Journal: Computers and Artificial Intelligence

Volume 32, Issue 6

1117 -- 1130Dániel Stojcsics, András Molnár. Autonomous Takeoff and Landing Control for Small Size Unmanned Aerial Vehicles
1131 -- 1146Marek Bundzel, Tomás Kasanický, Richard Pincak. Experimental Analysis of the Prediction Model Based on String Invariants
1147 -- 1169Antonio J. Alencar, Carlos A. S. Franco, Eber A. Schmitz, Alexandre L. Correa. A Statistical Approach for the Maximization of the Financial Benefits Yielded by a Large Set of MMFs and AEs
1170 -- 1191Lamiaa Fattouh Ibrahim, Hesham Abou El Fetouh Salman. Applying Clustering Techniques in Hybrid Network in the Presence of 2D and 3D Obstacles
1192 -- 1211Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Kangbin Yim. Database Security System for Applying Sophisticated Access Control via Database Firewall Server
1212 -- 1228Bon-Woo Hwang, Seung-Jun Kwon, Sang-Woong Lee. Facial Image Reconstruction from a Corrupted Image by Support Vector Data Description
1229 -- 1255Xiaoqian Li, Huachun Zhou, Hongbin Luo, Hongke Zhang, Feng Qiu, Ilsun You. HMS: A Hierarchical Mapping System for the Locator/ID Separation Network
1256 -- 1271AndrzejOlszewski Olszewski, Marcin Wolter. A Needle in the Haystack: Higgs Boson Searches in the ATLAS Experiment
1272 -- 1292Agnieszka Dabrowska-Boruch, Grzegorz Gancarczyk, Kazimierz Wiatr. Implementation of a RANLUX Based Pseudo-Random Number Generator in FPGA Using VHDL and Impulse C
1293 -- 1311Junwei Lei, Hongchao Zhao, Jinyong Yu, Zuoe Fan, Heng Li, Kehua Li. Research on Tracking and Synchronization of Uncertain Chaotic Systems
1312 -- 1327Kristián Valentín, Michal Malý. Network Firewall using Artificial Neural Networks

Volume 32, Issue 5

897 -- 923Chouvalit Khancome, Veera Boonjing. A New Linear-Time Dynamic Dictionary Matching Algorithm
924 -- 948Xiaowang Zhang, Zuoquan Lin. An Approach to Generating Arguments over DL-Lite Ontologies
949 -- 967Frantisek Darena, Jan Zizka. Approaches to samples selection for machine learning based classification of textual data
968 -- 986Zhijun Ding, Jiegi Liu, Junli Wang, Fang Wang. An Executable Service Composition Code Automatic Creation Tool Based on Petri Net Model
987 -- 1012Xiaofeng Ding, Hai Jin, Hui Xu, Wei Song. Probabilistic Skyline Queries over Uncertain Moving Objects
1013 -- 1037Puniethaa Prabhu, Karuppusamy Duraiswamy. An Efficient Visual Analysis Method for Cluster Tendency Evaluation, Data Partitioning and Internal Cluster Validation
1038 -- 1054Daniela Sturczová, Petr Rapant. Enhanced Methodology for Ontology Development
1055 -- 1078Bartlomiej Sniezynski. Agent Strategy Generation by Rule Induction
1079 -- 1099Karam Gouda, Mosab Hassaan. Efficiently Using Prime-Encoding for Mining Frequent Itemsets in Sparse Data
1100 -- 1115Piotr Dziubecki, Piotr Grabowski, Michal Krysinski, Tomasz Kuczynski, Krzysztof Kurowski, Tomasz Piontek, Dawid Szejnfeld. New Science Gateways for Advanced Computing Simulations and Visualization Using Vine Toolkit in PL-Grid

Volume 32, Issue 4

661 -- 677Verena Christina Horak, Tobias Berka, Marián Vajtersic. Parallel Classification with Two-Stage Bagging Classifiers
679 -- 696Jongwan Kim, Dukshin Oh, Keecheon Kim. QMBRi: Inverse quantization of minimum bounding rectangles for spatial data compression
697 -- 721Kashif Zafar, Abdul Rauf Baig. Multiple Route Generation Using Simulated Niche Based Particle Swarm Optimization
723 -- 738Jin Li, Xiaofeng Chen 0001. Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing
739 -- 775Radu Iosif, Adam Rogalewicz. Automata-Based Termination Proofs
777 -- 796Sandra García, David Quintana, Inés María Galván, Pedro Isasi. Multiobjective Algorithms with Resampling for Portfolio Optimization
797 -- 826Mahdi Rahimi Naddaf, Vahid Rafe. Performance Modeling and Analysis of Software Architectures Specified Through Graph Transformations
827 -- 843Ying Pan, Yong Tang. Pay-As-You-Go Software Artifacts Managemen
845 -- 857Zsolt Csaba Johanyak. Fuzzy Modeling of Thermoplastic Composites' Melt Volume Rate
859 -- 876Pawel Russek, Kazimierz Wiatr. The Enhancement of a Computer System for Sorting Capabilities Using FPGA Custom Architecture
877 -- 896Lujiang Zhang, Xiaohui Hu. Word Combination Kernel for Text Classification with Support Vector Machines

