Journal: Comput. Sci. Inf. Syst.

Volume 10, Issue 4

1499 -- 1524Wiktor Nowakowski, Michal Smialek, Albert Ambroziewicz, Tomasz Straszak. Requirements-level language and tools for capturing software system essence
1525 -- 1556Sebla Demirkol, Moharram Challenger, Sinem Getir, Tomaz Kosar, Geylani Kardas, Marjan Mernik. A DSL for the development of software agents working within a semantic web environment
1557 -- 1583Igor Rozanc, Bostjan Slivnik. Using reverse engineering to construct the platform independent model of a web application for student information systems
1585 -- 1620Verislav Djukic, Ivan Lukovic, Aleksandar Popovic, Vladimir Ivancevic. Model execution: An approach based on extending domain-specific modeling with action reports
1621 -- 1646Zdenek Rybola, Karel Richta. Possible realizations of multiplicity constraints
1647 -- 1659Dániel Leskó, Máté Tejfel. Testing framework for embedded languages
1661 -- 1672Hemang Mehta, S. J. Balaji, Dharanipragada Janakiram. Extending programming language to support object orientation in legacy systems
1673 -- 1701Jakub Kroustek, Dusan Kolár. Context parsing (not only) of the object-file-format description language
1703 -- 1726Peter Hancox, Nikolaos Polatidis. An evaluation of keyword, string similarity and very shallow syntactic matching for a university admissions processing infobot
1727 -- 1746José Paulo Leal. Using proximity to compute semantic relatedness in RDF graphs
1747 -- 1773Carlos Monteiro, José Paulo Leal. Managing experiments on cognitive processes in writing with HandSpy
1775 -- 1797Miguel Areias, Ricardo Rocha. Batched evaluation of linear tabled logic programs
1799 -- 1822Gregor Rohbogner, Ulf Hahnel, Pascal Benoit, Simon Fey. Multi-agent systems' asset for smart grid applications
1823 -- 1854Jörg Bremer, Michael Sonnenschein. Model-based integration of constrained search spaces into distributed planning of active power provision

Volume 10, Issue 3

939 -- 972Goran Sladic, Branko Milosavljevic, Zora Konjovic. Context-sensitive access control model for business processes
973 -- 998Gilbert A. J. Silvius, Joanna Turkiewicz, Aleksandar Keratsinov, Harm Spoor. The relationship between it outsourcing and business and it alignment: An explorative study
999 -- 1024José Ignacio Panach, Natalia Juristo Juzgado, Oscar Pastor. Including functional usability features in a model-driven development method
1025 -- 1052Luka Vrdoljak, Vedran Podobnik, Gordan Jezic. Forecasting the acceptance of new information services by using the semantic-aware prediction model
1053 -- 1075Anna Formica, Elaheh Pourabbas, Maurizio Rafanelli. Constraint relaxation of the polygon-polyline topological relation for geographic pictorial query languages
1077 -- 1104Justin Terry, Bela Stantic. Indexing method for multidimensional vector data
1105 -- 1128Jiafu Wan, Min Chen, Feng Xia, Di Li, Keliang Zhou. From machine-to-machine communications towards cyber-physical systems
1129 -- 1163Cristian Mateos, Alejandro Zunino, Matías Hirsch. EasyFJP: Providing hybrid parallelism as a concern for divide and conquer java applications
1165 -- 1184Eduardas Bareisa, Vacius Jusas, Kestutis Motiejunas, Rimantas Seinauskas. Functional delay test generation approach using a software prototype of the circuit
1185 -- 1210Tatjana Lutovac, James Harland. A contribution to automated-oriented reasoning about permutability of sequent calculi rules
1211 -- 1228JinHo Ahn. Mobile agent group communication ensuring reliability and totally-ordered delivery
1229 -- 1246Atif Alamri, M. Anwar Hossain, Mohammad Mehedi Hassan, M. Shamim Hossain, Mohammed Abdullah Alnuem, Dewan Tanvir Ahmed, Abdulmotaleb El-Saddik. A cloud-based pervasive serious game framework to support obesity treatment
1247 -- 1267Alaa Ismail Elnashar, Sultan Aljahadli. Experimental and theoretical speedup prediction of MPI-based applications
1269 -- 1291Zhenhua Tan, Guangming Yang, Wei Cheng, Xingwei Wang. Distributed secret sharing scheme based on personalized spherical coordinates space
1293 -- 1317Yanwei Yu, Qin Wang, Xiaodong Wang, Huan Wang, Jie He. Online clustering for trajectory data stream of moving objects
1319 -- 1342Elnomery A. Zanaty, Ahmed S. Ghiduk. A novel approach based on genetic algorithms and region growing for magnetic resonance image (MRI) segmentation
1343 -- 1357Lingling Zi, Junping Du, Lisha Hou, Xiangda Sun, JangMyung Lee. Perception-driven resizing for dynamic image sequences
1359 -- 1385Vanja Lukovic, Danijela Milosevic, Goran Devedzic, Sasa Cukovic. Converting OBR-scolio ontology in OWL DL
1387 -- 1406Michele Fiorentino, Antonio E. Uva, Mario Massimo Foglia, Vitoantonio Bevilacqua. Asymmetry measurement for vibroactive correction in lower limbs mobility
1407 -- 1428Rupesh Ghyar, Karupppasamy Subburaj, Bhallamudi Ravi, Manish Agarwal. Adaptive probabilistic approach for selecting tumour knee prosthesis
1429 -- 1454Petar Rajkovic, Dragan Jankovic, Aleksandar Milenkovic. Developing and deploying medical information systems for Serbian public healthcare: Challenges, lessons learned and guidelines
1455 -- 1471Igor Kulev, Elena Vlahu-Gjorgievska, Vladimir Trajkovik, Saso Koceski. Development of a novel recommendation algorithm for collaborative health: Care system model
1473 -- 1497Nikola Vitkovic, Jelena Milovanovic, Nikola Korunovic, Miroslav Trajanovic, Milos Stojkovic, Dragan Misic, Stojanka Arsic. Software system for creation of human femur customized polygonal models

