default search action
Computer Science and Information Systems, Volume 17
Volume 17, Number 1, 2020
- Mirjana Ivanovic, Milos Radovanovic:
Editorial. 0 - Djamal Benslimane, Stéphane Jean, Ladjel Bellatreche, Kazumi Nakamatsu:
Guest editorial: Papers selected from 8th International Conference on Model and Data Engineering (MEDI 2018). 0 - Nikola Tankovic, Tihana Galinac Grbac:
Run-time interpretation of information system application models in mobile cloud environments. 1-27 - Loiy Alsbatin, Gürcü Öz, Ali Hakan Ulusoy:
Efficient virtual machine placement algorithms for consolidation in cloud data centers. 29-50 - Jesús Calle-Cancho, José-Manuel Mendoza-Rubio, José Luis González Sánchez, David Cortés-Polo, Javier Carmona-Murillo:
Towards a software-based mobility management for 5G: An experimental approach for flattened network architectures. 51-70 - Stefanos Ougiaroglou, Dimitris A. Dervos, Georgios Evangelidis:
Instance-based classification using prototypes generated from large noisy and streaming datasets. 71-92 - Adrian Groza, Pinar Öztürk, Radu Razvan Slavescu, Anca Marginean:
Climate change opinions in online debate sites. 93-115 - Geert Poels, Félix García, Francisco Ruiz, Mario Piattini:
Architecting business process maps. 117-139 - Bojan Marinkovic, Zoran Ognjanovic, Paola Glavan, Anton Kos, Anton Umek:
Correctness of the Chord protocol. 141-160 - Melinda Katona, Péter Bodnár, László G. Nyúl:
Distance transform and template matching based methods for localization of barcodes and QR codes. 161-179 - Tina Beranic, Marjan Hericko:
Comparison of systematically derived software metrics thresholds for object-oriented programming languages. 181-203 - Milena Vujosevic-Janicic, Filip Maric:
Regression verification for automated evaluation of students programs. 205-227 - José Paulo Leal:
Visualization of path patterns in semantic graphs. 229-252 - Hasna El Alaoui El Abdallaoui, Abdelaziz El Fazziki, Fatima Zohra Ennaji, Mohammed Sadgal:
A mobile crowd sensing framework for suspect investigation: An objectivity analysis and de-identification approach. 253-269 - Mounia Elqortobi, Warda El-Khouly, Amine Rahj, Jamal Bentahar, Rachida Dssouli:
Verification and testing of safety-critical airborne systems: A model-based methodology. 271-292 - Saoussen Cheikhrouhou, Slim Kallel, Ikbel Guidara, Zakaria Maamar:
Business process specification, verification, and deployment in a mono-cloud, multi-edge context. 293-313 - Pascal André, J. Christian Attiogbé, Arnaud Lanoix:
A tool-assisted method for the systematic construction of critical embedded systems using Event-B. 315-338 - Rachid Lamrani, El Hassan Abdelwahed:
Game-based learning and gamification to improve skills in early years education. 339-356
Volume 17, Number 2, 2020
- Mirjana Ivanovic, Milos Radovanovic:
Editorial. 0 - Laleh Samarbakhsh, Boza Tasic:
What makes a board director better connected? Evidence from graph theory. 357-377 - Dunja Vrbaski, Aleksandar Kupusinac, Rade Doroslovacki, Edita Stokic, Dragan Ivetic:
Missing data imputation in cardiometabolic risk assessment: A solution based on artificial neural networks. 379-401 - Ejub Kajan, Noura Faci, Zakaria Maamar, Mohamed Sellami, Emir Ugljanin, Hamamache Kheddouci, Dragana Stojanovic, Djamal Benslimane:
Real-time tracking and mining of users' actions over social media. 403-426 - Tianle Zhang, Muzhou Hou, Tao Zhou, Zhaode Liu, Weirong Cheng, Yangjin Cheng:
Land-use classification via ensemble dropout information discriminative extreme learning machine based on deep convolution feature. 427-443 - Yonghui Dai, Bo Xu, Siyu Yan, Jing Xu:
Study of cardiac arrhythmia classification based on Convolutional Neural Network. 445-458 - Tomaz Stepisnik, Aljaz Osojnik, Saso Dzeroski, Dragi Kocev:
Option predictive clustering trees for multi-target regression. 459-486 - Hyun-Kyo Oh, Jongbin Jung, Sunju Park, Sang-Wook Kim:
A robust reputation system using online reviews? 487-507 - Arafat Sentürk, Resul Kara, Ibrahim Özçelik:
