Journal: Comput. Sci. Inf. Syst.

Volume 16, Issue 3

689 -- 704Fei Zhu, Pai Peng, Quan Liu, Yuchen Fu, Shan Zhong. SARSA based access control with approximation by TileCoding
705 -- 731Haoze Lv, Zhaobin Liu, Zhonglian Hu, Lihai Nie, Weijiang Liu, Xinfeng Ye. Research on improved privacy publishing algorithm based on set cover
733 -- 751Hongsong Chen, Haiyan Zhuang, Zhiguang Shan, Chao-Hsien Lee, Zhongchuan Fu. A novel SMP-based survivability evaluation metric and approach in wireless sensor network
753 -- 772Jianqiang Hu, Wei Liang, Zhiyong Zeng, Yong Xie, Jianxun Eileen Yang. A framework for Fog-assisted healthcare monitoring
773 -- 795Letian Duan, Dezhi Han, Qiuting Tian. Design of intrusion detection system based on improved ABC_elite and BP neural networks
797 -- 813Qiuting Tian, Dezhi Han, Yanmei Jiang. Hierarchical authority based weighted attribute encryption scheme
815 -- 830Xingchen Li, Weizhe Zhang, Desheng Wang, Bin Zhang, Hui He. Algorithm of web page similarity comparison based on visual block
831 -- 847Xixi Yan, Hao Ni, Yuan Liu, Dezhi Han. Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR
849 -- 865Haijian Chen, Yonghui Dai, Heyu Gao, Dongmei Han, Shan Li. Classification and analysis of MOOCs learner's state: The study of hidden Markov model
867 -- 890Zeyu Sun, Zhiguo Lv, Yue Hou, Chen Xu, Ben Yan. MR-DFM: A multi-path routing algorithm based on data fusion mechanism in sensor networks
891 -- 914Zhanquan Wang, Taoli Han, Huiqun Yu. Research of MDCOP mining based on time aggregated graph for large spatio-temproal data sets
915 -- 938Zhaobin Liu, Haoze Lv, Minghui Li, Zhiyang Li, Zhiyi Huang. A novel self-adaptive grid-partitioning noise optimization algorithm based on differential privacy
939 -- 957Zhenxin Du, Keyin Chen. Enhanced artificial bee colony with novel search strategy and dynamic parameter

Volume 16, Issue 2

333 -- 357Sang-Chul Lee, Sang-Wook Kim, Sunju Park, Dong-Kyu Chae. A tripartite-graph based recommendation framework for price-comparison services
359 -- 380Zhehua Piao, Sang-Min Park, Byung-Won On, Gyu Sang Choi, Myong-Soon Park. Product reputation mining: bring informative review summaries to producers and consumers
381 -- 407Jiawei Li, Wenge Rong, Chuantao Yin, Zhang Xiong. Goal-oriented dependency analysis for service identification
409 -- 442Ana Lucía Nicolini, Carlos M. Lorenzetti, Ana Gabriela Maguitman, Carlos Iván Chesñevar. Intelligent query processing in P2P networks: Semantic issues and routing algorithms
443 -- 468Hui Liu, Chenming Li, Lizhong Xu. Dimension reduction and classification of hyperspectral images based on neural network sensitivity analysis and multi-instance learning
469 -- 489Piotr Lasek, Jarek Gryz. Density-based clustering with constraints
491 -- 514Vacius Jusas, Saulius Japertas, Tautvydas Baksys, Sandeepak Bhandari. Logical filter approach for early stage cyber-attack detection
515 -- 539Emin Borandag, Akin Özçift, Deniz Kilinç, Fatih Yücalar. Majority vote feature selection algorithm in software fault prediction
541 -- 564Mathias Longo, Ana Rodriguez, Cristian Mateos, Alejandro Zunino. Reducing energy usage in resource-intensive Java-based scientific applications via micro-benchmark based code refactorings
565 -- 595Guilherme Oliveira Campos, Edré Moreira, Wagner Meira Jr., Arthur Zimek. Outlier detection in graphs: A study on the impact of multiple graph models
597 -- 614Xin Liu 0020, Chenyi Zhuang, Tsuyoshi Murata, Kyoung-Sook Kim, Natthawut Kertkeidkachorn. How much topological structure is preserved by graph embeddings?
615 -- 638Min-Hee Jang, Sang-Wook Kim, Woong-Kee Loh, Jung-Im Won. On approximate k-nearest neighbor searches based on the earth mover's distance for efficient content-based multimedia information retrieval
639 -- 655Jinyan Chen, Susanne Becken, Bela Stantic. Lexicon based Chinese language sentiment analysis method
657 -- 688Drazen Brdjanin, Danijela Banjac, Goran Banjac, Slavko Maric. Automated two-phase business model-driven synthesis of conceptual database models

Volume 16, Issue 1

1 -- 17Hasan Ali Khattak, Zoobia Ameer, Ikram Ud Din, Muhammad Khurram Khan. Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities
19 -- 44Laura C. Rodríguez-Martínez, Hector A. Duran-Limon, Manuel Mora, Francisco Álvarez Rodríguez. SOCA-DSEM: A well-structured SOCA development systems engineering methodology
45 -- 74Mladen Matejas, Kresimir Fertalj. Building a BPM application in an SOA-based legacy environment
75 -- 104Marko Jankovic, Slavko Zitnik, Marko Bajec. Reconstructing de facto software development methods
105 -- 129Demijan Grgic, Hrvoje Vdovic, Jurica Babic, Vedran Podobnik. CrocodileAgent 2018: Robust agent-based mechanisms for power trading in competitive environments
131 -- 154Matej Senozetnik, Luka Bradesko, Tine Subic, Zala Herga, Jasna Urbancic, Primoz Skraba, Dunja Mladenic. Estimating point-of-interest rating based on visitors geospatial behaviour
155 -- 178Kristina Andric, Damir Kalpic, Zoran Bohacek. An insight into the effects of class imbalance and sampling on classification accuracy in credit risk assessment
179 -- 203Martin Svrcek, Michal Kompan, Mária Bieliková. Towards understandable personalized recommendations: Hybrid explanations
205 -- 225George Lagogiannis, Stavros Kontopoulos, Christos Makris. On the randomness that generates biased samples: The limited randomness approach
227 -- 245Maja Braovic, Darko Stipanicev, Ljiljana Seric. Retinal blood vessel segmentation based on heuristic image analysis
247 -- 271Dinu Dragan, Veljko B. Petrovic, Dusan B. Gajic, Zarko Zivanov, Dragan Ivetic. An empirical study of data visualization techniques in PACS design
273 -- 287Francisco Jurado 0001, Pilar Rodríguez. An experience in automatically building lexicons for affective computing in multiple target languages
289 -- 311Adela Ljajic, Ulfeta Marovac. Improving sentiment analysis for twitter data by handling negation rules in the Serbian language
313 -- 332Leon Bosnjak, Bostjan Brumen. Rejecting the death of passwords: Advice for the future