Journal: Informatica (Slovenia)

Volume 26, Issue 4

0 -- 0Janez Brest, Viljem Zumer. A List Scheduling Heuristic for Allocating the Task Graph to Multiprocessors
0 -- 0Shen-Chuan Tai, Chuen-Ching Wang, Chong-Shou Yu. Visual Secret Sharing Watermarking for Digital Image
0 -- 0Maja Pusnik, Matjaz B. Juric, Ivan Rozman. Evaluation of Technologies for Business Process Automation
0 -- 0Chin-Chen Chang, Jun-Chou Chuang, Tung-Shou Chen. Recognition of Image Authenticity Using Significant DCT Coefficients Quantization
0 -- 0Cene Bavec. An Assessment of the Organization Virtuality with Three Different Reference Models
0 -- 0Janez Brank. Using Image Segmentation as a Basis for Categorization
0 -- 0Vladimir B. Bajic, Suisheng Tang, Hao Han, Vladimir Brusic, Artemis G. Hatzigeorgiou. Artificial Neural Networks Based Systems for Recognition of Genomic Signals and Regions: A Review
0 -- 0Anton P. Zeleznikar. Informon - An Emergent Conscious Component
0 -- 0Giovanni Semeraro, Marco Degemmis, Pasquale Lops. User Profiling to Support Internet Customers: What Do You Want to Buy Today?
0 -- 0Christian Erfurth, Wilhelm Rossak. Adapting Proactive Mobile Agents to Dynamically Reconfigurable Networks
0 -- 0Jesús Arturo Pérez Díaz, Darío Álvarez Gutiérrez. Protecting the Data State of Mobile Agents by Using Bitmaps and XOR Operators

Volume 26, Issue 3

0 -- 0Josef Pieprzyk, Xian-Mo Zhang. Multisecret Sharing Immune Against Cheating
0 -- 0Hongjun Wu, Feng Bao, Robert H. Deng. Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes
0 -- 0Valery I. Korzhik, Guillermo Morales-Luna, Dmitry Marakov, Irina Marakova. Digital Semipublic Watermarking
0 -- 0Yong Li, Bo Yang, Xiang Hua. An Efficient Anonymous Fingerprinting Scheme
0 -- 0Yi Mu, Vijay Varadharajan. Group Cryptography: Signature and Encryption
0 -- 0Baodian Wei, Dongsu Liu, Xinmei Wang. Analysis of AES S-box with Walsh Spectrum
0 -- 0Adel Taweel, Pearl Brereton. Developing Software Across Time Zones: An Exploratory Empirical Study
0 -- 0David Taniar, Yi Jiang, Kevin H. Liu, Clement H. C. Leung. Parallel Aggregate-Join Query Processing
0 -- 0Daniele Frigioni, Laura Tarantino, Tania Di Mascio. On Formal Aspects of Zooming in Geographic Maps
0 -- 0Tomaz Erjavec. Compiling and Using the IJS-ELAN Parallel Corpus
0 -- 0Chunyan Bai, Roberta Houston, Gui Liang Feng. Practical Construction for Multicast Re-keying Schemes Using R-S Code and A-G Code
0 -- 0Changjie Wang, YuMin Wang, Fangguo Zhang. An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet

Volume 26, Issue 2

0 -- 0Bart De Win, Bart Vanhaute, Bart De Decker. How aspect-oriented programming can help to build secure software
0 -- 0Bostjan Brumen, Izidor Golob, Tatjana Welzer, Ivan Rozman, Marjan Druzovec, Hannu Jaakkola. Data protection for outsourced data mining
0 -- 0C. Margaritis, N. Kolokotronis, Panagiota Papadopoulou, Drakoulis Martakos. Securing Web-based Information Systems: A Model and Implementation Guidelines
0 -- 0Ayaz Isazadeh. Software engineering: configuration languages
0 -- 0Arso Savanovic, Dusan Gabrijelcic, Borka Jerman-Blazic, Stamatis Karnouskos. An active networks security architecture
0 -- 0Wesley Brandi, Martin S. Olivier. Maintaining Integrity within Mobile Self Protecting Objects
0 -- 0Adrian Spalka, Armin B. Cremers, Hanno Langweg. Trojan horse attacks on software for electronic signatures
0 -- 0Joris Claessens, Bart Preneel, Joos Vandewalle. Combining World Wide Web and wireless security
0 -- 0Jaroslav Janácek, Richard Ostertág. Problems in practical use of electronic signatures
0 -- 0. Efficient methods for checking integrity: a structured spreadsheet engineering methodology
0 -- 0Vijay V. Mandke, Madhavan K. Nayar. Implementing information integrity technology - a feedbackcontrol system approach
0 -- 0Ernesto Damiani, Pierangela Samarati, Sabrina De Capitani di Vimercati, Stefano Paraboschi. XML access control systems: a component-based approach
0 -- 0Vijayalakshmi Atluri, Ravi Mukkamala. Employing an extended transaction model in multilevel secure transaction processing

Volume 26, Issue 1

0 -- 0Agnieszka Debudaj-Grabysz. A concurrent implementation of the simulated annealing by the method of multiple trials
0 -- 0Sergey Avdoshin, Victor Serdiouk. Some approaches to information security of communication networks
0 -- 0Amitava Datta. Efficient parallel clustering algorithms
0 -- 0Marjan Krisper, Blaz Zupan. Construction and application of hierarchical socioeconomic decision models
0 -- 0Robert Manger. Solving path problems on a network of computers
0 -- 0Arathi Ramani, Salim Vhora, S. Sanyal. The next generation Internet protocol
0 -- 0Hendrik Blockeel, Jan Struyf. Deriving biased classifiers for better ROC performance
0 -- 0Dejan Rakovic, Miroljub Dugic. Critical note on the role of the quantum mechanical collapse in quantum modeling of consciousness
0 -- 0Debranjan Sarkar, Pradip K. Das. On mirroring, connected components labeling and topological properties of images encoded as minimized boolean function
0 -- 0Kuo-Lung Hung, Chin-Chen Chang. An improvement of a technique for color quantization using reduction of color space dimensionality