


default search action
Computer Science and Information Systems, Volume 17
Volume 17, Number 1, 2020
- Mirjana Ivanovic

, Milos Radovanovic:
Editorial. 0 - Djamal Benslimane, Stéphane Jean, Ladjel Bellatreche, Kazumi Nakamatsu:

Guest editorial: Papers selected from 8th International Conference on Model and Data Engineering (MEDI 2018). 0 - Nikola Tankovic, Tihana Galinac Grbac

:
Run-time interpretation of information system application models in mobile cloud environments. 1-27 - Loiy Alsbatin

, Gürcü Öz, Ali Hakan Ulusoy
:
Efficient virtual machine placement algorithms for consolidation in cloud data centers. 29-50 - Jesús Calle-Cancho

, José-Manuel Mendoza-Rubio, José Luis González Sánchez, David Cortés-Polo
, Javier Carmona-Murillo:
Towards a software-based mobility management for 5G: An experimental approach for flattened network architectures. 51-70 - Stefanos Ougiaroglou

, Dimitris A. Dervos
, Georgios Evangelidis:
Instance-based classification using prototypes generated from large noisy and streaming datasets. 71-92 - Adrian Groza

, Pinar Öztürk, Radu Razvan Slavescu, Anca Marginean
:
Climate change opinions in online debate sites. 93-115 - Geert Poels

, Félix García, Francisco Ruiz
, Mario Piattini
:
Architecting business process maps. 117-139 - Bojan Marinkovic

, Zoran Ognjanovic
, Paola Glavan, Anton Kos, Anton Umek:
Correctness of the Chord protocol. 141-160 - Melinda Katona, Péter Bodnár, László G. Nyúl:

Distance transform and template matching based methods for localization of barcodes and QR codes. 161-179 - Tina Beranic, Marjan Hericko:

Comparison of systematically derived software metrics thresholds for object-oriented programming languages. 181-203 - Milena Vujosevic-Janicic

, Filip Maric
:
Regression verification for automated evaluation of students programs. 205-227 - José Paulo Leal

:
Visualization of path patterns in semantic graphs. 229-252 - Hasna El Alaoui El Abdallaoui, Abdelaziz El Fazziki, Fatima Zohra Ennaji

, Mohammed Sadgal:
A mobile crowd sensing framework for suspect investigation: An objectivity analysis and de-identification approach. 253-269 - Mounia Elqortobi, Warda El-Khouly, Amine Rahj, Jamal Bentahar

, Rachida Dssouli:
Verification and testing of safety-critical airborne systems: A model-based methodology. 271-292 - Saoussen Cheikhrouhou, Slim Kallel

, Ikbel Guidara, Zakaria Maamar
:
Business process specification, verification, and deployment in a mono-cloud, multi-edge context. 293-313 - Pascal André, J. Christian Attiogbé

, Arnaud Lanoix:
A tool-assisted method for the systematic construction of critical embedded systems using Event-B. 315-338 - Rachid Lamrani, El Hassan Abdelwahed

:
Game-based learning and gamification to improve skills in early years education. 339-356
Volume 17, Number 2, 2020
- Mirjana Ivanovic

, Milos Radovanovic:
Editorial. 0 - Laleh Samarbakhsh, Boza Tasic:

What makes a board director better connected? Evidence from graph theory. 357-377 - Dunja Vrbaski, Aleksandar Kupusinac

, Rade Doroslovacki, Edita Stokic, Dragan Ivetic:
Missing data imputation in cardiometabolic risk assessment: A solution based on artificial neural networks. 379-401 - Ejub Kajan

, Noura Faci, Zakaria Maamar
, Mohamed Sellami, Emir Ugljanin, Hamamache Kheddouci, Dragana Stojanovic, Djamal Benslimane:
Real-time tracking and mining of users' actions over social media. 403-426 - Tianle Zhang

, Muzhou Hou, Tao Zhou, Zhaode Liu, Weirong Cheng, Yangjin Cheng:
Land-use classification via ensemble dropout information discriminative extreme learning machine based on deep convolution feature. 427-443 - Yonghui Dai

, Bo Xu, Siyu Yan, Jing Xu:
Study of cardiac arrhythmia classification based on Convolutional Neural Network. 445-458 - Tomaz Stepisnik, Aljaz Osojnik

, Saso Dzeroski
, Dragi Kocev
:
Option predictive clustering trees for multi-target regression. 459-486 - Hyun-Kyo Oh, Jongbin Jung, Sunju Park, Sang-Wook Kim:

A robust reputation system using online reviews? 487-507 - Arafat Sentürk, Resul Kara, Ibrahim Özçelik