Volume 10, Issue 2

567 -- 587Fei Song, Huachun Zhou, Sidong Zhang, Hongke Zhang, Ilsun You. The throughput critical condition study for reliable multipath transport
589 -- 609Chin-Ling Chen, Yu-Ting Tsai, Aniello Castiglione, Francesco Palmieri. Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks
611 -- 631Jinjing Zhao, Yan Wen. Evaluation on the influence of internet prefix hijacking events
633 -- 649Byungha Choi, Kyungsan Cho. Two-step hierarchical scheme for detecting detoured attacks to the web server
651 -- 665Der-Chen Huang, Yi-Wei Lee, Hsiang-Wei Wu. An efficient GTS allocation scheme for IEEE 802.15.4 MAC layer
667 -- 684Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen 0001. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing
685 -- 701Ho Seok Kang, Sung-Ryul Kim, PanKoo Kim. Traffic deflection method for dos attack defense using a location-based routing protocol in the sensor network
703 -- 724Tae Rim Lee, Hun Kim, Kyung Hyune Rhee, Sang Uk Shin. Design and implementation of E-discovery as a service based on cloud computing
725 -- 746Jinhai Huo, Bowen Deng, Shuhang Wu, Jian Yuan, Ilsun You. A topographic-awareness and situational-perception based mobility model with artificial bee colony algorithm for tactical MANET
747 -- 765Hae-Duck Joshua Jeong, Jiyoung Lim, WooSeok Hyun, Arisu An. A real-time location-based SNS smartphone application for the disabled population
767 -- 778Myunggwon Hwang, Do-Heon Jeong, Jinhyung Kim, Sa-Kwang Song, Hanmin Jung. Activity inference for constructing user intention model
779 -- 806Hsing-Chung Chen, Marsha Anjanette Violetta, Chien-Erh Weng, Tzu-Liang Kung. Cognitive RBAC in mobile heterogeneous networks
807 -- 823Yong-Hwan Lee, Bonam Kim, Sang-Burm Rhee. Content-based image retrieval using spatial-color and Gabor texture on a mobile device
825 -- 842Jen-Wei Hu, Chu-Sing Yang, Te-Lung Liu. Design and implementation of an efficient and programmable future internet testbed in Taiwan
843 -- 864Inshil Doh, Jiyoung Lim, Kijoon Chae. Key management approach for secure mobile open IPTV service
865 -- 876Bing Bai, Zhenqian Feng, BaoKang Zhao, Jinshu Su. Benefiting from the community structure in opportunistic forwarding
877 -- 896Jyh-Horng Wen, Yung-Cheng Yao, Ying-Chih Kuo. Wiener-based ICI cancellation schemes for OFDM systems over fading channels
897 -- 911Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai. Efficient implementation for QUAD stream cipher with GPUs
913 -- 938Tian-han Gao, Nan Guo, Kangbin Yim. A hybrid approach to secure hierarchical mobile IPv6 networks

