default search action
CompSysTech 2017: Ruse, Bulgaria
- Boris Rachev, Angel Smrikarov:
Proceedings of the 18th International Conference on Computer Systems and Technologies, CompSysTech 2017, Ruse, Bulgaria, June 23-24, 2017. ACM 2017, ISBN 978-1-4503-5234-5
Keynotes
- Marite Kirikova:
Continuous Requirements Engineering. 1-10 - Darina Dicheva:
Gamification in Education: A Passing Trend or a Genuine Potential? 11
Artificial Intelligence
- Milena Karova, Nikola Vasilev, Ivaylo Penev:
Ant Colony Optimization Algorithm for Traffic Flow Estimation. 12-19 - Vadim Borisov, Alexander S. Fedulov, Yaroslav Fedulov:
"Compatible" Fuzzy Cognitive Maps for Direct and Inverse Inference. 20-27 - Michael Zernov:
Situation Calculus for Multiple Action Representation. 28-35 - Antonio Maratea, Alfredo Petrosino, Mario Manzo:
Extended Graph Backbone for Motif Analysis. 36-43 - Roman Guralnik:
Incremental Rerouting Algorithm for single-vehicle VRPPD. 44-51 - Roumen Trifonov, Dilyana Valkova Budakova, Galya Pavlova:
Neural Network Application in Financial Area. 52-57 - Alexander I. Iliev, Peter L. Stanchev:
Smart Multifunctional Digital Content Ecosystem Using Emotion Analysis of Voice. 58-64
Artificial Intelligence and Information Retrieval
- Kaja Zupanc, Milos Savic, Zoran Bosnic, Mirjana Ivanovic:
Evaluating Coherence of Essays using Sentence-similarity Networks. 65-72 - Irina Kakanakova, Stefan Stoyanov:
Outlier Detection via Deep Learning Architecture. 73-79 - Peter Krátky, Tomás Repiský, Daniela Chudá:
Is the Visitor Reading or Navigating? 80-87 - Dessislava Petrova-Antonova, Olga Georgieva, Sylvia Ilieva:
Modelling of Educational Data Following Big Data Value Chain. 88-95 - Angel Ivanov, Stanimira Deleva, Milena Georgieva, Daniela Orozova:
A Conceptual Model of a Virtual Collaboration Space for Bat Scientists. 96-102 - Tsvetanka Georgieva-Trifonova:
Text Classification Based on Enriched Vector Space Model. 103-110 - Borislav Banchev:
Text Mining Based Adaptive Case Management Automation in the Field of Forensic Medicine. 111-118 - Rosen Ivanov:
An Algorithm for Micro-localization in Large Public Buildings. 119-126
Operating Systems and Network Security
- Dobrin Tashev:
A Practical Approach to Spam Mitigation. 127-132 - Jarko Papalitsas, Sampsa Rauti, Ville Leppänen:
A Comparison of Record and Play Honeypot Designs. 133-140 - Samuel Laurén, Sampsa Rauti, Ville Leppänen:
A Survey on Application Sandboxing Techniques. 141-148 - Dimo Dimov, Yulian Tzonev:
Pass-the-Hash: One of the Most Prevalent Yet Underrated Attacks for Credentials Theft and Reuse. 149-154 - Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis:
Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol. 155-162 - Dimitar Karev, Christopher McCubbin, Ruslan Vaulin:
Cyber Threat Hunting Through the Use of an Isolation Forest. 163-170 - Oskari Jahkola, Ari Happonen, Antti Knutas, Jouni Ikonen:
What Should Application Developers Understand about Mobile Phone Position Data. 171-178
Software Engineering
- Marko Saarela, Shohreh Hosseinzadeh, Sami Hyrynsalmi, Ville Leppänen:
Measuring Software Security from the Design of Software. 179-186 - Ekaterina A. Gorshkova, Boris Novikov, Manoj Kumar Shukla:
A Fine-Grained Access Control Model and Implementation. 187-194 - Ján Lang, Peter Gabas:
Limited Resources Platform Implementation of Complex Event Processing System. 195-202 - Pekka Mäkiaho, Timo Poranen, Zheying Zhang:
Requirements Management in Students' Software Development Projects. 203-210 - Dimitar Z. Dimitrov:
A System for Website Data Management in a Website Building System. 211-218 - Adela Bara, Simona-Vasilica Oprea, Adina Uta, Osman Bülent Tör, Mahmut Erkut Cebeci:
Informatics Solutions for Smart Trading on Wholesale Electricity Markets Containing RES Bidders. 219-225
Image Processing and Computer Vision
- Mariana Stoeva, Violeta Bozhikova:
An Approach for Mammography Image Segmentation. 226-232 - Antoniya Tasheva, Zhaneta Tasheva, Plamen Nakov:
Image Based Steganography Using Modified LSB Insertion Method with Contrast Stretching. 233-240 - Atanaska Bosakova-Ardenska, Hristina Andreeva, Petya Boyanova, Peter Panayotov:
CutSurf: a Software Tool for Cut Surface Evaluation of White Cheese. 241-248 - Vesselin Pezhgorski, Milena Lazarova:
Real Time GPU Accelerated Radar Scan Conversion and Visualization. 249-256 - Tzvetomir Ivanov Vassilev:
Mass-spring Cloth Simulation with Shape Matching. 257-264
Hardware
- Ivan Ivanov, Vasilen Tsvetkov:
Intelligent Planting. 265-271 - Svetozar Ilchev, Zlatoliliya Ilcheva:
Internet-of-Things Communication Protocol for Low-Cost Devices in Heterogeneous Wireless Networks. 272-279 - Aleksey Senkov, Aleksander Chepikov:
Fuzzy Model of an Intelligent Agent Behaviour and Method of Fire Extinguishing Control. 280-287
e-Learning
- Léon J. M. Rothkrantz:
An Affective Distant Learning Model Using Avatars as User Stand-in. 288-295 - Greta Koleva, Despina Georgieva, Yavor Stefanov:
A Conceptual Model of an Electronic Appendix Called "Nursing file for palliative care", for Training Students from the Speciality of Nurse. 296-301 - Valentina Terzieva, Katia Todorova, Yuri Pavlov, Petia Kademova-Katzarova:
Utility and Optimal Usage of ICT in Schools. 302-309 - Galya Shivacheva, Veselina Ivanova Nedeva, Svetoslav Atanasov:
Designing a Virtual Laboratory for Teaching Programming. 310-317 - Yuksel Aliev, Vasil Kozov, Galina Ivanova, Aleksandar Ivanov:
3D Augmented Reality Software Solution for Mechanical Engineering Education. 318-325 - Adriana N. Borodzhieva:
MATLAB-Based Software Tool for Implementation of Bifid Ciphers. 326-333
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.