default search action
5th BCI 2012: Novi Sad, Serbia
- Mirjana Ivanovic, Zoran Budimac, Milos Radovanovic:
Balkan Conference in Informatics, 2012, BCI '12, Novi Sad, Serbia, September 16-20, 2012. ACM 2012, ISBN 978-1-4503-1240-0
Analysis of algorithms and problem complexity, computer graphics
- Marjan Kindalov, Ana Madevska Bogdanova, Zarko Erakovic:
A novel algorithm for an image processing system in entomology. 1-7 - Sasko Ristov, Magdalena Kostoska, Marjan Gusev, Kiril Kiroski:
Virtualized environments in cloud can have superlinear speedup. 8-13 - Svetlana Strbac-Savic, Milo Tomasevic:
Comparative performance evaluation of the AVL and red-black trees. 14-19
Artificial intelligence
- Sebastian Binnewies, Bela Stantic:
OECEP: enriching complex event processing with domain knowledge from ontologies. 20-25 - Lajos Jeno Fülöp, Árpád Beszédes, Gabriella Tóth, Hunor Demeter, László Vidács, Lóránt Farkas:
Predictive complex event processing: a conceptual framework for combining complex event processing and predictive analytics. 26-31 - Gabriel Iuhasz, Viorel Negru, Daniela Zaharie:
Neuroevolution based multi-agent system for micromanagement in real-time strategy games. 32-39 - Petros Kefalas, Ioanna Stamatopoulou, Dionysios Basakos:
Formal modelling of agents acting under artificial emotions. 40-45 - Yiannis Kokkinos, Konstantinos G. Margaritis:
A distributed asynchronous and privacy preserving neural network ensemble selection approach for peer-to-peer data mining. 46-51 - Cvetana Krstev, Jelena Jacimovic, Dusko Vitas:
Recognition and normalization of some classes of named entities in Serbian. 52-57 - Vladimir Kurbalija, Charlotte von Bernstorff, Hans-Dieter Burkhard, Jens Nachtwei, Mirjana Ivanovic, Lidija Fodor:
Time-series mining in a psychological domain. 58-63 - Tatjana Lutovac:
An approach to automated reparation of failed proof attempts in propositional linear logic sequent calculus. 64-69 - Adrian Solomon, Panayiotis H. Ketikidis, Alok Choudhary:
A knowledge based approach for handling supply chain risk management. 70-75
Computer applications in different domains
- Klaus Bothe, Zoran Putnik, Betim Cico:
International educational cooperation: one possible model. 76-81 - Horatiu Dragomirescu, Ion Tighineanu:
Risks affecting the development of the information society in the Republic of Moldova: insights from a Delphi survey. 82-87 - Bekim Fetaji, Amir Demiri:
Social networking software use in social media marketing vs. traditional marketing: case study in Macedonia. 88-93 - Valentina Janev, Uros Milosevic, Mirko Spasic, Sanja Vranes, Jelena Milojkovic, Branko Jirecek:
Integrating Serbian public data into the LOD cloud. 94-99 - Nikitas Karanikolas, Michael Vassilakopoulos, Nektarios Giannoulis:
A software tool for building a statistical prefix processor. 100-105 - Kiril Kiroski, Magdalena Kostoska, Marjan Gusev, Sasko Ristov:
Growth rate analysis of e-Government development. 106-111 - George Nikolopoulos, Georgia D. Solomou, Christos Pierrakeas, Achilles Kameas:
Modeling the characteristics of a learning object for use within e-learning applications. 112-117 - Vigan Raça, Betim Cico, Majlinda Fetaji:
Management, communications and security policy in mobile database systems. 118-123 - Sonja Ristic, Ivan Lukovic, Slavica Aleksic, Jelena Banovic, Ali Al-Dahoud:
An approach to the specification of user interface templates for business applications. 124-129 - Nikos Vesyropoulos, Christos K. Georgiadis, Christos Ilioudis:
Analyzing the selection and dynamic composition of web services in e-commerce transactions. 130-135 - Stelios Xinogalos:
Programming techniques and environments in a technology management department. 136-141
Database and information systems
- Jasmin Azemovic:
Privacy aware eLearning environments based on hippocratic database principles. 142-149 - Mladen Cudanov, Ivan Todorovic, Ondrej Jasko:
Correlation between soft organizational features and development of ICT infrastructure. 150-155 - Christos Grompanopoulos, Ioannis Mavridis:
Challenging issues of UCON in modern computing environments. 156-161