:
Fuzzy logic and image compression based energy efficient application layer algorithm for wireless multimedia sensor networks. 509-536 - Huan Zhao, Jie Cao, Mingquan Xu, Jian Lu:

Variational neural decoder for abstractive text summarization. 537-552 - Milica Labus

, Marijana Despotovic-Zrakic, Zorica Bogdanovic
, Dusan Barac, Snezana Popovic:
Adaptive e-business continuity management: Evidence from the financial sector. 553-580 - Edwin Valarezo Añazco

, Patricio Rivera Lopez
, Hye Min Park, Nahyeon Park, Tae-Yeon Kim:
Human activities recognition with a single writs IMU via a Variational Autoencoder and android deep recurrent neural nets. 581-597 - Natasa Z. Veljkovic, Petar Milic

, Leonid Stoimenov
, Kristijan Kuk
:
Production of linked government datasets using enhanced LIRE architecture. 599-617 - Chao Wang, Xing Qiu, Hui Liu, Dan Li, Kaiguang Zhao

, Lili Wang:
Damaged buildings recognition of post-earthquake high-resolution remote sensing images based on feature space and decision tree optimization. 619-646 - Yangyang Ge, Fei Zhu, Wei Huang, Peiyao Zhao, Quan Liu:

Multi-agent cooperation Q-learning algorithm based on constrained Markov Game. 647-664 - Jing Xu, Dezhi Han, Kuan-Ching Li

, Hai Jiang:
A K-means algorithm based on characteristics of density applied to network intrusion detection. 665-687 - Hongzhi Hu, Yunbing Tang, Yanqiang Xie, Yonghui Dai

, Weihui Dai
:
Cognitive computation on consumer's decision making of internet financial products based on neural activity data. 689-704
Volume 17, Number 3, 2020
- Hong Shen, Hui Tian, Yingpeng Sang:

Guest editorial: Parallel computing and applications. - Honghao Gao, Yuyu Yin

, Yoon Jung Kim:
Guest editorial: Edge computing. - Johann Gamper, Mirjana Ivanovic

, Robert Wrembel
:
Guest editorial: Advances in databases and information systems. - Chuyue Zhang, Xiaofan Zhao, Manchun Cai, Dawei Wang, Luzhe Cao:

A new model for predicting the attributes of suspects. 705-715 - Aihua Yin, Chong Chen, Dongping Hu, Jianghai Huang, Fan Yang:

An improved heuristic-dynamic programming algorithm for rectangular cutting problem. 717-735 - Zijing Ma

, Shuangjuan Li, Longkun Guo, Guohua Wang:
Energy-efficient non-linear k-barrier coverage in mobile sensor network. 737-758 - Zhanmao Cao, Qisong Huang, Chase Q. Wu:

Maximize concurrent data flows in multi-radio multi-channel wireless mesh networks. 759-777 - Chunyue Zhou, Hui Tian, Baitong Zhong:

An improved MCB localization algorithm based on weighted RSSI and motion prediction. 779-794 - Xindong You, Jiangwei Ma, Yuwen Zhang, Xueqiang Lv, Junmei Han:

VDRF: Sensing the defect information to risk level of vehicle recall based on bert communication model. 795-817 - Wei Ou, Jianhuan Zeng, Zijun Guo, Wanqin Yan, Dingwan Liu, Stelios Fuentes:

A homomorphic-encryption-based vertical federated learning scheme for rick management. 819-834 - Shunjiang Wang

, Yan Zhao, Jiang He, Rong Chen, Lina Cao:
A novel data-driven intelligent computing method for the secure control of a benchmark microgrid system. 835-848 - Zhongqin Bi, Shuming Dou, Zhe Liu, Yongbin Li:

A recommendations model with multiaspect awareness and hierarchical user-product attention mechanisms. 849-865 - Jun-Hee Choi, Hyun-Sug Cho:

A study on the development of a light scattering particulate matter sensor and monitoring system. 867-890 - Hye-Young Kim, Jinsul Kim:

A load balancing scheme for gaming server applying reinforcement learning in IoT. 891-906 - Kang Yang, Huiqun Yu, Guisheng Fan, Xingguang Yang:

Graph embedding code prediction model integrating semantic features. 907-926 - Mohammadreza Fani Sani, Sebastiaan J. van Zelst, Wil M. P. van der Aalst

:
Improving the performance of process discovery algorithms by instance selection. 927-958 - Karolina Przybylek, Illia Shkroba:

Crowd counting'a la Bourdieu: Automated estimation of the number of people. 959-982 - Michal Kopecky, Peter Vojtás:

Visual e-commerce values filtering framework with spatial database metric. 983-1006

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














