default search action
Computer Science and Information Systems, Volume 10
Volume 10, Number 1, 2013
- Vesna Pajic, Dusko Vitas, Gordana Pavlovic-Lazetic, Milos Pajic:
WebMonitoring software system: Finite state machines for monitoring the web. 1-23 - Dusan Okanovic, André van Hoorn, Zora Konjovic, Milan Vidakovic:
SLA-driven adaptive monitoring of distributed applications for performance problem localization. 25-50 - Juan M. Alberola, Jose M. Such, Vicente J. Botti, Agustín Espinosa, Ana García-Fornes:
A scalable multiagent platform for large systems. 51-77 - Guillem Rull, Carles Farré, Ernest Teniente, Toni Urpí:
Validation of schema mappings with nested queries. 79-104 - Ayman Jaradat, Ahmed Patel, M. N. Zakaria, Muhamad A. H. Amina:
Accessibility algorithm based on site availability to enhance replica selection in a data grid environment. 105-132 - Raka Jovanovic, Milan Tuba:
Ant colony optimization algorithm with pheromone correction strategy for the minimum connected dominating set problem. 133-149 - Stevan Gostojic, Branko Milosavljevic, Zora Konjovic:
Ontological model of legal norms for creating and using legislation. 151-171 - George Lagogiannis, Nikos A. Lorentzos, Alexander B. Sideridis:
Indexing moving objects: A real time approach. 173-195 - Jian Shu, Ming Hong, Wei Zheng, Limin Sun, Xu Ge:
Multi-sensor data fusion based on consistency test and sliding window variance weighted algorithm in sensor networks. 197-214 - Yong-Xin Zhang, Qing-Zhong Li, Zhao-Hui Peng:
A novel method for data conflict resolution using multiple rules. 215-235 - Boban Vesin, Mirjana Ivanovic, Aleksandra Klasnja-Milicevic, Zoran Budimac:
Ontology-based architecture with recommendation strategy in java tutoring system. 237-261 - George S. Oreku, Fredrick Japhet Mtenzi, Ali Al-Dahoud:
A viewpoint of Tanzania e-commerce and implementation barriers. 263-281 - Slavica Aleksic, Sonja Ristic, Ivan Lukovic, Milan Celikovic:
A design specification and a server implementation of the inverse referential integrity constraints. 283-320 - Tomas Potuzak:
Methods for division of road traffic network for distributed simulation performed on heterogeneous clusters. 321-348 - Andreas Attenberger, Klaus Buchenrieder:
Modeling and visualization of classification-based control schemes for upper limb prostheses. 349-367 - Miroslav Popovic, Miodrag Djukic, Vladimir Marinkovic, Nikola Vranic:
On task tree executor architectures based on intel parallel building blocks. 369-392 - Xi Wu, Huibiao Zhu, Yongxin Zhao, Zheng Wang, Si Liu:
Modeling and verifying the Ariadne protocol using process algebra. 393-421 - Bojan Mrazovac, Milan Z. Bjelica, Dragan Kukolj, Branislav M. Todorovic, Sasa Vukosavljev:
System design for passive human detection using principal components of the signal strength space. 423-452 - Saad Mubeen, Jukka Mäki-Turja, Mikael Sjödin:
Support for end-to-end response-time and delay analysis in the industrial tool suite: Issues, experiences and a case study. 453-482 - Bernd Tessendorf, Matjaz Debevc, Peter Derleth, Manuela Feilner, Franz Gravenhorst, Daniel Roggen, Thomas Stiefmeier, Gerhard Tröster:
Design of a multimodal hearing system. 483-501 - Radovan Stojanovic, Sasa Knezevic, Dejan Karadaglic, Goran Devedzic:
Optimization and implementation of the wavelet based algorithms for embedded biomedical signal processing. 502-523 - Nenad Filipovic, Velibor Isailovic, Dalibor Nikolic, Aleksandar Peulic, Nikola Mijailovic, Suzana Petrovic, Sasa Cukovic, Radun Vulovic, Aleksandar Matic, Nebojsa Zdravkovic, Goran Devedzic, Branko Ristic:
Biomechanical modeling of knee for specific patients with chronic anterior cruciate ligament injury. 525-545 - Aleksandar Peulic, Natasa Milojevic, Emil Jovanov, Milos D. Radovic, Igor Saveljic, Nebojsa Zdravkovic, Nenad Filipovic:
Modeling of arterial stiffness using variations of pulse transit time. 547-565
Volume 10, Number 2, 2013
- Fei Song, Huachun Zhou, Sidong Zhang, Hongke Zhang, Ilsun You:
The throughput critical condition study for reliable multipath transport. 567-587 - Chin-Ling Chen, Yu-Ting Tsai, Aniello Castiglione, Francesco Palmieri:
Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks. 589-609 - Jinjing Zhao, Yan Wen:
Evaluation on the influence of internet prefix hijacking events. 611-631 - Byungha Choi, Kyungsan Cho:
Two-step hierarchical scheme for detecting detoured attacks to the web server. 633-649 - Der-Chen Huang, Yi-Wei Lee, Hsiang-Wei Wu:
An efficient GTS allocation scheme for IEEE 802.15.4 MAC layer. 651-665 - Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. 667-684 - Ho-Seok Kang, Sung-Ryul Kim, Pankoo Kim:
Traffic deflection method for dos attack defense using a location-based routing protocol in the sensor network. 685-701 - Taerim Lee, Hun Kim, Kyung Hyune Rhee, Sang-Uk Shin:
Design and implementation of E-discovery as a service based on cloud computing. 703-724 - Jinhai Huo, Bowen Deng, Shuhang Wu, Jian Yuan, Ilsun You:
A topographic-awareness and situational-perception based mobility model with artificial bee colony algorithm for tactical MANET. 725-746 - Hae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun, Arisu An:
A real-time location-based SNS smartphone application for the disabled population. 747-765 - Myunggwon Hwang, Do-Heon Jeong, Jinhyung Kim, Sa-Kwang Song, Hanmin Jung:
Activity inference for constructing user intention model. 767-778 - Hsing-Chung Chen, Marsha Anjanette Violetta, Chien-Erh Weng, Tzu-Liang Kung:
Cognitive RBAC in mobile heterogeneous networks. 779-806 - Yong-Hwan Lee, Bonam Kim, Sang-Burm Rhee:
Content-based image retrieval using spatial-color and Gabor texture on a mobile device. 807-823 - Jen-Wei Hu, Chu-Sing Yang, Te-Lung Liu:
Design and implementation of an efficient and programmable future internet testbed in Taiwan. 825-842 - Inshil Doh, Jiyoung Lim, Kijoon Chae:
Key management approach for secure mobile open IPTV service. 843-864 - Bing Bai, Zhenqian Feng, Baokang Zhao, Jinshu Su:
Benefiting from the community structure in opportunistic forwarding. 865-876 - Jyh-Horng Wen, Yung-Cheng Yao, Ying-Chih Kuo:
Wiener-based ICI cancellation schemes for OFDM systems over fading channels. 877-896 - Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai:
Efficient implementation for QUAD stream cipher with GPUs. 897-911 - Tianhan Gao, Nan Guo, Kangbin Yim:
A hybrid approach to secure hierarchical mobile IPv6 networks. 913-938
Volume 10, Number 3, 2013
- Goran Sladic, Branko Milosavljevic, Zora Konjovic:
Context-sensitive access control model for business processes. 939-972 - A. J. Gilbert Silvius, Joanna Turkiewicz, Aleksandar Keratsinov, Harm Spoor:
The relationship between it outsourcing and business and it alignment: An explorative study. 973-998 - José Ignacio Panach, Natalia Juristo Juzgado, Oscar Pastor:
Including functional usability features in a model-driven development method. 999-1024 - Luka Vrdoljak, Vedran Podobnik, Gordan Jezic:
Forecasting the acceptance of new information services by using the semantic-aware prediction model. 1025-1052 - Anna Formica, Elaheh Pourabbas, Maurizio Rafanelli:
Constraint relaxation of the polygon-polyline topological relation for geographic pictorial query languages. 1053-1075 - Justin Terry, Bela Stantic:
Indexing method for multidimensional vector data. 1077-1104 - Jiafu Wan, Min Chen, Feng Xia, Di Li, Keliang Zhou:
From machine-to-machine communications towards cyber-physical systems. 1105-1128 - Cristian Mateos, Alejandro Zunino, Matías Hirsch:
EasyFJP: Providing hybrid parallelism as a concern for divide and conquer java applications. 1129-1163 - Eduardas Bareisa, Vacius Jusas, Kestutis Motiejunas, Rimantas Seinauskas:
Functional delay test generation approach using a software prototype of the circuit. 1165-1184 - Tatjana Lutovac, James Harland:
A contribution to automated-oriented reasoning about permutability of sequent calculi rules. 1185-1210 - Jinho Ahn:
