Journal: Comput. Sci. Inf. Syst.

Volume 16, Issue 1

1 -- 17Hasan Ali Khattak, Zoobia Ameer, Ikram Ud Din, Muhammad Khurram Khan. Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities
19 -- 44Laura C. Rodríguez-Martínez, Hector A. Duran-Limon, Manuel Mora, Francisco Álvarez Rodríguez. SOCA-DSEM: A well-structured SOCA development systems engineering methodology
45 -- 74Mladen Matejas, Kresimir Fertalj. Building a BPM application in an SOA-based legacy environment
75 -- 104Marko Jankovic, Slavko Zitnik, Marko Bajec. Reconstructing de facto software development methods
105 -- 129Demijan Grgic, Hrvoje Vdovic, Jurica Babic, Vedran Podobnik. CrocodileAgent 2018: Robust agent-based mechanisms for power trading in competitive environments
131 -- 154Matej Senozetnik, Luka Bradesko, Tine Subic, Zala Herga, Jasna Urbancic, Primoz Skraba, Dunja Mladenic. Estimating point-of-interest rating based on visitors geospatial behaviour
155 -- 178Kristina Andric, Damir Kalpic, Zoran Bohacek. An insight into the effects of class imbalance and sampling on classification accuracy in credit risk assessment
179 -- 203Martin Svrcek, Michal Kompan, Mária Bieliková. Towards understandable personalized recommendations: Hybrid explanations
205 -- 225George Lagogiannis, Stavros Kontopoulos, Christos Makris. On the randomness that generates biased samples: The limited randomness approach
227 -- 245Maja Braovic, Darko Stipanicev, Ljiljana Seric. Retinal blood vessel segmentation based on heuristic image analysis
247 -- 271Dinu Dragan, Veljko B. Petrovic, Dusan B. Gajic, Zarko Zivanov, Dragan Ivetic. An empirical study of data visualization techniques in PACS design
273 -- 287Francisco Jurado 0001, Pilar Rodríguez. An experience in automatically building lexicons for affective computing in multiple target languages
289 -- 311Adela Ljajic, Ulfeta Marovac. Improving sentiment analysis for twitter data by handling negation rules in the Serbian language
313 -- 332Leon Bosnjak, Bostjan Brumen. Rejecting the death of passwords: Advice for the future