism diagnosis. 723-743 - Dimitrios Karapiperis, Vassilios S. Verykios:
A distributed near-optimal LSH-based framework for privacy-preserving record linkage. 745-763 - Julio Rojas-Mora, Jaime Maria Gil-Lafuente:
An asymmetric index to compare trapezoidal fuzzy numbers. 765-778 - Anna Maria Gil Lafuente, Anna Klimova:
Approximation to the theory of affinities to manage the problems of the grouping process. 779-796 - Yehun Xu, Carlos Llopis-Albert, Joaquín González:
An application of structural equation modeling for continuous improvement. 797-808 - Eduard Edelhauser, Andreea Ionica:
A business intelligence software made in Romania: A solution for Romanian companies during the economic crisis. 809-823 - Jorge de Andrés-Sánchez:
Fuzzy claim reserving in non-life insurance. 825-838 - Shouzhen Zeng, Qifeng Wang, José M. Merigó, Tiejun Pan:
Induced intuitionistic fuzzy ordered weighted averaging: Weighted average operator and its application to business decision-making. 839-857 - Antonio Terceño Gómez, Glòria M. Barberà-Mariné, Hernán Pedro Vigier, Yanina Laumann:
Stability of beta coefficients of sector and subsector portfolios in an uncertain environment. 859-880 - Vasile Georgescu:
Joint propagation of ontological and epistemic uncertainty across risk assessment and fuzzy time series models. 881-904
Volume 11, Number 3, 2014
- Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, William Cheng-Chung Chu:
A true Random-Number Encryption Method employing block cipher and PRNG. 905-924 - Chin-Ling Chen, Woei-Jiunn Tsaur, Yu-Yi Chen, Yao-Chung Chang:
A secure mobile DRM system based on cloud architecture. 925-941 - Mohammadreza Sahebi Shahamabadi, Borhanuddin Mohd Ali, Nor Kamariah Noordin, Mohd Fadlee A. Rasid, Pooria Varahram, Antonio J. Jara:
A NEMO-HWSN solution to support 6LoWPAN network mobility in hospital wireless sensor network. 943-960 - Hae-Min Moon, Sung Bum Pan:
Long distance face recognition for enhanced performance of internet of things service interface. 961-974 - Tianhan Gao, Nan Guo, Kangbin Yim, Qianyi Wang:
PPS: A privacy-preserving security scheme for multi-operator wireless mesh networks with enhanced user experience. 975-999 - Hae-Duck Joshua Jeong, Sang-Kug Ye, Jiyoung Lim, Ilsun You, WooSeok Hyun:
A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies. 1001-1016 - Young-Long Chen, Mu-Yen Chen, Fu-Kai Cheung, Yung-Chi Chang:
A new hybrid architecture with an intersection-based coverage algorithm in wireless sensor networks. 1017-1035 - Tae Rim Lee, Hyejoo Lee, Kyung Hyune Rhee, Sang-Uk Shin:
The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data. 1037-1054 - Yongman Han, JongCheon Choi, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, Minkyu Park:
A new detection scheme of software copyright infringement using software birthmark on windows systems. 1055-1069 - Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:
Pairwise and group key setup mechanism for secure machine-to-machine communication. 1071-1090 - Hsing-Chung Chen, Cheng-Ying Yang, Hui-Kai Su, Ching-Chuan Wei, Chao-Ching Lee:
A secure e-mail protocol using ID-based FNS multicast mechanism. 1091-1112 - Hyoungwoo Park, Il Yeon Yeo, Jongsuk Ruth Lee, Haengjin Jang:
Study on network architecture of big data center for the efficient control of huge data traffic. 1113-1126 - Guowei Wu, Xiaojie Chen, Lin Yao, Youngjun Lee, Kangbin Yim:
An efficient wormhole attack detection method in wireless sensor networks. 1127-1141 - Chien-Erh Weng, Jyh-Horng Wen, Hsing-Chung Chen, Lie Yang:
