Journal: Central Europ. J. Computer Science

Volume 1, Issue 4

367 -- 374Man Jia, Shiying Tian, Gaolin Zheng. On auto-calibration algorithms for a forest growth simulation model
375 -- 386Kazi Shah Nawaz Ripon, Kyrre Glette, Mats Høvin, Jim Torresen. Dynamic facility layout problem under uncertainty: a Pareto-optimality based multi-objective evolutionary approach
387 -- 405Qi Li, Raied Salman, Erik Test, Robert Strack, Vojislav Kecman. GPUSVM: a comprehensive CUDA based support vector machine package
406 -- 429Xiuquan Qiao, Xiaofeng Li, Anna Fensel, Fang Su. Applying semantics to Parlay-based services for telecommunication and Internet networks
430 -- 441Chung-Hao Chen, Yi Yao, Andreas Koschan, Mongi A. Abidi. A novel performance evaluation paradigm for automated video surveillance systems
442 -- 465Oleg Davidyuk, Ekaterina Gilman, Iván Sánchez Milara, Jussi Mäkipelto, Mikko Pyykkönen, Jukka Riekki. iCompose: context-aware physical user interface for application composition
466 -- 481Panu Luosto, Petri Kontkanen. Clustgrams: an extension to histogram densities based on the minimum description length principle
482 -- 498Padmakumari K. N. Anooj. Clinical decision support system: risk level prediction of heart disease using weighted fuzzy rules and decision tree rules

Volume 1, Issue 3

253 -- 265Dirk Müller 0002, Matthias Werner. Genealogy of hard real-time preemptive scheduling algorithms for identical multiprocessors
266 -- 279Adrian S. Barb. Gaussian mixture models for semantic ranking in domain specific databases with application in radiology
280 -- 293Anna Hedman, Håkan Alm. Fitts' law to the rescue: A comparison of graph tables
294 -- 328Nicolas Guelfi. A formal framework for dependability and resilience from a software engineering perspective
329 -- 340T. Sumathi, M. Hemalatha. An innovative image fusion algorithm based on wavelet transform and discrete fast curvelet transform
341 -- 354Othmane El Meslouhi, Moustapha Kardouchi, Hakim Allali, Taoufiq Gadi, Yassir Ait Benkaddour. Automatic detection and inpainting of specular reflections for colposcopic images
355 -- 366Simona Ramanauskaite, Antanas Cenys. Taxonomy of DoS attacks and their countermeasures

Volume 1, Issue 2

154 -- 166Christoph Lass. On correctness of first and second order fast marching method
167 -- 184James H. Hill, Pooja Varshneya, Douglas C. Schmidt. Evaluating distributed real-time and embedded system test correctness using system execution traces
185 -- 193Valeria Fionda. Biological network analysis and comparison: mining new biological knowledge
194 -- 204Tibor Csongrády, Elena Pivarciová. Spectral biometrical recognition of fingerprints
205 -- 220Nima Salehi-Moghaddami, Hadi Sadoghi Yazdi, Hanieh Poostchi. Correlation based splitting criterionin multi branch decision tree
221 -- 242Venkatapathy Umarani, Muthusamy Punithavalli. Analysis of the progressive sampling-based approach using real life datasets
243 -- 250Doru-Florin Chiper. A new VLSI algorithm and architecture for the hardware implementation of type IV discrete cosine transform using a pseudo-band correlation structure

Volume 1, Issue 1

2 -- 18Dharma P. Agrawal. Designing Wireless Sensor Networks: from theory to applications
19 -- 35Gennaro Cordasco, Arnold L. Rosenberg, Mark Sims. On clustering DAGs for task-hungry computing platforms
36 -- 57Brian Dougherty, Jules White, Douglas C. Schmidt. Automated software and hardware evolution analysis for distributed real-time and embedded systems
58 -- 66Walter J. Gutjahr. Recent trends in metaheuristics for stochastic combinatorial optimization
67 -- 100Athanasios Margaris. On the global stability of time delayed CNNs
101 -- 107Sancho Salcedo-Sanz, B. Saavedra-Moreno, A. Paniagua-Tineo, Luis Prieto, Antonio Portilla-Figueras. A review of recent evolutionary computation-based techniques in wind turbines layout optimization problems
108 -- 116Joseph Sifakis. A vision for computer science - the system perspective
117 -- 136Joe Tekli, Richard Chbeir, Agma J. M. Traina, Caetano Traina Jr.. XML document-grammar comparison: related problems and applications
137 -- 153Katharina Anna Zweig. Good versus optimal: Why network analytic methods need more systematic evaluation