Volume 32, Issue 3

441 -- 460Liaojun Pang, Huixian Li. nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness
461 -- 485Binh Minh Nguyen, Viet D. Tran, Ladislav Hluchý. A Generic Development and Deployment Framework for Cloud Computing and Distributed Applications
487 -- 507Teréz Anna Várkonyi. Robust Fixed Point Transformations-based Control of Chaotic Systems
509 -- 526Anita Sabo, Bojan Kuljic, Tibor Szakáll. Educational Tools for Object-Oriented DSP Interactive DSL Framework
527 -- 547Mohammad Hussain. Efficient Decimation of Polygonal Models Using Normal Field Deviation
549 -- 571Majid Ghayoori, Mostafa S. Haghjoo. A Model to Overcome Integrity Challenges of an Untrusted DSMS Server
573 -- 593Cristian Vidal Silva, Rodrigo Saens, Carolina Del Río, Rodolfo Villarroel. Aspect-Oriented Modeling: Applying Aspect-Oriented UML Use Cases and Extending Aspect-Z
595 -- 627Jack Mario Mingo, Ricardo Aler, Darío Maravall, Javier de Lope Asiaín. Investigations into Lamarckism, Baldwinism and Local Search in Grammatical Evolution Guided by Reinforcement
629 -- 659Boban Vesin, Aleksandra Klasnja Milicevic, Mirjana Ivanovic, Zoran Budimac. Applying Recommender Systems and Adaptive Hypermedia for e-Learning Personalizatio

Volume 32, Issue 2

225 -- 250César A. L. Oliveira, Natália Cabral Silva, Cecília Leite Sabat, Ricardo Massa Ferreira Lima. Reducing the Gap Between Business and Information Systems Through Complex Event Processing
251 -- 272Roland Dobai, Marcel Baláz. Compressed Skewed-Load Delay Test Generation Based on Evolution and Deterministic Initialization of Populations
273 -- 294Santiago Iturriaga, Sergio Nesmachnow, Bernabé Dorronsoro, Pascal Bouvry. Energy Efficient Scheduling in Heterogeneous Systems with a Parallel Multiobjective Local Search
295 -- 311Jianhua Sun, Hao Chen, Cheng Chang, Xingbang Li. Kernel Code Integrity Protection Based on a Virtualized Memory Architecture
313 -- 329Mihai Talmaciu, Elena Nechita, Barna Iantovics. Recognition and Combinatorial Optimization Algorithms for Bipartite Chain Graphs
331 -- 354Anna Nepomniaschaya. Efficient Parallel Implementation of the Ramalingam Decremental Algorithm for Updating the Shortest Paths Subgraph
355 -- 370Peter Butka, Jozef Pócs. Generalization of One-Sided Concept Lattices
371 -- 391Abdunabi Ubul, El-Sayed Atlam, Hiroya Kitagawa, Masao Fuketa, Kazuhiro Morita, Jun-Ichi Aoe. An Efficient Method of Summarizing Documents Using Impression Measurements
393 -- 410Doina Tatar, Diana Inkpen, Gabriela Czibula. Text Segmentation Using Roget-Based Weighted Lexical Chains
411 -- 440Tanakorn Wichaiwong, Chuleerat Jaruskulchai. A Double Scoring Method for XML Element Retrieval

Volume 32, Issue 1

1 -- 22Periasamy Vivekanandan, M. Rajalakshmi, Raju Nedunchezhian. An Intelligent Genetic Algorithm for Mining Classification Rules in Large Datasets
23 -- 45Peng Zhang, Wenbo Zhao, Daming Zhu. Complexity and Approximation Results for the Min-Sum and Min-Max Disjoint Paths Problems
47 -- 62Yongfeng Huang, Shanyu Tang, Wanxia Yang. An Information- Theoretical Model for Streaming Media Based Stegosystems
63 -- 87Yanyun Tao, Minglu Li, Jian Cao. A New Dynamic Population Variation in Genetic Programming
89 -- 112Jiuchuan Jiang, Yungui Zhang. A Social Force Model for Adjusting Sensing Ranges in Multiple Sensing Agent Systems
113 -- 144Manuel Aurelio Rodriguez Pascual, Rafael Mayo Garcia, Ignacio Martín Llorente. Montera: A Framework for Efficient Execution of Monte Carlo Codes on Grid Infrastructures
145 -- 174Igor Santos, Xabier Ugarte-Pedrero, Felix Brezo, Pablo Garcia Bringas, José María Gómez Hidalgo. NOA: An Information Retrieval Based Malware Detection System
175 -- 202Nathalie Cindy Kuicheu, Ning Wang, Gile Narcisse Fanzou Tchuissang, De Xu, Guojun Dai, François Siewe. Managing Uncertain Mediated Schema and Semantic Mappings Automatically in Dataspace Support Platforms
203 -- 224Vijay Kumar, Arun Sharma, Rajesh Kumar. Applying Soft Computing Approaches to Predict Defect Density in Software Product Releases: An Empirical Study