default search action
Computing and Informatics, Volume 32
Volume 32, Number 1, 2013
- Periasamy Vivekanandan, M. Rajalakshmi, Raju Nedunchezhian:
An Intelligent Genetic Algorithm for Mining Classification Rules in Large Datasets. 1-22 - Peng Zhang, Wenbo Zhao, Daming Zhu:
Complexity and Approximation Results for the Min-Sum and Min-Max Disjoint Paths Problems. 23-45 - Yongfeng Huang, Shanyu Tang, Wanxia Yang:
An Information- Theoretical Model for Streaming Media Based Stegosystems. 47-62 - Yanyun Tao, Minglu Li, Jian Cao:
A New Dynamic Population Variation in Genetic Programming. 63-87 - Jiuchuan Jiang, Yungui Zhang:
A Social Force Model for Adjusting Sensing Ranges in Multiple Sensing Agent Systems. 89-112 - Manuel Aurelio Rodriguez Pascual, Rafael Mayo García, Ignacio Martín Llorente:
Montera: A Framework for Efficient Execution of Monte Carlo Codes on Grid Infrastructures. 113-144 - Igor Santos, Xabier Ugarte-Pedrero, Felix Brezo, Pablo García Bringas, José María Gómez Hidalgo:
NOA: An Information Retrieval Based Malware Detection System. 145-174 - Nathalie Cindy Kuicheu, Ning Wang, Gile Narcisse Fanzou Tchuissang, De Xu, Guojun Dai, François Siewe:
Managing Uncertain Mediated Schema and Semantic Mappings Automatically in Dataspace Support Platforms. 175-202 - Vijay Kumar, Arun Sharma, Rajesh Kumar:
Applying Soft Computing Approaches to Predict Defect Density in Software Product Releases: An Empirical Study. 203-224
Volume 32, Number 2, 2013
- César A. L. de Oliveira, Natália Cabral Silva, Cecília Leite Sabat, Ricardo Massa Ferreira Lima:
Reducing the Gap Between Business and Information Systems Through Complex Event Processing. 225-250 - Roland Dobai, Marcel Baláz:
Compressed Skewed-Load Delay Test Generation Based on Evolution and Deterministic Initialization of Populations. 251-272 - Santiago Iturriaga, Sergio Nesmachnow, Bernabé Dorronsoro, Pascal Bouvry:
Energy Efficient Scheduling in Heterogeneous Systems with a Parallel Multiobjective Local Search. 273-294 - Jianhua Sun, Hao Chen, Cheng Chang, Xingbang Li:
Kernel Code Integrity Protection Based on a Virtualized Memory Architecture. 295-311 - Mihai Talmaciu, Elena Nechita, Barna Iantovics:
Recognition and Combinatorial Optimization Algorithms for Bipartite Chain Graphs. 313-329 - Anna Nepomniaschaya:
Efficient Parallel Implementation of the Ramalingam Decremental Algorithm for Updating the Shortest Paths Subgraph. 331-354 - Peter Butka, Jozef Pócs:
Generalization of One-Sided Concept Lattices. 355-370 - Abdunabi Ubul, El-Sayed Atlam, Hiroya Kitagawa, Masao Fuketa, Kazuhiro Morita, Jun-ichi Aoe:
An Efficient Method of Summarizing Documents Using Impression Measurements. 371-391 - Doina Tatar, Diana Inkpen, Gabriela Czibula:
Text Segmentation Using Roget-Based Weighted Lexical Chains. 393-410 - Tanakorn Wichaiwong, Chuleerat Jaruskulchai:
A Double Scoring Method for XML Element Retrieval. 411-440
Volume 32, Number 3, 2013
- Liaojun Pang, Huixian Li:
nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness. 441-460 - Binh Minh Nguyen, Viet D. Tran, Ladislav Hluchý:
A Generic Development and Deployment Framework for Cloud Computing and Distributed Applications. 461-485 - Teréz Anna Várkonyi:
Robust Fixed Point Transformations-based Control of Chaotic Systems. 487-507 - Anita Sabo, Bojan Kuljic, Tibor Szakáll:
Educational Tools for Object-Oriented DSP Interactive DSL Framework. 509-526 - Mohammad Hussain:
Efficient Decimation of Polygonal Models Using Normal Field Deviation. 527-547 - Majid Ghayoori, Mostafa S. Haghjoo:
A Model to Overcome Integrity Challenges of an Untrusted DSMS Server. 549-571 - Cristian Vidal Silva, Rodrigo Saens, Carolina Del Río, Rodolfo Villarroel:
Aspect-Oriented Modeling: Applying Aspect-Oriented UML Use Cases and Extending Aspect-Z. 573-593 - Jack Mario Mingo, Ricardo Aler, Darío Maravall, Javier de Lope Asiaín:
Investigations into Lamarckism, Baldwinism and Local Search in Grammatical Evolution Guided by Reinforcement. 595-627 - Boban Vesin, Aleksandra Klasnja-Milicevic, Mirjana Ivanovic, Zoran Budimac:
Applying Recommender Systems and Adaptive Hypermedia for e-Learning Personalizatio. 629-659
Volume 32, Number 4, 2013
- Verena Christina Horak, Tobias Berka, Marián Vajtersic:
Parallel Classification with Two-Stage Bagging Classifiers. 661-677 - Jongwan Kim, Dukshin Oh, Keecheon Kim:
QMBRi: Inverse quantization of minimum bounding rectangles for spatial data compression. 679-696 - Kashif Zafar, Abdul Rauf Baig:
Multiple Route Generation Using Simulated Niche Based Particle Swarm Optimization. 697-721 - Jin Li, Xiaofeng Chen:
Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing. 723-738 - Radu Iosif, Adam Rogalewicz:
Automata-Based Termination Proofs. 739-775 - Sandra García-Rodríguez, David Quintana, Inés María Galván, Pedro Isasi:
Multiobjective Algorithms with Resampling for Portfolio Optimization. 777-796 - Mahdi Rahimi Naddaf, Vahid Rafe:
Performance Modeling and Analysis of Software Architectures Specified Through Graph Transformations. 797-826 - Ying Pan, Yong Tang:
Pay-As-You-Go Software Artifacts Managemen. 827-843 - Zsolt Csaba Johanyák:
Fuzzy Modeling of Thermoplastic Composites' Melt Volume Rate. 845-857 - Pawel Russek, Kazimierz Wiatr:
The Enhancement of a Computer System for Sorting Capabilities Using FPGA Custom Architecture. 859-876 - Lujiang Zhang, Xiaohui Hu:
Word Combination Kernel for Text Classification with Support Vector Machines. 877-896
Volume 32, Number 5, 2013
- Chouvalit Khancome, Veera Boonjing:
A New Linear-Time Dynamic Dictionary Matching Algorithm. 897-923 - Xiaowang Zhang, Zuoquan Lin:
An Approach to Generating Arguments over DL-Lite Ontologies. 924-948 - Frantisek Darena, Jan Zizka:
Approaches to samples selection for machine learning based classification of textual data. 949-967 - Zhijun Ding, Jiegi Liu, Junli Wang, Fang Wang:
An Executable Service Composition Code Automatic Creation Tool Based on Petri Net Model. 968-986 - Xiaofeng Ding, Hai Jin, Hui Xu, Wei Song:
Probabilistic Skyline Queries over Uncertain Moving Objects. 987-1012 - Puniethaa Prabhu, Karuppusamy Duraiswamy:
An Efficient Visual Analysis Method for Cluster Tendency Evaluation, Data Partitioning and Internal Cluster Validation. 1013-1037 - Daniela Sturczová, Petr Rapant:
Enhanced Methodology for Ontology Development. 1038-1054 - Bartlomiej Sniezynski:
Agent Strategy Generation by Rule Induction. 1055-1078 - Karam Gouda, Mosab Hassaan:
Efficiently Using Prime-Encoding for Mining Frequent Itemsets in Sparse Data. 1079-1099 - Piotr Dziubecki, Piotr Grabowski, Michal Krysinski, Tomasz Kuczynski, Krzysztof Kurowski, Tomasz Piontek, Dawid Szejnfeld:
New Science Gateways for Advanced Computing Simulations and Visualization Using Vine Toolkit in PL-Grid. 1100-1115
Volume 32, Number 6, 2013
- Dániel Stojcsics, András Molnár:
Autonomous Takeoff and Landing Control for Small Size Unmanned Aerial Vehicles. 1117-1130 - Marek Bundzel, Tomás Kasanický, Richard Pincak:
Experimental Analysis of the Prediction Model Based on String Invariants. 1131-1146 - Antonio J. Alencar, Carlos A. S. Franco, Eber A. Schmitz, Alexandre L. Correa:
A Statistical Approach for the Maximization of the Financial Benefits Yielded by a Large Set of MMFs and AEs. 1147-1169 - Lamiaa Fattouh Ibrahim, Hesham Abou El Fetouh Salman:
Applying Clustering Techniques in Hybrid Network in the Presence of 2D and 3D Obstacles. 1170-1191 - Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Kangbin Yim:
Database Security System for Applying Sophisticated Access Control via Database Firewall Server. 1192-1211 - Bon-Woo Hwang, Seung-Jun Kwon, Sang-Woong Lee:
Facial Image Reconstruction from a Corrupted Image by Support Vector Data Description. 1212-1228 - Xiaoqian Li, Huachun Zhou, Hongbin Luo, Hongke Zhang, Feng Qiu, Ilsun You:
HMS: A Hierarchical Mapping System for the Locator/ID Separation Network. 1229-1255 - AndrzejOlszewski Olszewski, Marcin Wolter:
A Needle in the Haystack: Higgs Boson Searches in the ATLAS Experiment. 1256-1271 - Agnieszka Dabrowska-Boruch, Grzegorz Gancarczyk, Kazimierz Wiatr:
Implementation of a RANLUX Based Pseudo-Random Number Generator in FPGA Using VHDL and Impulse C. 1272-1292 - Junwei Lei, Hongchao Zhao, Jinyong Yu, Zuoe Fan, Heng Li, Kehua Li:
Research on Tracking and Synchronization of Uncertain Chaotic Systems. 1293-1311 - Kristián Valentín, Michal Malý:
Network Firewall using Artificial Neural Networks. 1312-1327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.