Information storage and retrieval
- Jasmina Armenska, Katerina Zdravkova:
Comparison of information retrieval models for question answering. 162-167 - Stefanos Ougiaroglou, Georgios Evangelidis:
Efficient dataset size reduction by finding homogeneous clusters. 168-173 - Evis Trandafili, Alban Allkoçi, Elinda Kajo, Aleksander Xhuvani:
Discovery and evaluation of student's profiles with machine learning. 174-179
Languages and techniques, operating systems
- Aleksandar S. Dimovski:
Parameterized verification of open procedural programs. 180-185 - Panagiotis D. Michailidis, Konstantinos G. Margaritis:
Performance study of matrix computations using multi-core programming tools. 186-192 - Vladimír Siládi, Ladislav Huraj, Norbert Polcák, Eduard Vesel:
A parallel processing of spatial data interpolation on computing cloud. 193-198 - Stelios Xinogalos, Kostas E. Psannis, Angelo Sifaleras:
Recent advances delivered by HTML 5 in mobile cloud computing applications: a survey. 199-204
Sofware engineering
- Werner Gabrisch, Wolf Zimmermann:
A Hoare-style verification calculus for control state ASMs. 205-210 - Filip Nguyen, Tomás Pitner:
Information system monitoring and notifications using complex event processing. 211-216 - Predrag S. Rakic, Lazar Stricevic, Zorica Suvajdzin Rakic:
Statically typed matrix: in C++ library. 217-222 - Konstantinos Rousis, George Eleftherakis, Ognen Paunovski, Anthony J. Cowling:
Formal modelling of a bio-inspired paradigm capable of exhibiting emergence. 223-228 - Milos Savic, Milos Radovanovic, Mirjana Ivanovic:
Community detection and analysis of community evolution in Apache Ant class collaboration networks. 229-234
Artificial intelligence
- Tom Arbuckle, Damien Hogan, Conor Ryan:
Optimising Flash non-volatile memory using machine learning: a project overview. 235-238 - Costin Badica, Amelia Badica:
A set-based approach to negotiation with concessions. 239-242 - Vladimir Filipovic, Jozef Kratica, Aleksandar Savic, Djordje Dugosija:
The modification of genetic algorithms for solving the balanced location problem. 243-246 - Anze Pecar, Miha Zidar, Matjaz Kukar:
Reservoir sampling techniques in modern data analysis. 247-250
Computer applications in different domains
- Jelena Hadzi-Puric, Jeca Grmusa:
Extracting drug adverse and beneficial reactions in pediatric population from healthcare social network. 251-254 - Petar Milic, Natasa Z. Veljkovic, Leonid Stoimenov:
Framework for open data mining in e-government. 255-258 - Marko Misic, Marko Lazic, Jelica Protic:
A software tool that helps teachers in handling, processing and understanding the results of massive exams. 259-262
Database and information systems
- Margarita Karkali, Michalis Vazirgiannis:
S-Suite: a multipart service oriented architecture for the car rental sector. 263-266 - Dusan Petkovic:
Storing XML documents in databases using existing object-relational features. 267-270 - Veroniki Stamati-Koromina, Christos Ilioudis, Richard E. Overill, Christos K. Georgiadis, Demosthenes Stamatis:
Insider threats in corporate environments: a case study for data leakage prevention. 271-274
Information storage and retrieval
- Bojana Dimic Surla, Milan Segedinac, Dragan Ivanovic:
A BIBO ontology extension for evaluation of scientific research results. 275-278 - Slavko Zitnik, Lovro Subelj, Dejan Lavbic, Aljaz Zrnec, Marko Bajec:
Collective information extraction using first-order probabilistic models. 279-282
Sofware engineering
- Iva Bojic, Gordan Jezic, Damjan Katusic, Sasa Desic, Mario Kusek, Darko Huljenic:
Communication in machine-to-machine environments. 283-286 - Zoran Budimac, Gordana Rakic, Milos Savic:
SSQSA architecture. 287-290 - Tamás Cséri, Zalán Szügyi, Zoltán Porkoláb:
Rule-based assignment of comments to AST nodes in C++ programs. 291-294 - Frantisek Geletka, Ladislav Samuelis, Jozef Vojtko:
Evaluation of tools for automated unit testing for applications in OSGi. 295-297 - Rok Zontar, Marjan Hericko:
Adoption of object-oriented software metrics for ontology evaluation. 298-301
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.