Fuzzy logic and image compression based energy efficient application layer algorithm for wireless multimedia sensor networks. 509-536 - Huan Zhao, Jie Cao, Mingquan Xu, Jian Lu:
Variational neural decoder for abstractive text summarization. 537-552 - Milica Labus, Marijana Despotovic-Zrakic, Zorica Bogdanovic, Dusan Barac, Snezana Popovic:
Adaptive e-business continuity management: Evidence from the financial sector. 553-580 - Edwin Valarezo Añazco, Patricio Rivera Lopez, Hye Min Park, Nahyeon Park, Tae-Yeon Kim:
Human activities recognition with a single writs IMU via a Variational Autoencoder and android deep recurrent neural nets. 581-597 - Natasa Z. Veljkovic, Petar Milic, Leonid Stoimenov, Kristijan Kuk:
Production of linked government datasets using enhanced LIRE architecture. 599-617 - Chao Wang, Xing Qiu, Hui Liu, Dan Li, Kaiguang Zhao, Lili Wang:
Damaged buildings recognition of post-earthquake high-resolution remote sensing images based on feature space and decision tree optimization. 619-646 - Yangyang Ge, Fei Zhu, Wei Huang, Peiyao Zhao, Quan Liu:
Multi-agent cooperation Q-learning algorithm based on constrained Markov Game. 647-664 - Jing Xu, Dezhi Han, Kuan-Ching Li, Hai Jiang:
A K-means algorithm based on characteristics of density applied to network intrusion detection. 665-687 - Hongzhi Hu, Yunbing Tang, Yanqiang Xie, Yonghui Dai, Weihui Dai:
Cognitive computation on consumer's decision making of internet financial products based on neural activity data. 689-704
Volume 17, Number 3, 2020
- Hong Shen, Hui Tian, Yingpeng Sang:
Guest editorial: Parallel computing and applications. - Honghao Gao, Yuyu Yin, Yoon Jung Kim:
Guest editorial: Edge computing. - Johann Gamper, Mirjana Ivanovic, Robert Wrembel:
Guest editorial: Advances in databases and information systems. - Chuyue Zhang, Xiaofan Zhao, Manchun Cai, Dawei Wang, Luzhe Cao:
A new model for predicting the attributes of suspects. 705-715 - Aihua Yin, Chong Chen, Dongping Hu, Jianghai Huang, Fan Yang:
An improved heuristic-dynamic programming algorithm for rectangular cutting problem. 717-735 - Zijing Ma, Shuangjuan Li, Longkun Guo, Guohua Wang:
Energy-efficient non-linear k-barrier coverage in mobile sensor network. 737-758 - Zhanmao Cao, Qisong Huang, Chase Q. Wu:
Maximize concurrent data flows in multi-radio multi-channel wireless mesh networks. 759-777 - Chunyue Zhou, Hui Tian, Baitong Zhong:
An improved MCB localization algorithm based on weighted RSSI and motion prediction. 779-794 - Xindong You, Jiangwei Ma, Yuwen Zhang, Xueqiang Lv, Junmei Han:
VDRF: Sensing the defect information to risk level of vehicle recall based on bert communication model. 795-817 - Wei Ou, Jianhuan Zeng, Zijun Guo, Wanqin Yan, Dingwan Liu, Stelios Fuentes:
A homomorphic-encryption-based vertical federated learning scheme for rick management. 819-834 - Shunjiang Wang, Yan Zhao, Jiang He, Rong Chen, Lina Cao:
A novel data-driven intelligent computing method for the secure control of a benchmark microgrid system. 835-848 - Zhongqin Bi, Shuming Dou, Zhe Liu, Yongbin Li:
A recommendations model with multiaspect awareness and hierarchical user-product attention mechanisms. 849-865 - Jun-Hee Choi, Hyun-Sug Cho:
A study on the development of a light scattering particulate matter sensor and monitoring system. 867-890 - Hye-Young Kim, Jinsul Kim:
A load balancing scheme for gaming server applying reinforcement learning in IoT. 891-906 - Kang Yang, Huiqun Yu, Guisheng Fan, Xingguang Yang:
Graph embedding code prediction model integrating semantic features. 907-926 - Mohammadreza Fani Sani, Sebastiaan J. van Zelst, Wil M. P. van der Aalst:
Improving the performance of process discovery algorithms by instance selection. 927-958 - Karolina Przybylek, Illia Shkroba:
Crowd counting'a la Bourdieu: Automated estimation of the number of people. 959-982 - Michal Kopecky, Peter Vojtás:
Visual e-commerce values filtering framework with spatial database metric. 983-1006
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.