


default search action
Search dblp for Publications
export results for "toc:db/journals/cit/cit27.bht:"
@article{DBLP:journals/cit/BadicaVIIV19, author = {Costin Badica and Milan Vidakovic and Sorin Ilie and Mirjana Ivanovic and Jovana Vidakovic}, title = {Role of Agent Middleware in Teaching Distributed Systems and Agent Technologies}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {1}, pages = {25--42}, year = {2019}, url = {http://cit.fer.hr/index.php/CIT/article/view/4464}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/BadicaVIIV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/BerrahalMA19, author = {Wadie Berrahal and Rabia Marghoubi and Zineb El Akkaoui}, title = {Towards the Control and Prevention of Waste in {IT} Service Operation Using Fuzzy Logic: Focus in Incident Management Process}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {3}, pages = {45--56}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004810}, doi = {10.20532/CIT.2019.1004810}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/BerrahalMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/BuckiS19, author = {Robert Bucki and Petr Such{\'{a}}nek}, title = {The Cost-Based Lean Approach to the Information Logistics Business System Modelling}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {1}, pages = {59--75}, year = {2019}, url = {http://cit.fer.hr/index.php/CIT/article/view/4309}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/BuckiS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Chen19, author = {Zhongping Chen}, title = {Load Balancing Dynamic Source Routing Protocol Based on Multi-Path Routing}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {2}, pages = {17--27}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004744}, doi = {10.20532/CIT.2019.1004744}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Chen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/CristaniOTVZ19, author = {Matteo Cristani and Francesco Olivieri and Claudio Tomazzoli and Luca Vigan{\`{o}} and Margherita Zorzi}, title = {Diagnostics as a Reasoning Process: From Logic Structure to Software Design}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {1}, pages = {43--57}, year = {2019}, url = {http://cit.fer.hr/index.php/CIT/article/view/4411}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/CristaniOTVZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/DiwanT19, author = {Tausif Diwan and Jitendra V. Tembhurne}, title = {A Parallelization of Non-Serial Polyadic Dynamic Programming on {GPU}}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {2}, pages = {55--66}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004579}, doi = {10.20532/CIT.2019.1004579}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/DiwanT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/DoR19, author = {Vancuong Do and Hongxiang Ren}, title = {Using Poisson Disk Sampling to Render Oil Particles at Sea}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {4}, pages = {31--46}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004878}, doi = {10.20532/CIT.2019.1004878}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/DoR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/FengZN19, author = {Jian Feng and Lianyang Zou and Tianzhu Nan}, title = {A Phishing Webpage Detection Method Based on Stacked Autoencoder and Correlation Coefficients}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {2}, pages = {41--54}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004702}, doi = {10.20532/CIT.2019.1004702}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cit/FengZN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/JainK19, author = {Meenal Jain and Gagandeep Kaur}, title = {A Study of Feature Reduction Techniques and Classification for Network Anomaly Detection}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {4}, pages = {1--16}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004591}, doi = {10.20532/CIT.2019.1004591}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/JainK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Karaata19, author = {Mehmet Hakan Karaata}, title = {An Algorithm for Finding Two Node-Disjoint Paths in Arbitrary Graphs}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {3}, pages = {1--14}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004754}, doi = {10.20532/CIT.2019.1004754}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Karaata19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/LiSG19, author = {Peng Li and Bo Sun and Maozu Guo}, title = {Identification of Novel Cancer-Related Genes with a Prognostic Role Using Gene Expression and Protein-Protein Interaction Network Data}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {3}, pages = {57--71}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004856}, doi = {10.20532/CIT.2019.1004856}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/LiSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/MaZY19, author = {Ruizhe Ma and Liangli Zuo and Li Yan}, title = {A Shapelet Transform Classification over Uncertain Time Series}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {3}, pages = {15--28}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004635}, doi = {10.20532/CIT.2019.1004635}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/MaZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/NoorunnisaJJW19, author = {Salma Noorunnisa and Dennis Jarvis and Jacqueline Jarvis and Marcus Watson}, title = {Application of the {GORITE} {BDI} Framework to Human-Autonomy Teaming: {A} Case Study}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {1}, pages = {13--24}, year = {2019}, url = {http://cit.fer.hr/index.php/CIT/article/view/4396}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/NoorunnisaJJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Office19, author = {C. I. T. Editorial Office}, title = {Guest Editorial}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {1}, pages = {i--iii}, year = {2019}, url = {http://cit.fer.hr/index.php/CIT/article/view/4796}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Office19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Office19a, author = {C. I. T. Editorial Office}, title = {Editorial for Vol.27, No.2}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {2}, pages = {i--ii}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004900}, doi = {10.20532/CIT.2019.1004900}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Office19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Office19b, author = {C. I. T. Editorial Office}, title = {Editorial for Vol.27, No.3}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {3}, pages = {i--ii}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1005016}, doi = {10.20532/CIT.2019.1005016}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Office19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Office19c, author = {C. I. T. Editorial Office}, title = {Editorial for Vol.27, No.4}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {4}, pages = {i--ii}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1005033}, doi = {10.20532/CIT.2019.1005033}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Office19c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/OnashogaAAA19, author = {Saidat Adebukola Onashoga and Adio Taofiki Akinwale and Opeyemi L. Amusa and Gboyega Adebayo}, title = {{CK-RAID:} Collaborative Knowledge Repository for Intrusion Detection System}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {2}, pages = {29--39}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004706}, doi = {10.20532/CIT.2019.1004706}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/OnashogaAAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/OnashogaSO19, author = {Adebukola Onashoga and Adesina S. Sodiya and Idowu Ademola Osinuga}, title = {Privacy Preserving Location-Based Client-Server Service Using Standard Cryptosystem}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {4}, pages = {47--63}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004606}, doi = {10.20532/CIT.2019.1004606}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/OnashogaSO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/OujdiBB19, author = {Sihem Oujdi and Hafida Belbachir and Faouzi Boufar{\`{e}}s}, title = {{C4.5} Decision Tree Algorithm for Spatial Data, Alternatives and Performances}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {3}, pages = {29--43}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004651}, doi = {10.20532/CIT.2019.1004651}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/OujdiBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/SouidiSPP19, author = {Mohammed El Habib Souidi and Abderrahim Siam and Zhaoyi Pei and Songhao Piao}, title = {Multi-Agent Pursuit-Evasion Game Based on Organizational Architecture}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {1}, pages = {1--11}, year = {2019}, url = {http://cit.fer.hr/index.php/CIT/article/view/4318}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/SouidiSPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/X19, title = {Impressum}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {1}, year = {2019}, url = {http://cit.fer.hr/index.php/CIT/article/view/4799}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/X19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/X19a, title = {Impressum}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {2}, year = {2019}, url = {http://cit.fer.hr/index.php/CIT/article/view/4901}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/X19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/X19b, title = {Impressum}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {3}, year = {2019}, url = {http://cit.fer.hr/index.php/CIT/article/view/5024}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/X19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/YanZY19, author = {Li Yan and Zheqing Zhang and Dan Yang}, title = {Temporal {RDF(S)} Data Storage and Query with HBase}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {4}, pages = {17--30}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004801}, doi = {10.20532/CIT.2019.1004801}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cit/YanZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/ZahidEB19, author = {Soufiane Zahid and Abdeslam En{-}Nouaary and Slimane Bah}, title = {Practical Model Checking of a Home Area Network System: Case Study}, journal = {J. Comput. Inf. Technol.}, volume = {27}, number = {2}, pages = {1--16}, year = {2019}, url = {https://doi.org/10.20532/cit.2019.1004453}, doi = {10.20532/CIT.2019.1004453}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/ZahidEB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.