Mobile agent group communication ensuring reliability and totally-ordered delivery. 1211-1228 - Atif Alamri, M. Anwar Hossain, Mohammad Mehedi Hassan, M. Shamim Hossain, Mohammed Abdullah Alnuem, Dewan Tanvir Ahmed, Abdulmotaleb El-Saddik:
A cloud-based pervasive serious game framework to support obesity treatment. 1229-1246 - Alaa Ismail Elnashar, Sultan Aljahdali:
Experimental and theoretical speedup prediction of MPI-based applications. 1247-1267 - Zhenhua Tan, Guangming Yang, Wei Cheng, Xingwei Wang:
Distributed secret sharing scheme based on personalized spherical coordinates space. 1269-1291 - Yanwei Yu, Qin Wang, Xiaodong Wang, Huan Wang, Jie He:
Online clustering for trajectory data stream of moving objects. 1293-1317 - Elnomery Allam Zanaty, Ahmed S. Ghiduk:
A novel approach based on genetic algorithms and region growing for magnetic resonance image (MRI) segmentation. 1319-1342 - Lingling Zi, Junping Du, Lisha Hou, Xiangda Sun, Jangmyung Lee:
Perception-driven resizing for dynamic image sequences. 1343-1357 - Vanja Lukovic, Danijela Milosevic, Goran Devedzic, Sasa Cukovic:
Converting OBR-scolio ontology in OWL DL. 1359-1385 - Michele Fiorentino, Antonio E. Uva, Mario Massimo Foglia, Vitoantonio Bevilacqua:
Asymmetry measurement for vibroactive correction in lower limbs mobility. 1387-1406 - Rupesh Ghyar, Karupppasamy Subburaj, Bhallamudi Ravi, Manish Agarwal:
Adaptive probabilistic approach for selecting tumour knee prosthesis. 1407-1428 - Petar Rajkovic, Dragan Jankovic, Aleksandar Milenkovic:
Developing and deploying medical information systems for Serbian public healthcare: Challenges, lessons learned and guidelines. 1429-1454 - Igor Kulev, Elena Vlahu-Gjorgievska, Vladimir Trajkovik, Saso Koceski:
Development of a novel recommendation algorithm for collaborative health: Care system model. 1455-1471 - Nikola Vitkovic, Jelena Milovanovic, Nikola Korunovic, Miroslav Trajanovic, Milos Stojkovic, Dragan Misic, Stojanka Arsic:
Software system for creation of human femur customized polygonal models. 1473-1497
Volume 10, Number 4, 2013
- Wiktor Nowakowski, Michal Smialek, Albert Ambroziewicz, Tomasz Straszak:
Requirements-level language and tools for capturing software system essence. 1499-1524 - Sebla Demirkol, Moharram Challenger, Sinem Getir, Tomaz Kosar, Geylani Kardas, Marjan Mernik:
A DSL for the development of software agents working within a semantic web environment. 1525-1556 - Igor Rozanc, Bostjan Slivnik:
Using reverse engineering to construct the platform independent model of a web application for student information systems. 1557-1583 - Verislav Djukic, Ivan Lukovic, Aleksandar Popovic, Vladimir Ivancevic:
Model execution: An approach based on extending domain-specific modeling with action reports. 1585-1620 - Zdenek Rybola, Karel Richta:
Possible realizations of multiplicity constraints. 1621-1646 - Dániel Leskó, Máté Tejfel:
Testing framework for embedded languages. 1647-1659 - Hemang Mehta, S. J. Balaji, Dharanipragada Janakiram:
Extending programming language to support object orientation in legacy systems. 1661-1672 - Jakub Kroustek, Dusan Kolár:
Context parsing (not only) of the object-file-format description language. 1673-1701 - Peter J. Hancox, Nikolaos Polatidis:
An evaluation of keyword, string similarity and very shallow syntactic matching for a university admissions processing infobot. 1703-1726 - José Paulo Leal:
Using proximity to compute semantic relatedness in RDF graphs. 1727-1746 - Carlos Monteiro, José Paulo Leal:
Managing experiments on cognitive processes in writing with HandSpy. 1747-1773 - Miguel Areias, Ricardo Rocha:
Batched evaluation of linear tabled logic programs. 1775-1797 - Gregor Rohbogner, Ulf Hahnel, Pascal Benoit, Simon Fey:
Multi-agent systems' asset for smart grid applications. 1799-1822 - Jörg Bremer, Michael Sonnenschein:
Model-based integration of constrained search spaces into distributed planning of active power provision. 1823-1854
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.