default search action
The Journal of Universal Computer Science, Volume 25
Volume 25, Number 1, 2019
- Christian Gütl:
Managing Editor's Column. 1 - Rafal Kozik, Michal Choras, Jörg Keller:
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection. 2-15 - Gerardo Matturro, Florencia Raschetti, Carina Fontán:
A Systematic Mapping Study on Soft Skills in Software Engineering. 16-41 - Marcos Yukio Siraichi, Caio Tonetti, Anderson Faustino da Silva:
Pinhão: An Auto-tunning System for Compiler Optimizations Guided by Hot Functions. 42-72
Volume 25, Number 2, 2019
- Christian Gütl:
Managing Editor's Column. 73 - Jedrzej Bieniasz, Krzysztof Szczypiorski:
Methods for Information Hiding in Open Social Networks. 74-97 - Guilherme Henrique Santos Miranda, Carla Negri Lintzmayer, Zanoni Dias:
Sorting Permutations by λ-Operations. 98-121 - Koldo Zabaleta, Unai Lopez-Novoa, Ivan Pretel, Diego López-de-Ipiña, Vincenzo Cartelli, Giuseppe Di Modica, Orazio Tomarchio:
Designing a Human Computation Framework to Enhance Citizen-Government Interaction. 122-153
Volume 25, Number 3, 2019
- Yong Yu, Yi Mu:
Advances of Provable Security Techniques. 154-157 - Yuan Chen, Qingkuan Dong, Yannan Li, Qiqi Lai, Zhedong Wang:
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms. 158-181 - Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin:
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption. 182-202 - Xiaoling Tao, Liyan Liu, Feng Zhao, Yan Huang, Saide Zhu, Yi Liang:
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method. 203-221 - Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Joonsang Baek, Ilsun You, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. 222-244 - Meijuan Huang, Bo Yang, Yi Zhao, Kaitai Liang, Liang Xue, Xiaoyi Yang:
CCA-Secure Deterministic Identity-Based Encryption Scheme. 245-269 - Xiuze Dong, Yunchuan Guo, Fenghua Li, Liju Dong, Arshad Khan:
Combination Model of Heterogeneous Data for Security Measurement. 270-281 - Xianmin Wang, Yu Zhang, Brij Bhooshan Gupta, Hongfei Zhu, Dongxi Liu:
An Identity-Based Signcryption on Lattice without Trapdoor. 282-293 - Bagus Santoso, Chunhua Su:
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries. 294-308
Volume 25, Number 4, 2019
- Christian Gütl:
Managing Editor's Column. 309 - Vladimir M. Ciric, Ivan Z. Milentijevic, Oliver M. Vojinovic, Nemanja S. Manic:
Cost Estimation of Blended Learning Course Delivery Through Public Cloud. 310-333 - Rogerio C. P. Fragoso, Roberto H. W. Pinheiro, George D. C. Cavalcanti:
Data-driven Feature Selection Methods for Text Classification: an Empirical Evaluation. 334-360 - Asieh Ghanbarpour, Hassan Naderi:
Survey on Ranking Functions in Keyword Search over Graph-Structured Data. 361-389 - Matias J. Micheletto, Rodrigo M. Santos, Javier Orozco:
Scheduling Mandatory-Optional Real-Time Tasks in Homogeneous Multi-Core Systems with Energy Constraints Using Bio-Inspired Meta-Heuristics. 390-417 - Zeynep Banu Ozger, Bülent Bolat, Banu Diri:
A Probabilistic Multi-Objective Artificial Bee Colony Algorithm for Gene Selection. 418-443
Volume 25, Number 5, 2019
- Anasol Peña-Ríos, Foaad Khosmood:
Immersive Learning Technologies: Research and Future Directions. 444-445 - Tiina Kymäläinen:
An Educational Glance into the Future: Holodeck as a Future Enacted Narrative Learning Technology. 446-464 - Bingqing Shen, Jingzhi Guo:
Efficient Peer-to-Peer Content Sharing for Learning in Virtual Worlds. 465-488 - Ioannis Kazanidis, Nikolaos Pellas:
Developing and Assessing Augmented Reality Applications for Mathematics with Trainee Instructional Media Designers: An Exploratory Study on User Experience. 489-514 - Ahmed Ibrahim Safana, Muesser Nat:
Students' Perception of a Blended Learning Approach in an African Higher Institution. 515-540 - Guillermo Santamaría Bonfil, G. Escobedo-Briones, Miguel Pérez-Ramírez, Gustavo Arroyo-Figueroa:
A Learning Ecosystem for Linemen Training based on Big Data Components and Learning Analytics. 541-568
Volume 25, Number 6, 2019
- Jörg Keller, Manuel Graña, Rafal Kozik, Tomasz Andrysiak, Michal Choras:
Recent Advances, Emerging Methods and Applications of Pattern Recognition. 569-570 - Lukasz Apiecionek, Marcel Großmann, Udo R. Krieger:
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study. 571-590 - Slawomir Bujnowski, Tomasz Marciniak, Beata Marciniak, Zbigniew Lutowski:
Impact of Resource Control in Irregular Networks on their Transmission Properties. 591-610 - Dominik Pieczynski, Marek Kraft, Michal Fularz:
Improving Person Re-identification by Segmentation-Based Detection Bounding Box Filtering. 611-626 - Hubert Michalak, Krzysztof Okarma:
Fast Binarization of Unevenly Illuminated Document Images Based on Background Estimation for Optical Character Recognition Purposes. 627-646 - Waseem Rawat, Zenghui Wang:
Hybrid Stochastic GA-Bayesian Search for Deep Convolutional Neural Network Model Selection. 647-666 - Sonia Contreras, Miguel Ángel Manzanedo, Álvaro Herrero:
A Hybrid Neural System to Study the Interplay between Economic Crisis and Workplace Accidents in Spain. 667-682 - Michal Sypetkowski, Grzegorz Sarwas, Tomasz Trzcinski:
Synthetic Image Translation for Football Players Pose Estimation. 683-700 - Jaroslaw Fastowicz, Krzysztof Okarma:
Quality Assessment of Photographed 3D Printed Flat Surfaces Using Hough Transform and Histogram Equalization. 701-717 - Robert Burduk, Jedrzej Biedrzycki:
Integration and Selection of Linear SVM Classifiers in Geometric Space. 718-730
Volume 25, Number 7, 2019
- Christian Gütl:
Managing Editor's Column. 731-732 - Namik Delilovic, Hermann Maurer:
A Note Concerning Feedback and Queries for Web Pages. 733-739 - Sonia Estévez Martín, María-Emilia Cambronero, Yolanda García-Ruiz, Luis Llana:
Mobile Applications for People with Parkinson's Disease: A Systematic Search in App Stores and Content Review. 740-763 - R. J. Macasaet, Manuel Noguera, María Luisa Rodríguez, José Luis Garrido, Sam Supakkul, Lawrence Chung:
Micro-business Requirements Patterns in Practice: Remote Communities in Developing Nations. 764-787 - Robin Mueller-Bady, Martin Kappes, Inmaculada Medina-Bulo, Francisco Palomo-Lozano:
On the Automated and Reactive Optimization of Highly-Dynamic Communication Network Infrastructures. 788-815 - Diego Pessoa, Ana Carolina Salgado, Bernadette Farias Lóscio:
Improving Ontology Matching Using Application Requirements for Segmenting Ontologies. 816-839 - Giani Petri, Christiane Gresse von Wangenheim, Jean Carlo Rossa Hauck, Adriano Ferreti Borgatto:
Effectiveness of Games in Software Project Management Education: An Experimental Study. 840-865
Volume 25, Number 8, 2019
- Nelson Baloian, Yanling Chen, Ashot N. Harutyunyan:
Collaborative Technologies and Data Science in Smart City Applications. 865-867 - Gurgen H. Khachatrian, Sergey Abrahamyan:
Towards Secure and Efficient "white-box" Encryption. 868-886 - Mariam E. Haroutunian, Karen Mkhitaryan, Josiane Mothe:
A New Information-Theoretical Distance Measure for Evaluating Community Detection Algorithms. 887-903 - Yanling Chen, Onur Ozan Koyluoglu, A. J. Han Vinck:
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation. 904-924 - Ashot N. Harutyunyan, Arnak V. Poghosyan, Naira M. Grigoryan, Narek A. Hovhannisyan, Nicholas Kushmerick:
On Machine Learning Approaches for Automated Log Management. 925-945 - Jonathan Frez, Nelson Baloian, José A. Pino, Gustavo Zurita, Franco Basso:
Planning of Urban Public Transportation Networks in a Smart City. 946-966 - Benjamin Weyers, Ekaterina Auer, Wolfram Luther:
The Role of Verification and Validation Techniques within Visual Analytics. 967-987 - Valeria Herskovic, Sergio F. Ochoa, José A. Pino:
Identifying Groupware Requirements in People-Driven Mobile Collaborative Processes. 988-1017 - Rodrigo Barbosa Sousa Orrego, Jorge Luis Victória Barbosa:
A Model for Resource Management in Smart Cities Based on Crowdsourcing and Gamification. 1018-1038
Volume 25, Number 9, 2019
- Artur Janicki, Wojciech Mazurczyk, Xiangyang Luo, Dengpan Ye:
Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes. 1039-1042 - Andrey Fedorchenko, Elena Doynikova, Igor V. Kotenko:
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits. 1043-1065 - Yosra Lakhdhar, Slim Rekhis, Noureddine Boudriga:
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios. 1066-1088 - Mohammed I. Al-Saleh, Hanan M. Hamdan:
Precise Performance Characterization of Antivirus on the File System Operations. 1089-1108 - Jedrzej Bieniasz, Monika Stepkowska, Artur Janicki, Krzysztof Szczypiorski:
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels. 1109-1130 - Hui Tian, Meilun Huang, Chin-Chen Chang, Yongfeng Huang, Jing Lu, Yongqian Du:
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay. 1131-1150 - Mingying Huang, Ming Xu, Tong Qiao, Ting Wu, Ning Zheng:
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images. 1151-0 - Ziad A. Al-Sharif, Mohammed I. Al-Saleh, Yaser Jararweh, Luay Alawneh, Ahmed S. Shatnawi:
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach. 1174-1198 - François Bouchaud, Gilles Grimaud, Thomas Vantroys, Pierrick Buret:
Digital Investigation of IoT Devices in the Criminal Scene. 1199-1218
Volume 25, Number 10, 2019
- Imran Sarwar Bajwa, Fairouz Kamareddine, Pamini Thangarajah:
Intelligent Computing for Society. 1219-1220 - K. Shankar, Mohamed Elhoseny:
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES. 1221-1239 - Zhuoqun Xia, Jingjing Tan, Jin Wang, Runnong Zhu, Hongguang Xiao, Arun Kumar Sangaiah:
Research on Fair Trading Mechanism of Surplus Power Based on Blockchain. 1240-1260 - Akhtar Ali, Imran Sarwar Bajwa, Rafaqut Kazmi:
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform. 1261-1278 - Samet Dinçer, Yiltan Bitirim:
A Smart Hydroponics-Based System for Child Education. 1279-1300 - Yuri Vanessa Nieto, Vicente García-Díaz, Carlos E. Montenegro:
Decision-making Model at Higher Educational Institutions based on Machine Learning. 1301-1322 - Adi Darliansyah, M. Asif Naeem, Farhaan Mirza, Russel Pears:
SENTIPEDE: A Smart System for Sentiment-based Personality Detection from Short Texts. 1323-1352 - Bushra Ramzan, Imran Sarwar Bajwa, Rafaqut Kazmi, Shabana Ramzan:
An Intelligent Data Analytics based Model Driven Recommendation System. 1353-1372 - Khaled Halimi, Hassina Seridi-Bouchelaghem:
A Web3.0-based Intelligent Learning System Supporting Education in the 21st Century. 1373-1393
Volume 25, Number 11, 2019
- Jörg Keller, Wojciech Mazurczyk, Béla Genge, Lothar Fritsch, Simon Vrhovec:
Cyberattack Detection and Response. 1394-1395 - Steffen Wendzel, Florian Link, Daniela Eller, Wojciech Mazurczyk:
Detection of Size Modulation Covert Channels Using Countermeasure Variation. 1396-1416 - Tomás Bajtos, Pavol Sokol, Andrej Gajdos, Katarína Lucivjanská, Terézia Mézesová:
Analysis of the Infection and the Injection Phases of the Telnet Botnets. 1417-1436 - Samo Tomazic, Igor Bernik:
Cyberattack Response Model for the Nuclear Regulator in Slovenia. 1437-1457 - Anze Mihelic, Matej Jevscek, Simon Vrhovec, Igor Bernik:
Testing the Human Backdoor: Organizational Response to a Phishing Campaign. 1458-1477 - Halima Ibrahim Kure, Shareeful Islam:
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure. 1478-1502
Volume 25, Number 12, 2019
- Ralf Klamma, Marc Spaniol, Sayan Unankard:
Advances in Web-Based Learning. 1503-1506 - Antonio Calvo-Morata, Cristina Alonso-Fernández, Iván J. Pérez-Colado, Manuel Freire, Iván Martínez-Ortiz, Baltasar Fernández-Manjón:
Improving Teacher Game Learning Analytics Dashboards through ad-hoc Development. 1507-1530 - Mahnane Lamia, Mohamed Hafidi, André Tricot, Ouissem Benmesbah:
Implementing Flipped Classroom that Used a Context Aware Mobile Learning System into Learning Process. 1531-1553 - Olga Fragou, Christos Goumopoulos, Christos Tsompanos:
STEM Oriented Online Platforms Embracing the Community of Practice Model: A Comparative Study and Design Guidelines. 1554-1588 - Zuzana Kubincová, Dana Suníková, Martin Homola:
Badges for Peer Assessment of Teamwork in Organized Education. 1589-1607 - Peter de Lange, Petru Nicolaescu, Jan Benscheid, Ralf Klamma:
Integrating 3D Objects in Collaborative Non-Linear Storytelling on the Web. 1608-1624 - Carlos Vaz de Carvalho, Pedro Cano, José María Roa, Anna Wanka, Franz Kolland:
Overcoming the Silver Generation Digital Gap. 1625-1643 - Benedikt Hensen, István Koren, Ralf Klamma:
Gamification Support for Learning in Spatial Computing Environments. 1644-1665
Volume 25, Number 13, 2019
- Christian Gütl:
Managing Editor's Column. 1666-1667 - George-Petru Ciordas-Hertel, Jan Schneider, Stefaan Ternier, Hendrik Drachsler:
Adopting Trust in Learning Analytics Infrastructure: A Structured Literature Review. 1668-1686 - Pedro G. Espejo, Eva Gibaja, Víctor H. Menéndez, Alfredo Zapata, Cristóbal Romero:
Improving Multi-Label Classification for Learning Objects Categorization by Taking into Consideration Usage Information. 1687-1716 - Andreas Hinderks, Dominique Winter, Martin Schrepp, Jörg Thomaschewski:
Applicability of User Experience and Usability Questionnaires. 1717-1735 - J. David Patón-Romero, Maria Teresa Baldassarre, Moisés Rodríguez, Mario Piattini:
A Revised Framework for the Governance and Management of Green IT. 1736-1760 - Estêvão B. Saleme, Celso A. S. Santos, Ricardo de Almeida Falbo, George Ghinea, Frédéric Andrès:
MulseOnto: a Reference Ontology to Support the Design of Mulsemedia Systems. 1761-1786
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.