Journal: Comput. Sci. Inf. Syst.

Volume 15, Issue 3

487 -- 499Hai-Tao Zheng, Jinxin Han, Jin-Yuan Chen, Arun Kumar Sangaiah. A novel framework for Automatic Chinese Question Generation based on multi-feature neural network model
501 -- 515Zhijie Zhao, Cong Ren, Huadong Sun, Zhipeng Fan, Ze Gao. Research on automatic identification technique of CT image in lung
517 -- 531Pinle Qin, Jun Chen, Kai Zhang, Rui Chai. Convolutional neural networks and hash learning for feature extraction and of fast retrieval of pulmonary nodules
533 -- 548Weipeng Jing, Danyu Tong, Guangsheng Chen, Chuanyu Zhao, Liangkuan Zhu. An optimized method of HDFS for massive small files storage
549 -- 567Cheng Song, Mingyue Zhang, Zongpu Jia, Wei-Ping Peng, Hairu Guo. A lightweight batch anonymous authentication scheme for VANET based on pairing-free
569 -- 583Lei Wang 0051, Weihua Wu, Junyan Qi, Zong-pu Jia. Wireless sensor network coverage optimization based on whale group algorithm
585 -- 614Xu an Wang, Xiaoyuan Yang, Cong Li, Yudong Liu, Yong Ding. Improved functional proxy re-encryption schemes for secure cloud data sharing
615 -- 633Bushra Zafar, Rehan Ashraf, Nouman Ali, Mudassar Ahmed, Sohail Jabbar, Kashif Naseer, Awais Ahmad, Gwanggil Jeon. Intelligent image classification-based on spatial weighted histograms of concentric circles
635 -- 654Josefa Díaz Álvarez, Franciso de la O. Chávez, Pedro A. Castillo, Juan Ángel García Martínez, Francisco J. Rodriguez, Francisco Fernández de Vega. A fuzzy rule-based system to predict energy consumption of genetic programming algorithms
655 -- 682Giovanni Ciatto, Stefano Mariani 0001, Andrea Omicini. ReSpecTX: Programming interaction made easy
683 -- 703Filipe Gonçalves, Davide Carneiro, José Miguel Pêgo, Paulo Novais. X3S: A multi-modal approach to monitor and assess stress through human-computer interaction
705 -- 731Christopher Haubeck, Alexander Pokahr, Kim Reichert, Till Hohenberger, Winfried Lamersdorf. The CRI-model: A domain-independent taxonomy for non-conformance between observed and specified behaviour
733 -- 750Rafael Nogueras, Carlos Cotta. On the use of self-* Island-based evolutionary computation methods on complex environments
751 -- 774Lars Braubach, Kai Jander, Alexander Pokahr. A novel distributed registry approach for efficient and resilient service discovery in megascale distributed systems?
775 -- 798Petros Kefalas, Ioanna Stamatopoulou. Using screencasts to enhance coding skills: The case of logic programming?
799 -- 820Martin Bonchanoski, Katerina Zdravkova. Learning syntactic tagging of Macedonian language
821 -- 843Jovana Vidakovic, Sonja Ristic, Slavica Kordic, Ivan Lukovic. Extended tuple constraint type as a complex integrity constraint type in XML data model - definition and enforcement

Volume 15, Issue 2

257 -- 272Marcelo Zambrano, Francisco J. Pérez, Manuel Esteve, Carlos E. Palau. Interoperability in the emergency management. A solution based on distributed databases and P2P networks
273 -- 293Pablo Vidal, Ana Carolina Olivera. Solving the DNA fragment assembly problem with a parallel discrete firefly algorithm implemented on GPU
295 -- 320Osama A. Mehdi, Hamidah Ibrahim, Lilly Suriani Affendey, Eric Pardede, Jinli Cao. Exploring instances for matching heterogeneous database schemas utilizing Google similarity and regular expression
321 -- 346Shalinka Jayatilleke, Richard Lai, Karl Reed. Managing software requirements changes through change specification and classification
347 -- 368Won-Seok Hwang, Shaoyu Li, Sang-Wook Kim, Kichun Lee. Data imputation using a trust network for recommendation via matrix factorization
369 -- 392Dorde Petrovic, Milena Stankovic. Use of linguistic forms mining in the link analysis of legal documents
393 -- 419Djahida Belayadi, Khaled-Walid Hidouci, Ladjel Bellatreche. OLAPS: Online load-balancing in range-partitioned main memory database with approximate partition statistics
421 -- 448Aida Kamisalic, Marjan Hericko, Tatjana Welzer, Muhamed Turkanovic. Experimental study on the effectiveness of a teaching approach using barker or Bachman notation for conceptual database design
449 -- 472Dani Almog, Hadas Schwartz-Chassidim, Yaron Tsubery, Miroslav Bures, Shlomo Mark. Conceptual approach for reuse of test automation artifacts on various architectural levels
473 -- 485Vladimir N. Babenko, Anton G. Bogomolov, Roman O. Babenko, Elvira R. Galieva, Yuriy L. Orlov. CpG islands' clustering uncovers early development genes in the human genome

Volume 15, Issue 1

1 -- 30Gordana Milosavljevic, Goran Sladic, Branko Milosavljevic, Miroslav Zaric, Stevan Gostojic, Jelena Slivka. Context-sensitive constraints for access control of business processes
31 -- 50Titas Savickas, Olegas Vasilecas. An approach to business process simulation using mined probabilistic models
51 -- 78Marek Krótkiewicz. A novel inheritance mechanism for modeling knowledge representation systems
79 -- 109Predrag Matkovic, Mirjana Maric, Pere Tumbas, Marton Sakal. Traditionalisation of agile processes: Architectural aspects
111 -- 137Beumjin Cho, Sangho Lee 0001, Meng Xu, Sangwoo Ji, Taesoo Kim, Jong Kim 0001. Prevention of cross-update privacy leaks on android
139 -- 162Miodrag Petkovic, Ilija Basicevic, Dragan Kukolj, Miroslav Popovic. Evaluation of Takagi-Sugeno-Kang fuzzy method in entropy-based detection of DDoS attacks
163 -- 185Nishat I. Mowla, Inshil Doh, Kijoon Chae. CSDSM: Cognitive switch-based DDoS sensing and mitigation in SDN-driven CDNi word
187 -- 209Ivica Slavkov, Jana Karcheska, Dragi Kocev, Saso Dzeroski. HMC-ReliefF: Feature ranking for hierarchical multi-label classification
211 -- 236Zhou Tao, Muzhou Hou, Chunhui Liu. Forecasting stock index with multi-objective optimization model based on optimized neural network architecture avoiding overfitting
237 -- 256Eduardas Bareisa, Vacius Jusas, Kestutis Motiejunas, Liudas Motiejunas, Rimantas Seinauskas. Black box delay fault models for non-scan sequential circuits