


default search action
Computer Science and Information Systems, Volume 14
Volume 14, Number 1, 2017
- Piedad Garrido, Javier Barrachina, Francisco J. Martinez, Francisco J. Serón:

Smart tourist information points by combining agents, semantics and AI techniques. 1-23 - Laurens De Vocht, Selver Softic

, Ruben Verborgh
, Erik Mannens, Martin Ebner
:
ResXplorer: Revealing relations between resources for researchers in the Web of Data. 25-50 - José A. Ruipérez-Valiente

, Pedro J. Muñoz Merino
, Héctor J. Pijeira Díaz
, Javier Santofimia Ruiz, Carlos Delgado Kloos:
Evaluation of a learning analytics application for open edX platform. 51-73 - Bostjan Sumak

, Marjan Hericko, Zoran Budimac
, Maja Pusnik:
Investigation of moderator factors in e-business adoption: A quantitative meta-analysis of moderating effects on the drivers of intention and behavior. 75-102 - Jelena Graovac, Jovana J. Kovacevic

, Gordana Pavlovic-Lazetic:
Hierarchical vs. flat n-gram-based text categorization: Can we do better? 103-121 - Yanshan Wang

, In-Chan Choi, Hongfang Liu:
Generalized ensemble model for document ranking in information retrieval. 123-151 - Zeljko Lukac, Stanislav Ocovaj, Dragan Samardzija

, Miodrag R. Temerinac:
Fast edge-preserving gravity-like image interpolation. 153-173 - Giruta Kazakevicute-Januskeviciene

, Andrius Usinskas, Eugenijus Januskevicius, Jurgita Usinskiene, Simona Letautiene:
Annotation of the medical images using quick response codes. 175-196 - Algimantas Venckauskas

, Vacius Jusas
, Kestutis Paulikas, Jevgenijus Toldinas
:
Methodology to investigate BitTorrent sync protocol. 197-218 - Alberto Fernández-Isabel, Rubén Fuentes-Fernández

:
Extending a generic traffic model to specific agent platform requirements. 219-237 - Jorge J. Gómez-Sanz

, Rafael Pax, Millán Arroyo, Marlon Cárdenas-Bonett:
Requirement engineering activities in smart environments for large facilities. 239-255 - Marin Lujak

, Holger Billhardt
, Jürgen Dunkel, Alberto Fernández
, Ramón Hermoso
, Sascha Ossowski
:
A distributed architecture for real-time evacuation guidance in large smart buildings. 257-282
Volume 14, Number 2, 2017
- Mate Tomoskozi, Patrick Seeling

, Péter Ekler, Frank H. P. Fitzek
:
Performance evaluation and implementation of IP and robust header compression schemes for TCP and UDP traffic in static and dynamic wireless contexts. 283-308 - Dragan Matic

, Jozef Kratica
, Vladimir Filipovic
:
Variable neighborhood search for solving bandwidth coloring problem. 309-327 - Srdjan Sladojevic

, Andras Anderla
, Dubravko Culibrk, Darko Stefanovic, Bojan Lalic
:
Integer arithmetic approximation of the hog algorithm used for pedestrian detection. 329-346 - Elkhan Jabarov, Byung-Won On, Gyu Sang Choi, Myong-Soon Park:

R-Tree for phase change memory. 347-367 - Kyo-Sung Jeong, Sungchae Lim, Kichun Lee, Sang-Wook Kim:

A flash-aware buffering scheme with the on-the-fly redo for efficient data management in flash storage. 369-392 - Dilani Wickramaarachchi, Richard Lai:

Effort estimation in global software development - a systematic review. 393-421 - Michal Bystrický, Valentino Vranic

:
Preserving use case flows in source code: Approach, context, and challenges. 423-445 - Petri Rantanen

:
REST API example generation using Javadoc. 447-466 - Predrag Pecev

, Milos Rackovic
:
LTR-MDTS structure - a structure for multiple dependent time series prediction. 467-490 - Filipe Portela

, Filipe Miranda
, Manuel Filipe Santos
, António Abelha
, José Machado
:
An online-processing critical patient monitoring system- an interoperability overview. 491-515 - Dennis Wolters, Christian Gerth, Gregor Engels:

Visual requirements modeling for cross-device systems. 517-536 - Jukka Ruohonen

, Sami Hyrynsalmi
, Ville Leppänen
:
Modeling the delivery of security advisories and CVEs. 537-555 - Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish

, Emmanouil Panaousis
, Christos Kalloniatis:
A conceptual model to support security analysis in the internet of things. 557-578
Volume 14, Number 3, 2017
- Lu Cao, Hong Shen:

Imbalanced data classification based on hybrid resampling and twin support vector machine. 579-595 - Hui Tian

, Jingtian Liu, Meimei Ding:
Promising techniques for anomaly detection on network traffic. 597-609 - Tao Jiang, Huaxi Gu, Kun Wang, Xiaoshan Yu, Yunfeng Lu:

BHyberCube: A MapReduce aware heterogeneous architecture for data center. 611-627 - Jun Wu, Yu He, Xiaohong Qin, Na Zhao, Yingpeng Sang:

Click-boosted graph ranking for image retrieval. 629-641 - Yidong Li

, Wenhua Liu, Yankun Jia, Hairong Dong
:
A weighted Mutual Information Biclustering algorithm for gene expression data. 643-660 - Zhanmao Cao, Chase Q. Wu, Mark L. Berry:

An optimization scheme for routing and scheduling of concurrent user requests in wireless mesh networks. 661-684 - Haijian Chen, Yonghui Dai

, Yanjie Feng, Bo Jiang, Jun Xiao, Ben You:
Construction of affective education in mobile learning: The study based on learner's interest and emotion recognition. 685-702 - Shaofang He, Huan Zhao:

A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing. 703-718 - Chenhao Jia, Linlan Liu, Xiaole Gu, Manlan Liu:

A novel link quality prediction algorithm for wireless sensor networks. 719-734 - Jian Shu, Lei Xu, Shandong Jiang, Lingchong Meng:

Connected model for opportunistic sensor network based on Katz centrality. 735-750 - Zhenxin Du, Dezhi Han, Guangzhong Liu, Jianxin Jia:

An improved artificial bee colony algorithm with elite-guided search equations. 751-767 - Dezhi Han, Kun Bi, Han Liu, Jianxin Jia:

A DDoS attack detection system based on spark framework. 769-788 - Fei Zhu, Haijun Zhu, Yuchen Fu, Donghuo Chen, Xiaoke Zhou:

A kernel based true online Sarsa(λ) for continuous space control problems. 789-804 - Genghui Dai, Xinshuang Fu, Weihui Dai

, Shengqi Lu:
Social evaluation of innovative drugs: A method based on big data analytics. 805-821 - Wei Wang, Guodong Xin, Bailing Wang, Junheng Huang, Yang Liu:

Sentiment information extraction of comparative sentences based on CRF model. 823-837 - Bin Kong, Kun Yang, Degang Sun, Meimei Li, Zhixin Shi:

Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches. 839-856 - Qiaozhi Xu, Junxing Zhang:

Building a lightweight testbed using devices in personal area networks. 857-873 - Geylani Kardas

, Emine Bircan, Moharram Challenger
:
Supporting the platform extensibility for the model-driven development of agent systems by the interoperability between domain-specific modeling languages of multi-agent systems. 875-912 - Zdenek Rybola, Robert Pergl:

Towards ontoUML for software engineering: Transformation of kinds and subkinds into relational databases. 913-937 - Sergej Chodarev

, Jaroslav Porubän
:
Development of custom notation for XML-based language: A model-driven approach. 939-958

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