Volume 10, Issue 1

1 -- 23Vesna Pajic, Dusko Vitas, Gordana Pavlovic-Lazetic, Milos Pajic. WebMonitoring software system: Finite state machines for monitoring the web
25 -- 50Dusan Okanovic, André van Hoorn, Zora Konjovic, Milan Vidakovic. SLA-driven adaptive monitoring of distributed applications for performance problem localization
51 -- 77Juan M. Alberola, Jose M. Such, Vicente J. Botti, Agustín Espinosa, Ana García-Fornes. A scalable multiagent platform for large systems
79 -- 104Guillem Rull, Carles Farré, Ernest Teniente, Toni Urpí. Validation of schema mappings with nested queries
105 -- 132Ayman Jaradat, Ahmed Patel, M. N. Zakaria, Muhamad A. H. Amina. Accessibility algorithm based on site availability to enhance replica selection in a data grid environment
133 -- 149Raka Jovanovic, Milan Tuba. Ant colony optimization algorithm with pheromone correction strategy for the minimum connected dominating set problem
151 -- 171Stevan Gostojic, Branko Milosavljevic, Zora Konjovic. Ontological model of legal norms for creating and using legislation
173 -- 195George Lagogiannis, Nikos A. Lorentzos, Alexander B. Sideridis. Indexing moving objects: A real time approach
197 -- 214Jian Shu, Ming Hong, Wei Zheng, Limin Sun, Xu Ge. Multi-sensor data fusion based on consistency test and sliding window variance weighted algorithm in sensor networks
215 -- 235Yong-Xin Zhang, Qing-Zhong Li, Zhao-Hui Peng. A novel method for data conflict resolution using multiple rules
237 -- 261Boban Vesin, Mirjana Ivanovic, Aleksandra Klasnja Milicevic, Zoran Budimac. Ontology-based architecture with recommendation strategy in java tutoring system
263 -- 281George S. Oreku, Fredrick Japhet Mtenzi, Al-Dahoud Ali. A viewpoint of Tanzania e-commerce and implementation barriers
283 -- 320Slavica Aleksic, Sonja Ristic, Ivan Lukovic, Milan Celikovic. A design specification and a server implementation of the inverse referential integrity constraints
321 -- 348Tomas Potuzak. Methods for division of road traffic network for distributed simulation performed on heterogeneous clusters
349 -- 367Andreas Attenberger, Klaus Buchenrieder. Modeling and visualization of classification-based control schemes for upper limb prostheses
369 -- 392Miroslav Popovic, Miodrag Djukic, Vladimir Marinkovic, Nikola Vranic. On task tree executor architectures based on intel parallel building blocks
393 -- 421Xi Wu, Huibiao Zhu, Yongxin Zhao, Zheng Wang, Si Liu. Modeling and verifying the Ariadne protocol using process algebra
423 -- 452Bojan Mrazovac, Milan Z. Bjelica, Dragan Kukolj, Branislav M. Todorovic, Sasa Vukosavljev. System design for passive human detection using principal components of the signal strength space
453 -- 482Saad Mubeen, Jukka Mäki-Turja, Mikael Sjödin. Support for end-to-end response-time and delay analysis in the industrial tool suite: Issues, experiences and a case study
483 -- 501Bernd Tessendorf, Matjaz Debevc, Peter Derleth, Manuela Feilner, Franz Gravenhorst, Daniel Roggen, Thomas Stiefmeier, Gerhard Tröster. Design of a multimodal hearing system
502 -- 523Radovan Stojanovic, Sasa Knezevic, Dejan Karadaglic, Goran Devedzic. Optimization and implementation of the wavelet based algorithms for embedded biomedical signal processing
525 -- 545Nenad Filipovic, Velibor Isailovic, Dalibor Nikolic, Aleksandar Peulic, Nikola Mijailovic, Suzana Petrovic, Sasa Cukovic, Radun Vulovic, Aleksandar Matic, Nebojsa Zdravkovic, Goran Devedzic, Branko Ristic. Biomechanical modeling of knee for specific patients with chronic anterior cruciate ligament injury
547 -- 565Aleksandar Peulic, Natasa Milojevic, Emil Jovanov, Milos D. Radovic, Igor Saveljic, Nebojsa Zdravkovic, Nenad Filipovic. Modeling of arterial stiffness using variations of pulse transit time