default search action
Computing and Informatics, Vol. 29, 2010
Volume 29, Number 1, 2010
- Lukasz Olek, Miroslaw Ochodek, Jerzy R. Nawrocki:
Enhancing Use Cases with Screen Designs. A Comparison of Two Approaches. 3-25 - Miroslaw Ochodek, Jerzy R. Nawrocki, Bartosz Alchimowicz, Jakub Jurkiewicz:
Building Benchmarks For Use Cases. 27-44 - Benedikt Bollig, Joost-Pieter Katoen, Carsten Kern, Martin Leucker:
SMA - The Smyle Modeling Approach. 45-72 - Andreas Höfer:
Exploratory Comparison of Expert and Novice Pair Programmers. 73-91 - Alessandra Gorla, Mauro Pezzè, Jochen Wuttke, Leonardo Mariani, Fabrizio Pastore:
Achieving Cost-Effective Software Reliability Through Self-Healing. 93-115 - Zorica Stanimirovic:
A Genetic Algorithm Approach for the Capacitated Single Allocation P-Hub Median Problem. 117-132 - Dharmalingam Jeya Mala, Elizabeth Ruby, Vasudev Mohan:
A Hybrid Test Optimization Framework -- Coupling Genetic Algorithm with Local Search Technique. 133-164
Volume 29, Number 2, 2010
- Pei-Chun Wen, Ling-Ling Wang:
Identification of Technical Journals by Image Processing Techniques. 163-182 - Miroslav Maric:
An Efficient Genetic Algorithm for Solving the Multi-Level Uncapacitated Facility Location Problem. 183-201 - Marcin Kuta, Jacek Kitowski, Wojciech Wójcik, Michal Wrzeszcz:
Application of Weighted Voting Taggers to Languages Described with Large Tagsets. 203-225 - Pavel Král, Christophe Cerisara:
Dialogue Act Recognition Approaches. 227-250 - Pavel Grigorenko, Enn Tyugu:
Higher-Order Attribute Semantics of Flat Declarative Languages. 251-280 - Ning Li, De Xu, Lu Liu:
Action Recognition Using Visual-Neuron Feature of Motion-Salience Region. 281-301 - Ovidiu-Andrei Schipor, Stefan Gheorghe Pentiuc, Maria-Doina Schipor:
Improving Computer Based Speech Therapy Using a Fuzzy Expert System. 303-318 - Ladislav Hluchý, Nataliia Kussul, Andrii Shelestov, Serhiy Skakun, Oleksii M. Kravchenko, Yulia Gripich, Paul Kopp, Evgeny Lupian:
The Data Fusion Grid Infrastructure: Project Objectives and Achievements. 319-334
Volume 29, Number 3, 2010
- Camelia Chira, Dumitru Dumitrescu, Camelia-Mihaela Pintea:
Learning Sensitive Stigmergic Agents for Solving Complex Problems. 337-356 - Vesna Vuckovic:
Embedding Strength Criteria for AWGN Watermark, Robust Against Expected Distortion. 357-387 - Yichuan Jiang:
Organizational Structure-Satisfactory Social Law Determination in Multiagent Workflow Systems. 389-405 - Mousa Mousazadeh, Behrouz Tork Ladani, Hans Zantema:
Liveness Verification in TRSs Using Tree Automata and Termination Analysis. 407-426 - Sebastian Deorowicz, Joanna Obstój:
Constrained Longest Common Subsequence Computing Algorithms in Practice. 427-445 - Javad Akbari Torkestani, Mohammad Reza Meybodi:
A New Vertex Coloring Algorithm Based on Variable Aaction-Set Learning Automata. 447-466 - Anna Shmilevna Nempomniaschaya:
Parallel Implementation of Relational Algebra Operations on a Multi-Comparand Associative Machine. 467-487 - Milos Cernak:
A Comparison of Decision Tree Classifiers for Automatic Diagnosis of Speech Recognition Errors. 489-501
Volume 29, Number 4, 2010
- Qiaohong Zu, Ting Wu, Hui Wang:
A Multi-factor Customer Classification Evaluation Model. 509-520 - Yong Zhang, Chao Dai, Mei Song:
A Novel QoS Guarantee Mechanism in IEEE 802.16 Mesh Networks. 521-536 - Gaia Trecarichi, Veronica Rizzi, Maurizio Marchese, Lorenzino Vaccari, Paolo Besana:
