default search action
Central European Journal of Computer Science, Volume 2
Volume 2, Number 1, March 2012
- Steven Braeger, Nicholas Arnold, Damian Dechev:
Scalable n-body event prediction. 1-15 - Wolfgang Kramper, Ralf Wanker, Karl-Heinz Zimmermann:
Analysis of swarm behavior using compound eye and neural network control. 16-32 - T. S. Ghouse Basha, M. N. Giri Prasad, P. V. Sridevi:
Beam forming in smart antenna with improved gain and suppressed interference using genetic algorithm. 33-46 - Mohammad Taherdangkoo, Mehran Yazdi, Mohammad Hadi Bagheri:
A powerful and efficient evolutionary optimization algorithm based on stem cells algorithm for data clustering. 47-59 - Saru Kumari, Mridul Kumar Gupta, Manoj Kumar:
Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. 60-75 - Mohammad Ayoub Khan, Abdul Quaiyum Ansari:
Area-efficient programmable arbiter for inter-layer communications in 3-D network-on-chip. 76-85 - Anooj Padmakumari Kunjunninair:
Erratum to: "Clinical decision support system: risk level prediction of heart disease using weighted fuzzy rules and decision tree rules". 86
Volume 2, Number 2, June 2012
- Poulcheria Benou, Costas Vassilakis:
A context management architecture for m-commerce applications. 87-117 - Abe Hall, Michael Gabilondo, Damian Dechev:
Using parallelization to improve the efficiency of an automated taxi route generation algorithm. 118-127 - Urszula Boryczka, Przemyslaw Juszczuk:
A new evolutionary approach for computing Nash equilibria in bimatrix games with known support. 128-142 - Christoph Lass:
Minimal number of clues for Sudokus. 143-151 - B. B. V. L. Deepak, Dayal R. Parhi:
PSO based path planner of an autonomous mobile robot. 152-168
Volume 2, Number 3, October 2012
- Valerie Novitzká, Juraj Giertl, William Steingartner:
Selected Papers from the International Scientific Conference INFORMATICS'2011. 169 - Jaroslav Zendulka, Martin Pesek:
Mining moving object data. 183-193 - Mykola S. Nikitchenko, Valentyn G. Tymofieiev:
Satisfiability in composition-nominative logics. 194-213 - Daniel Mihályi, Valerie Novitzká, Martina Lalová:
Intrusion detection system episteme. 214-221 - Ivan Petko, Stefan Hudák:
General composition for high level Petri nets and its properties. 222-235 - Ján Gamec, Daniel Urdzik, Mária Gamcová:
Algorithm of traffic signs recognition based on the rapid transform. 236-244 - Erika Baksa-Varga, László Kovács:
Modeling generalization and specialization with Extended Conceptual Graphs. 245-260 - Branislav Sobota, Stefan Korecko, Frantisek Hrozek:
On building an object-oriented parallel virtual reality system. 261-271 - Frantisek Hrozek, Branislav Sobota, Csaba Szabó:
Digital preservation of historical buildings using virtual reality technologies. 272-282 - Milan Nosál, Jaroslav Porubän:
Supporting multiple configuration sources using abstraction. 283-299 - Michaela Bacíková, Jaroslav Porubän:
Analyzing stereotypes of creating graphical user interfaces. 300-315 - Darko Galinec, William Steingartner, Danijel Macanga:
Command and control information systems semantic interoperability using a canonical messaging approach. 316-330 - Adrián Pekár, Martin Révés, Juraj Giertl, Peter Fecilak:
Overview and insight into the MONICA research group. 331-343 - Katarína Kleinová, Peter Fecilak:
New approach to remote laboratory in regard to topology change and self-repair feature. 344-353 - Mikulás Alexík:
Process models using hardware in simulation loop. 354-366
Volume 2, Number 4, December 2012
- Muhammad Kashif Hanif, Karl-Heinz Zimmermann:
Graphics card processing: accelerating profile-profile alignment. 367-388 - Aleksandr Cariow, Galina Cariowa:
Rationalized algorithm for computing the product of two sedenions. 389-397 - Adrian-Gabriel Chifu, Radu Tudor Ionescu:
Word sense disambiguation to improve precision for ambiguous queries. 398-411 - Marek Kozlowski:
Introducing OGR - a new approach to anonymous IP datagram transmission based on the Chaumian 'onion' encryption and the KISS principle. 412-425 - Aloysius George, D. Binu:
DRL-Prefixspan: A novel pattern growth algorithm for discovering downturn, revision and launch (DRL) sequential patterns. 426-439 - Dariusz Jacek Jakóbczak:
Application of Hurwitz-Radon matrices in curve interpolation and almost-smoothing. 440-458
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.