The performance analysis of direct/cooperative transmission to support QoS in WLANs. 1143-1156 - Guangzhi Zhang, Yunchuan Sun, Mengling Xu, Rongfang Bie:
Weibo clustering: A new approach utilizing users' reposting data in social networking services. 1157-1172 - Neng-Yih Shih, Hsing-Chung Chen:
An approach for selecting candidates in soft-handover procedure using multi-generating procedure and second grey relational analysis. 1173-1190
Volume 11, Number 4, 2014
- Nuno Ramos Carvalho, Alberto Simões, José João Almeida:
DMOSS: Open source software documentation assessment. 1197-1207 - David Cunha, Pedro Neves, Pedro Nuno Miranda de Sousa:
PaaS manager: A platform-as-a-service aggregation framework. 1209-1228 - Eduardo Alves Portela Santos, Agnelo Denis Vieira, Sauro Schaidt, Eduardo de Freitas Rocha Loures:
Modeling constraint-based processes: A supervisory control theory application. 1229-1247 - Luís Filipe Teófilo, Luís Paulo Reis, Henrique Lopes Cardoso, Pedro Mendes:
Rule based strategies for large extensive-form games: A specification language for No-Limit Texas Hold'em agents. 1249-1269 - Maja Pusnik, Marjan Hericko, Zoran Budimac, Bostjan Sumak:
XML schema metrics for quality evaluation. 1271-1289 - Shams Zawoad, Marjan Mernik, Ragib Hasan:
Towards building a forensics aware language for secure logging. 1291-1314 - Stanislav Böhm, Marek Behalek, Ondrej Meca, Martin Surkovský:
Visual programming of MPI applications: Debugging, performance analysis, and performance prediction. 1315-1336 - Jakub Kroustek, Fridolín Pokorný, Dusan Kolár:
A new approach to instruction-idioms detection in a retargetable decompiler. 1337-1359 - Reed Milewicz, Marjan Mernik, Peter Pirkelbauer:
SimpleConcepts: A lightweight extension to C++ to support constraints on generic types. 1361-1379 - Ivan Simecek, Pavel Tvrdík:
A new code transformation technique for nested loops. 1381-1416 - Georgios Fourtounis, Nikolaos S. Papaspyrou, Panagiotis Theofilopoulos:
Modular polymorphic defunctionalization. 1417-1434 - João Santos, Ricardo Rocha:
A team-based scheduling model for interfacing or-parallel prolog engines. 1435-1454 - Milan Nosál, Jaroslav Porubän:
XML to annotations mapping definition with patterns. 1455-1477 - Ricardo Queirós, José Paulo Leal, José Campos:
Sequencing educational resources with Seqins. 1479-1497 - Gergely Dévai, Zoltán Gera, Zoltán Kelemen:
Language abstractions for low level optimization techniques. 1499-1514 - Tomas Skersys, Kestutis Kapocius, Rimantas Butleris, Tomas Danikauskas:
Extracting business vocabularies from business process models: SBVR and BPNM standards-based approach. 1515-1535 - Christos Malliarakis, Maya Satratzemi, Stelios Xinogalos:
Optimization of server performance in the CMX educational MMORPG for computer programming. 1537-1553 - Jakub Flotynski, Krzysztof Walczak:
Semantic representation of multi-platform 3D content. 1555-1580 - Valery I. Korzhik, Guillermo Morales-Luna, Alexander Kochkarev, Dmitriy Flaxman:
Concatenated digital watermarking system robust to different removal attacks. 1581-1594 - Marco Querini, Giuseppe F. Italiano:
Reliability and data density in high capacity color barcodes. 1595-1615 - Tomasz Kryjak, Mateusz Komorkiewicz, Marek Gorgon:
Real-time implementation of foreground object detection from a moving camera using the ViBe algorithm. 1617-1637
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.