Enabling Information Gathering Patterns for Emergency Response with the OpenKnowledge System. 537-555 - Xiaowei Li, Qinglin Zhao, Bin Hu, Li Liu, Hong Peng, Yanbing Qi, Chengsheng Mao, Zheng Fang, Quanying Liu:
Improve Affective Learning with EEG Approach. 557-570 - Hans Friedrich Witschel:
Learning Profiles for Heterogeneous Distributed Information Sources. 571-584 - Hongan Wang, Cuixia Ma, Shengfeng Qin, Guozhong Dai:
Modeling Sketching Primitives to Support Freehand Drawing Based on Context Awareness. 585-600 - Andreas Holzinger, Selver Softic, Christian Stickel, Martin Ebner, Matjaz Debevc, Bo Hu:
Nintendo Wii Remote Controller in Higher Education: Development and Evaluation of a Demonstrator Kit for e-Teaching. 601-615 - Tingshao Zhu, Bin Hu, Jingzhi Yan, Xiaowei Li:
Semi-Supervised Learning for Personalized Web Recommender System. 617-627 - Ning Li, Hillary Tarus, James Irvine, Klaus Moessner:
A Communication Middleware for Ubiquitous Multimedia Adaptation Services. 629-646 - Ahmed M. Khedr, Walid Osamy:
Nonlinear Trajectory Discovery of a Moving Target by Wireless Sensor Networks. 647-662 - Ghassan J. Mohammed, Bingrong Hong, Ann A. Jarjes:
Accurate Pupil Features Extraction Based on New Projection Function. 663-680 - Alfonzo Baumgartner, Tomislav Rudec, Robert Manger:
The Design and Analysis of a Modified Work Function Algorithm for Solving the On-Line k-Server Problem. 681-700
Volume 29, Number 5, 2010
- Jingxuan Wei, Yuping Wang, Hua Wang:
A hybrid Particle Swarm Evolutionary Algorithm for Constrained Multi-Objective Optimization. 701-718 - Rilson O. Nascimento, Paulo Romero Martins Maciel:
DBT-5: An Open-Source TPC-E Implementation for Global Performance Measurement of Computer Systems. 719-740 - Altan Mesut, Aydin Carus:
ISSDC: Digram Coding Based Lossless Data Compression Algorithm. 741-756 - Sangwook Lee, Jin Kim, Hyunchul Kang:
Memory-Efficient Query Processing over XML Fragment Stream with Fragment Labeling. 757-782 - Mohammad Hamdan:
On the Disruption-level of Polynomial Mutation for Evolutionary Multi-objective Optimisation Algorithms. 783-800 - Ahmed M. Khedr, Walid Osamy:
Finding Perimeter of Query Regions in Heterogenous Wireless Sensor Networks. 801-821 - Peter Trhan:
The Application of Spiking Neural Networks in Autonomous Robot Control. 823-847 - Kooroush Manochehri, Saadat Pourmozafari, Babak Sadeghiyan:
Montgomery and RNS for RSA Hardware Implementation. 849-880
Volume 29, Number 6, 2010
- Gabriela Czibula, Grigoreta Sofia Cojocar:
A Hierarchical Clustering Based Approach in Aspect Mining. 881-900 - Ka Lok Man:
Timed Chi: Modeling, Simulation and Verification of Hardware Systems. 901-928 - Zoran Bosnic, Igor Kononenko:
Correction of Regression Predictions Using the Secondary Learner on the Sensitivity Analysis Outputs. 929-946 - Krzysztof Cetnarowicz, Rafal Drezewski:
Maintaining Functional Integrity in Multi-Agent Systems for Resource Allocation. 947-973 - Tomasz Praczyk:
Using Real Valued Detectors in Ship Immune System. 975-987 - Maciej Wielgosz, Grzegorz Mazur, Marcin Makowski, Ernest Jamro, Kazimierz Wiatr:
Analysis of the Basic Implementation Aspects of Hardware-Accelerated Density Functional Theory Calculations. 989-1000 - Vladimir Britanak:
Improved and Extended Mixed-Radix Decimation in Frequency Fast MDCT Algorithm. 1001-1012 - Serhiy Skakun:
A Neural Network Approach to Flood Mapping Using Satellite Imagery. 1013-1024 - Roland Dobai, Elena Gramatová:
Deductive Fault Simulation Technique for Asynchronous Circuits. 1025-1043
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.