1 | -- | 30 | Gordana Milosavljevic, Goran Sladic, Branko Milosavljevic, Miroslav Zaric, Stevan Gostojic, Jelena Slivka. Context-sensitive constraints for access control of business processes |
31 | -- | 50 | Titas Savickas, Olegas Vasilecas. An approach to business process simulation using mined probabilistic models |
51 | -- | 78 | Marek Krótkiewicz. A novel inheritance mechanism for modeling knowledge representation systems |
79 | -- | 109 | Predrag Matkovic, Mirjana Maric, Pere Tumbas, Marton Sakal. Traditionalisation of agile processes: Architectural aspects |
111 | -- | 137 | Beumjin Cho, Sangho Lee 0001, Meng Xu, Sangwoo Ji, Taesoo Kim, Jong Kim 0001. Prevention of cross-update privacy leaks on android |
139 | -- | 162 | Miodrag Petkovic, Ilija Basicevic, Dragan Kukolj, Miroslav Popovic. Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks |
163 | -- | 185 | Nishat I. Mowla, Inshil Doh, Kijoon Chae. CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word |
187 | -- | 209 | Ivica Slavkov, Jana Karcheska, Dragi Kocev, Saso Dzeroski. HMC-ReliefF: Feature ranking for hierarchical multi-label classification |
211 | -- | 236 | Zhou Tao, Muzhou Hou, Chunhui Liu. Forecasting stock index with multi-objective optimization model based on optimized neural network architecture avoiding overfitting |
237 | -- | 256 | Eduardas Bareisa, Vacius Jusas, Kestutis Motiejunas, Liudas Motiejunas, Rimantas Seinauskas. Black box delay fault models for non-scan sequential circuits |