


default search action
Computer Science and Information Systems, Volume 15
Volume 15, Number 1, 2018
- Gordana Milosavljevic

, Goran Sladic
, Branko Milosavljevic
, Miroslav Zaric, Stevan Gostojic
, Jelena Slivka
:
Context-sensitive constraints for access control of business processes. 1-30 - Titas Savickas, Olegas Vasilecas:

An approach to business process simulation using mined probabilistic models. 31-50 - Marek Krótkiewicz

:
A novel inheritance mechanism for modeling knowledge representation systems. 51-78 - Predrag Matkovic

, Mirjana Maric
, Pere Tumbas
, Marton Sakal
:
Traditionalisation of agile processes: Architectural aspects. 79-109 - Beumjin Cho, Sangho Lee, Meng Xu, Sangwoo Ji, Taesoo Kim, Jong Kim:

Prevention of cross-update privacy leaks on android. 111-137 - Miodrag Petkovic

, Ilija Basicevic, Dragan Kukolj
, Miroslav Popovic
:
Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks. 139-162 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:

CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word. 163-185 - Ivica Slavkov, Jana Karcheska, Dragi Kocev

, Saso Dzeroski
:
HMC-ReliefF: Feature ranking for hierarchical multi-label classification. 187-209 - Zhou Tao, Muzhou Hou, Chunhui Liu

:
Forecasting stock index with multi-objective optimization model based on optimized neural network architecture avoiding overfitting. 211-236 - Eduardas Bareisa, Vacius Jusas

, Kestutis Motiejunas, Liudas Motiejunas, Rimantas Seinauskas:
Black box delay fault models for non-scan sequential circuits. 237-256
Volume 15, Number 2, 2018
- Marcelo Zambrano

, Francisco J. Pérez, Manuel Esteve
, Carlos Enrique Palau
:
Interoperability in the emergency management. A solution based on distributed databases and P2P networks. 257-272 - Pablo Vidal, Ana Carolina Olivera

:
Solving the DNA fragment assembly problem with a parallel discrete firefly algorithm implemented on GPU. 273-293 - Osama A. Mehdi, Hamidah Ibrahim, Lilly Suriani Affendey, Eric Pardede, Jinli Cao:

Exploring instances for matching heterogeneous database schemas utilizing Google similarity and regular expression. 295-320 - Shalinka Jayatilleke, Richard Lai, Karl Reed:

Managing software requirements changes through change specification and classification. 321-346 - Won-Seok Hwang, Shaoyu Li, Sang-Wook Kim, Kichun Lee:

Data imputation using a trust network for recommendation via matrix factorization. 347-368 - Dorde Petrovic, Milena Stankovic:

Use of linguistic forms mining in the link analysis of legal documents. 369-392 - Belayadi Djahida, Khaled-Walid Hidouci, Ladjel Bellatreche:

OLAPS: Online load-balancing in range-partitioned main memory database with approximate partition statistics. 393-419 - Aida Kamisalic

, Marjan Hericko, Tatjana Welzer, Muhamed Turkanovic:
Experimental study on the effectiveness of a teaching approach using barker or Bachman notation for conceptual database design. 421-448 - Dani Almog, Hadas Schwartz-Chassidim

, Yaron Tsubery, Miroslav Bures, Shlomo Mark
:
Conceptual approach for reuse of test automation artifacts on various architectural levels. 449-472 - Vladimir N. Babenko

, Anton G. Bogomolov, Roman O. Babenko, Elvira R. Galieva, Yuriy L. Orlov
:
CpG islands' clustering uncovers early development genes in the human genome. 473-485
Volume 15, Number 3, 2018
- Hai-Tao Zheng, Jinxin Han, Jin-Yuan Chen, Arun Kumar Sangaiah

:
A novel framework for Automatic Chinese Question Generation based on multi-feature neural network model. 487-499 - Zhijie Zhao, Cong Ren, Huadong Sun, Zhipeng Fan, Ze Gao:

Research on automatic identification technique of CT image in lung. 501-515 - Pinle Qin, Jun Chen, Kai Zhang, Rui Chai:

Convolutional neural networks and hash learning for feature extraction and of fast retrieval of pulmonary nodules. 517-531 - Weipeng Jing, Danyu Tong, Guangsheng Chen, Chuanyu Zhao, Liangkuan Zhu:

An optimized method of HDFS for massive small files storage. 533-548 - Cheng Song, Mingyue Zhang, Zongpu Jia, Wei-Ping Peng, Hairu Guo:

A lightweight batch anonymous authentication scheme for VANET based on pairing-free. 549-567 - Lei Wang, Weihua Wu, Junyan Qi, Zong-pu Jia:

Wireless sensor network coverage optimization based on whale group algorithm. 569-583 - Xu An Wang

, Xiaoyuan Yang, Cong Li, Yudong Liu, Yong Ding
:
Improved functional proxy re-encryption schemes for secure cloud data sharing. 585-614 - Bushra Zafar

, Rehan Ashraf, Nouman Ali
, Mudassar Ahmed, Sohail Jabbar
, Kashif Naseer Qureshi, Awais Ahmad, Gwanggil Jeon:
Intelligent image classification-based on spatial weighted histograms of concentric circles. 615-633 - Josefa Díaz Álvarez

, Francisco Chávez de la O
, Pedro A. Castillo
, Juan Ángel García Martínez, Francisco J. Rodríguez
, Francisco Fernández de Vega:
A fuzzy rule-based system to predict energy consumption of genetic programming algorithms. 635-654 - Giovanni Ciatto

, Stefano Mariani, Andrea Omicini:
ReSpecTX: Programming interaction made easy. 655-682 - Filipe Gonçalves

, Davide Carneiro
, José Miguel Pêgo
, Paulo Novais
:
X3S: A multi-modal approach to monitor and assess stress through human-computer interaction. 683-703 - Christopher Haubeck, Alexander Pokahr

, Kim Reichert, Till Hohenberger, Winfried Lamersdorf:
The CRI-model: A domain-independent taxonomy for non-conformance between observed and specified behaviour. 705-731 - Rafael Nogueras

, Carlos Cotta
:
On the use of self-* Island-based evolutionary computation methods on complex environments. 733-750 - Lars Braubach, Kai Jander

, Alexander Pokahr
:
A novel distributed registry approach for efficient and resilient service discovery in megascale distributed systems? 751-774 - Petros Kefalas

, Ioanna Stamatopoulou
:
Using screencasts to enhance coding skills: The case of logic programming? 775-798 - Martin Bonchanoski, Katerina Zdravkova

:
Learning syntactic tagging of Macedonian language. 799-820 - Jovana Vidakovic

, Sonja Ristic, Slavica Kordic
, Ivan Lukovic
:
Extended tuple constraint type as a complex integrity constraint type in XML data model - definition and enforcement. 821-843

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














