![search dblp](https://rt.http3.lol/img/search.dark.16x16.png)
default search action
Computer Science and Information Systems, Volume 11
Volume 11, Number 1, 2014
- Feng Chen, Da Tang, Hongji Yang, Mohammed Alawairdhi:
A precondition-based approach to workflow oriented software re-engineering. 1-27 - Ricardo Colomo Palacios
, José Luis López Cuadrado, Israel González-Carrasco
, Francisco José García-Peñalvo
:
SABUMO-dTest: Design and evaluation of an intelligent collaborative distributed testing framework. 29-45 - Patricia Conde
, Francisco Ortin
:
JINDY: A java library to support invokedynamic. 47-68 - Anna Yarygina
, Boris Novikov
:
Optimizing resource allocation for approximate real-time query processing. 69-88 - Vladimir Rankovic
, Mikica Drenovak
, Boban S. Stojanovic
, Zoran Kalinic
, Zora Arsovski
:
The mean-value at risk static portfolio optimization using genetic algorithm. 89-109 - Tomas Grigalis, Antanas Cenys
:
Using XPaths of inbound links to cluster template-generated web pages. 111-131 - Nicolas Béchet, Jacques Chauché, Violaine Prince, Mathieu Roche
:
How to combine text-mining methods to validate induced Verb-Object relations? 133-155 - Dongjin Choi, Myunggwon Hwang, Jeongin Kim, Byeong-Kyu Ko, Pankoo Kim:
Tracing trending topics by analyzing the sentiment status of tweets. 157-169 - Grzegorz J. Nalepa
, Szymon Bobek
:
Rule-based solution for context-aware reasoning on mobile devices. 171-193 - Antonio González-Pardo
, Angeles Rosa, David Camacho
:
Behaviour-based identification of student communities in virtual worlds. 195-213 - Duc Nguyen Trung, Jason J. Jung
:
Sentiment analysis based on fuzzy propagation in online social networks: A case study on TweetScope. 215-228 - Rafeeque Pandara Chalil, Sendhilkumar Selvaraju
:
Same wavelength group identification from online social networks: A general framework. 229-239 - Namhee Lee, Jason J. Jung
, Ali Selamat, Dosam Hwang:
Black-box testing of practical movie recommendation systems: A comparative study. 241-249 - Manamiary Bruno Andriamiarina, Dominique Méry, Neeraj Kumar Singh:
Revisiting snapshot algorithms by refinement-based techniques. 251-270 - Xiuqiao Li, Limin Xiao, Ke Xie, Bin Dong, Ruan Li, Dongmei Liu:
Towards hybrid client-side cache management in network-based file systems. 271-289 - Yining Zhao, Alan Wood:
Duplication problem in treaty systems: Causes and solutions. 291-308 - Hui Tian, Yingpeng Sang, Hong Shen, Chunyue Zhou:
Probability-model based network traffic matrix estimation. 309-320 - Alexander Nussbaumer
, Daniel Dahrendorf, Hans-Christian Schmitz, Milos Kravcik, Marcel Berthold, Dietrich Albert
:
Recommender and guidance strategies for creating personal mashup learning environments. 321-342 - Athanasios Staikopoulos, Ian O'Keeffe
, Rachael Rafter, Eddie Walsh, Bilal Yousuf
, Owen Conlan
, Vincent Wade:
AMASE: A framework for supporting personalised activity-based learning on the web. 343-367 - Javier Torrente, Ángel del Blanco, Ángel Serrano-Laguna, Jose Angel Vallejo Pinto, Pablo Moreno-Ger
, Baltasar Fernández-Manjón
:
Towards a low cost adaptation of educational games for people with disabilities. 369-391 - Killian Levacher, Séamus Lawless
, Vincent Wade:
Slicepedia: Content-agnostic slicing resource production for adaptive hypermedia. 393-417 - Mart Laanpere
, Kai Pata
, Peeter Normak, Hans Poldoja:
Pedagogy-driven design of digital learning ecosystems. 419-442 - Evgeny Bogdanov, Carsten Ullrich
, Erik Isaksson, Matthias Palmér, Denis Gillet:
Towards PLEs throughwidget spaces in Moodle. 443-460
Volume 11, Number 2, 2014
- Nuno Castela
, Paulo Dias, Marielba Zacarias
, José Tribolet
:
Collaborative method to maintain business process models updated. 461-480 - Clemente Rafael Borges
, José A. Macías
:
Facilitating the interaction with data warehouse schemas through a visual web-based approach. 481-501 - Ondrej Macek, Karel Richta:
Application and relational database co-refactoring. 503-524 - George Drosatos
, Pavlos S. Efraimidis:
User-centric privacy-preserving statistical analysis of ubiquitous health monitoring data. 525-548 - Péter Szilágyi:
Iris: A decentralized approach to backend messaging middlewares. 549-567 - Dragoljub Krneta, Vladan Jovanovic, Zoran Marjanovic
:
A direct approach to physical Data Vault design. 569-599 - Yousef Abuadlla, Goran S. Kvascev
, Slavko Gajin
, Zoran Jovanovic:
Flow-based anomaly intrusion detection system using two neural network stages. 601-622 - Emhimed Salem Alatrish, Dusan Tosic, Nikola Milenkovic:
Building ontologies for different natural languages. 623-644 - Luka Pavlic, Vili Podgorelec
, Marjan Hericko:
A question-based design pattern advisement approach. 645-664 - Stefanos Ougiaroglou
, Georgios Evangelidis:
Efficient data abstraction using weighted IB2 prototypes. 665-678 - Sonja Ristic, Slavica Aleksic, Milan Celikovic, Ivan Lukovic
:
Generic and standard database constraint meta-models. 679-696 - Costin Badica
, Nick Bassiliades
, Sorin Ilie
, Kalliopi Kravari
:
Agent reasoning on the web using web services? 697-721 - Eirini Christinaki
, Nikolas Vidakis
, Georgios A. Triantafyllidis
:
A novel educational game for teaching emotion identification skills to preschoolers with autism diagnosis. 723-743 - Dimitrios Karapiperis
, Vassilios S. Verykios
:
A distributed near-optimal LSH-based framework for privacy-preserving record linkage. 745-763 - Julio Rojas-Mora
, Jaime Maria Gil-Lafuente:
An asymmetric index to compare trapezoidal fuzzy numbers. 765-778 - Anna Maria Gil Lafuente, Anna Klimova:
Approximation to the theory of affinities to manage the problems of the grouping process. 779-796 - Yehun Xu, Carlos Llopis-Albert
, Joaquín González:
An application of structural equation modeling for continuous improvement. 797-808 - Eduard Edelhauser
, Andreea Ionica
:
A business intelligence software made in Romania: A solution for Romanian companies during the economic crisis. 809-823 - Jorge de Andrés-Sánchez:
Fuzzy claim reserving in non-life insurance. 825-838 - Shouzhen Zeng
, Qifeng Wang, José M. Merigó
, Tiejun Pan:
Induced intuitionistic fuzzy ordered weighted averaging: Weighted average operator and its application to business decision-making. 839-857 - Antonio Terceño Gómez, Glòria M. Barberà-Mariné
, Hernán Pedro Vigier, Yanina Laumann:
Stability of beta coefficients of sector and subsector portfolios in an uncertain environment. 859-880 - Vasile Georgescu:
Joint propagation of ontological and epistemic uncertainty across risk assessment and fuzzy time series models. 881-904
Volume 11, Number 3, 2014
- Yi-Li Huang, Fang-Yie Leu, Jian-Hong Chen, William Cheng-Chung Chu:
A true Random-Number Encryption Method employing block cipher and PRNG. 905-924 - Chin-Ling Chen, Woei-Jiunn Tsaur, Yu-Yi Chen, Yao-Chung Chang:
A secure mobile DRM system based on cloud architecture. 925-941 - Mohammadreza Sahebi Shahamabadi, Borhanuddin Mohd Ali, Nor Kamariah Noordin, Mohd Fadlee A. Rasid, Pooria Varahram
, Antonio J. Jara
:
A NEMO-HWSN solution to support 6LoWPAN network mobility in hospital wireless sensor network. 943-960 - Hae-Min Moon, Sung Bum Pan:
Long distance face recognition for enhanced performance of internet of things service interface. 961-974 - Tianhan Gao, Nan Guo, Kangbin Yim, Qianyi Wang:
PPS: A privacy-preserving security scheme for multi-operator wireless mesh networks with enhanced user experience. 975-999 - Hae-Duck Joshua Jeong, Sang-Kug Ye, Jiyoung Lim, Ilsun You, WooSeok Hyun:
A computer remote control system based on speech recognition technologies of mobile devices and wireless communication technologies. 1001-1016 - Young-Long Chen, Mu-Yen Chen
, Fu-Kai Cheung, Yung-Chi Chang:
A new hybrid architecture with an intersection-based coverage algorithm in wireless sensor networks. 1017-1035 - Tae Rim Lee, Hyejoo Lee, Kyung Hyune Rhee, Sang-Uk Shin:
The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data. 1037-1054 - Yongman Han, JongCheon Choi, Seong-je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, Minkyu Park:
A new detection scheme of software copyright infringement using software birthmark on windows systems. 1055-1069 - Inshil Doh, Jiyoung Lim, Shi Li, Kijoon Chae:
Pairwise and group key setup mechanism for secure machine-to-machine communication. 1071-1090 - Hsing-Chung Chen, Cheng-Ying Yang, Hui-Kai Su, Ching-Chuan Wei, Chao-Ching Lee:
A secure e-mail protocol using ID-based FNS multicast mechanism. 1091-1112 - Hyoungwoo Park, Il Yeon Yeo, Jongsuk Ruth Lee, Haengjin Jang:
Study on network architecture of big data center for the efficient control of huge data traffic. 1113-1126 - Guowei Wu, Xiaojie Chen, Lin Yao, Youngjun Lee, Kangbin Yim:
An efficient wormhole attack detection method in wireless sensor networks. 1127-1141 - Chien-Erh Weng, Jyh-Horng Wen, Hsing-Chung Chen, Lie Yang:
The performance analysis of direct/cooperative transmission to support QoS in WLANs. 1143-1156 - Guangzhi Zhang, Yunchuan Sun, Mengling Xu, Rongfang Bie:
Weibo clustering: A new approach utilizing users' reposting data in social networking services. 1157-1172 - Neng-Yih Shih, Hsing-Chung Chen:
An approach for selecting candidates in soft-handover procedure using multi-generating procedure and second grey relational analysis. 1173-1190
Volume 11, Number 4, 2014
- Nuno Ramos Carvalho
, Alberto Simões
, José João Almeida
:
DMOSS: Open source software documentation assessment. 1197-1207 - David Cunha, Pedro Neves, Pedro Nuno Miranda de Sousa:
PaaS manager: A platform-as-a-service aggregation framework. 1209-1228 - Eduardo Alves Portela Santos
, Agnelo Denis Vieira
, Sauro Schaidt, Eduardo de Freitas Rocha Loures:
Modeling constraint-based processes: A supervisory control theory application. 1229-1247 - Luís Filipe Teófilo, Luís Paulo Reis
, Henrique Lopes Cardoso
, Pedro Mendes:
Rule based strategies for large extensive-form games: A specification language for No-Limit Texas Hold'em agents. 1249-1269 - Maja Pusnik, Marjan Hericko, Zoran Budimac
, Bostjan Sumak
:
XML schema metrics for quality evaluation. 1271-1289 - Shams Zawoad, Marjan Mernik, Ragib Hasan
:
Towards building a forensics aware language for secure logging. 1291-1314 - Stanislav Böhm, Marek Behalek
, Ondrej Meca, Martin Surkovský
:
Visual programming of MPI applications: Debugging, performance analysis, and performance prediction. 1315-1336 - Jakub Kroustek, Fridolín Pokorný, Dusan Kolár:
A new approach to instruction-idioms detection in a retargetable decompiler. 1337-1359 - Reed Milewicz, Marjan Mernik, Peter Pirkelbauer:
SimpleConcepts: A lightweight extension to C++ to support constraints on generic types. 1361-1379 - Ivan Simecek
, Pavel Tvrdík:
A new code transformation technique for nested loops. 1381-1416 - Georgios Fourtounis, Nikolaos S. Papaspyrou
, Panagiotis Theofilopoulos:
Modular polymorphic defunctionalization. 1417-1434 - João Santos, Ricardo Rocha
:
A team-based scheduling model for interfacing or-parallel prolog engines. 1435-1454 - Milan Nosál
, Jaroslav Porubän
:
XML to annotations mapping definition with patterns. 1455-1477 - Ricardo Queirós
, José Paulo Leal
, José Campos:
Sequencing educational resources with Seqins. 1479-1497 - Gergely Dévai, Zoltán Gera, Zoltán Kelemen:
Language abstractions for low level optimization techniques. 1499-1514 - Tomas Skersys
, Kestutis Kapocius, Rimantas Butleris
, Tomas Danikauskas:
Extracting business vocabularies from business process models: SBVR and BPNM standards-based approach. 1515-1535 - Christos Malliarakis
, Maya Satratzemi, Stelios Xinogalos
:
Optimization of server performance in the CMX educational MMORPG for computer programming. 1537-1553 - Jakub Flotynski
, Krzysztof Walczak
:
Semantic representation of multi-platform 3D content. 1555-1580 - Valery I. Korzhik, Guillermo Morales-Luna, Alexander Kochkarev, Dmitriy Flaxman:
Concatenated digital watermarking system robust to different removal attacks. 1581-1594 - Marco Querini
, Giuseppe F. Italiano
:
Reliability and data density in high capacity color barcodes. 1595-1615 - Tomasz Kryjak
, Mateusz Komorkiewicz, Marek Gorgon:
Real-time implementation of foreground object detection from a moving camera using the ViBe algorithm. 1617-1637
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
![](https://rt.http3.lol/img/new-feature-top-right.156x64.png)