Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Computer Science and Information Systems
Tome 15 (2018)
Précédent
Suivant
Sommaire du
Fascicule no. 1
Context-sensitive Constraints for Access Control of Business Processes
Gordana Milosavljević
;
Goran Sladić
;
Branko Milosavljević
;
Miroslav Zarić
;
Stevan Gostojić
;
Jelena Slivka
An approach to business process simulation using mined probabilistic models
Titas Savickas
;
Olegas Vasilecas
A Novel Inheritance Mechanism for Modeling Knowledge Representation Systems
Marek Krótkiewicz
Traditionalisation of Agile Processes: Architectural Aspects
Predrag Matkovic
;
Mirjana Maric
;
Pere Tumbas
;
Marton Sakal
Prevention of Cross-update Privacy Leaks on Android
Beumjin Cho
;
Sangho Lee
;
Meng Xu
;
Sangwoo Ji
;
Taesoo Kim
;
Jong Kim
Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks
Miodrag Petkovic
;
Ilija Basicevic
;
Dragan Kukolj
;
Miroslav Popovic
CSDSM: Cognitive Switch-based DDoS Sensing and Mitigation in SDN-driven CDNi Word
Nishat I Mowla
;
Inshil Doh
;
Kijoon Chae
HMC-ReliefF: Feature Ranking for Hierarchical Multi-label Classification
Ivica Slavkov
;
Jana Karcheska
;
Dragi Kocev
;
Sašo Džeroski
Forecasting Stock Index with Multi-objective Optimization Model Based on Optimized Neural Network Architecture Avoiding Overfitting
Zhou Tao
;
Hou Muzhou
;
Liu Chunhui
Black Box Delay Fault Models for Non-scan Sequential Circuits
Eduardas Bareisa
;
Vacius Jusas
;
Kestutis Motiejunas
;
Liudas Motiejunas
;
Rimantas Seinauskas
Sommaire du
Fascicule no. 2
Interoperability in Emergency Management. A Solution Based on Distributed Databases and P2P Networks
Marcelo Zambrano
;
Francisco Pérez
;
Manuel Esteve
;
Carlos Palau
Solving the DNA Fragment Assembly Problem with a Parallel Discrete Firefly Algorithm implemented on GPU
Pablo Javier Vidal
;
Ana Carolina Olivera
Exploring Instances for Matching Heterogeneous Database Schemas Utilizing Google Similarity and Regular Expression
Osama A. Mehdi
;
Hamidah Ibrahim
;
Lilly Suriani Affendey
;
Eric Pardede
;
Jinli Cao
Managing Software Requirements Changes through Change Specification and Classification
Shalinka Jayatilleke
;
Richard Lai
;
Karl Reed
Data Imputation Using a Trust Network for Recommendation via Matrix Factorization
Won-Seok Hwang
;
Shaoyu Li
;
Sang-Wook Kim
;
Kichun Lee
Use of linguistic forms mining in the link analysis of legal documents
Đorđe Petrović
;
Milena Stanković
OLAPS: Online Load-Balancing in Range-Partitioned Main Memory Database with Approximate Partition Statistics
Djahida Belayadi
;
Khaled-Walid Hidouci
;
Ladjel Bellatreche
Experimental Study on the Effectiveness of a Teaching Approach Using Barker or Bachman Notation for Conceptual Database Design
Aida Kamišalić
;
Marjan Heričko
;
Tatjana Welzer
;
Muhamed Turkanović
Conceptual Approach for Reuse of Test Automation Artifacts on Various Architectural Levels
Dani Almog
;
Hadas Schwartz Chassidim
;
Yaron Tsubery
;
Miroslav Bures
;
Shlomo Mark
CpG islands’ clustering uncovers early development genes in the human genome
Vladimir N. Babenko
;
Anton G. Bogomolov
;
Roman O. Babenko
;
Elvira R. Galieva
;
Yuriy L. Orlov
Sommaire du
Fascicule no. 3
A Novel Framework for Automatic Chinese Question Generation Based on Multi-Feature Neural Network Model
Hai-Tao Zheng
;
Jinxin Han
;
Jinyuan Chen
;
Arun Kumar Sangaiah
Research on Automatic Identification Technique of CT Image in Lung
Zhijie Zhao
;
Cong Ren
;
Huadong Sun
;
Zhipeng Fan
;
Ze Gao
Convolutional Neural Networks and Hash Learning for Feature Extraction and of Fast Retrieval of Pulmonary Nodules
Pinle Qin
;
Jun Chen
;
Kai Zhang
;
Rui Chai
An Optimized Method of HDFS for Massive Small Files Storage
Weipeng Jing
;
Danyu Tong
;
GuangSheng Chen
;
Chuanyu Zhao
;
LiangKuan Zhu
A Lightweight Batch Anonymous Authentication Scheme for VANET Based on Pairing-free
Cheng Song
;
Mingyue Zhang
;
Zongpu Jia
;
Weiping Peng
;
Hairu Guo
Wireless Sensor Network Coverage Optimization based on Whale Group Algorithm
Lei Wang
;
Weihua Wu
;
Junyan Qi
;
Zongpu Jia
Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing
Xu An Wang
;
Xiaoyuan Yang
;
Cong Li
;
Yudong Liu
;
Yong Ding
Intelligent Image Classification-Based on Spatial Weighted Histograms of Concentric Circles
Bushra Zafar
;
Rehan Ashraf
;
Nouman Ali
;
Mudassar Ahmed
;
Sohail Jabbar
;
Kashif Naseer
;
Awais Ahmad
;
Gwanggil Jeon
A Fuzzy Rule-Based System to Predict Energy Consumption of Genetic Programming Algorithms
Josefa Díaz Álvarez
;
Franciso Chávez de la O
;
Pedro A. Castillo
;
Juan Angel García
;
Francisco J. Rodriguez
;
Francisco Fernández de Vega
ReSpecTX: Programming Interaction Made Easy
Giovanni Ciatto
;
Stefano Mariani
;
Andrea Omicini
X3S: A Multi-modal Approach to Monitor and Assess Stress through Human-computer Interaction
Filipe Gonçalves
;
Davide Carneiro
;
José Pêgo
;
Paulo Novais
The CRI-Model: A Domain-independent Taxonomy for Non-Conformance between Observed and Specified Behaviour
Christopher Haubeck
;
Alexander Pokahr
;
Kim Reichert
;
Till Hohenberger
;
Winfried Lamersdorf
On the Use of Self-Island-based Evolutionary Computation Methods on Complex Environments
Rafael Nogueras
;
Carlos Cotta
A Novel Distributed Registry Approach for Efficient and Resilient Service Discovery in Megascale Distributed Systems
Lars Braubach
;
Kai Jander
;
Alexander Pokahr
Using Screencasts to Enhance Coding Skills: the case of Logic Programming
Petros Kefalas
;
Ioanna Stamatopoulou
Learning Syntactic Tagging of Macedonian Language
Martin Bonchanoski
;
Katerina Zdravkova
Extended Tuple Constraint Type as a Complex Integrity Constraint Type in XML Data Model – Definition and Enforcement
Jovana Vidaković
;
Sonja Ristić
;
Slavica Kordić
;
Ivan Luković