Abstract is missing.
- A novel algorithm for an image processing system in entomologyMarjan Kindalov, Ana Madevska-Bogdanova, Zarko Erakovic. 1-7 [doi]
- Virtualized environments in cloud can have superlinear speedupSasko Ristov, Magdalena Kostoska, Marjan Gusev, Kiril Kiroski. 8-13 [doi]
- Comparative performance evaluation of the AVL and red-black treesSvetlana Strbac-Savic, Milo Tomasevic. 14-19 [doi]
- OECEP: enriching complex event processing with domain knowledge from ontologiesSebastian Binnewies, Bela Stantic. 20-25 [doi]
- Predictive complex event processing: a conceptual framework for combining complex event processing and predictive analyticsLajos Jeno Fülöp, Árpád Beszédes, Gabriella Toth, Hunor Demeter, László Vidács, Lóránt Farkas. 26-31 [doi]
- Neuroevolution based multi-agent system for micromanagement in real-time strategy gamesGabriel Iuhasz, Viorel Negru, Daniela Zaharie. 32-39 [doi]
- Formal modelling of agents acting under artificial emotionsPetros Kefalas, Ioanna Stamatopoulou, Dionysios Basakos. 40-45 [doi]
- A distributed asynchronous and privacy preserving neural network ensemble selection approach for peer-to-peer data miningYiannis Kokkinos, Konstantinos G. Margaritis. 46-51 [doi]
- Recognition and normalization of some classes of named entities in SerbianCvetana Krstev, Jelena Jacimovic, Dusko Vitas. 52-57 [doi]
- Time-series mining in a psychological domainVladimir Kurbalija, Charlotte von Bernstorff, Hans-Dieter Burkhard, Jens Nachtwei, Mirjana Ivanovic, Lidija Fodor. 58-63 [doi]
- An approach to automated reparation of failed proof attempts in propositional linear logic sequent calculusTatjana Lutovac. 64-69 [doi]
- A knowledge based approach for handling supply chain risk managementAdrian Solomon, Panayiotis Ketikidis, Alok Choudhary. 70-75 [doi]
- International educational cooperation: one possible modelKlaus Bothe, Zoran Putnik, Betim Cico. 76-81 [doi]
- Risks affecting the development of the information society in the Republic of Moldova: insights from a Delphi surveyHoratiu Dragomirescu, Ion Tighineanu. 82-87 [doi]
- Social networking software use in social media marketing vs. traditional marketing: case study in MacedoniaBekim Fetaji, Amir Demiri. 88-93 [doi]
- Integrating Serbian public data into the LOD cloudValentina Janev, Uros Milosevic, Mirko Spasic, Sanja Vranes, Jelena Milojkovic, Branko Jirecek. 94-99 [doi]
- A software tool for building a statistical prefix processorNikitas Karanikolas, Michael Vassilakopoulos, Nektarios Giannoulis. 100-105 [doi]
- Growth rate analysis of e-Government developmentKiril Kiroski, Magdalena Kostoska, Marjan Gusev, Sasko Ristov. 106-111 [doi]
- Modeling the characteristics of a learning object for use within e-learning applicationsGeorge Nikolopoulos, Georgia D. Solomou, Christos Pierrakeas, Achilles Kameas. 112-117 [doi]
- Management, communications and security policy in mobile database systemsVigan Raça, Betim Cico, Majlinda Fetaji. 118-123 [doi]
- An approach to the specification of user interface templates for business applicationsSonja Ristic, Ivan Lukovic, Slavica Aleksic, Jelena Banovic, Ali Al-Dahoud. 124-129 [doi]
- Analyzing the selection and dynamic composition of web services in e-commerce transactionsNikos Vesyropoulos, Christos K. Georgiadis, Christos Ilioudis. 130-135 [doi]
- Programming techniques and environments in a technology management departmentStelios Xinogalos. 136-141 [doi]
- Privacy aware eLearning environments based on hippocratic database principlesJasmin Azemovic. 142-149 [doi]
- Correlation between soft organizational features and development of ICT infrastructureMladen Cudanov, Ivan Todorovic, Ondrej Jasko. 150-155 [doi]
- Challenging issues of UCON in modern computing environmentsChristos Grompanopoulos, Ioannis Mavridis. 156-161 [doi]
- Comparison of information retrieval models for question answeringJasmina Armenska, Katerina Zdravkova. 162-167 [doi]
- Efficient dataset size reduction by finding homogeneous clustersStefanos Ougiaroglou, Georgios Evangelidis. 168-173 [doi]
- Discovery and evaluation of student's profiles with machine learningEvis Trandafili, Alban Allkoçi, Elinda Kajo, Aleksander Xhuvani. 174-179 [doi]
- Parameterized verification of open procedural programsAleksandar Dimovski. 180-185 [doi]
- Performance study of matrix computations using multi-core programming toolsPanagiotis D. Michailidis, Konstantinos G. Margaritis. 186-192 [doi]
- A parallel processing of spatial data interpolation on computing cloudVladimír Siládi, Ladislav Huraj, Norbert Polcák, Eduard Vesel. 193-198 [doi]
- Recent advances delivered by HTML 5 in mobile cloud computing applications: a surveyStelios Xinogalos, Kostas E. Psannis, Angelo Sifaleras. 199-204 [doi]
- A Hoare-style verification calculus for control state ASMsWerner Gabrisch, Wolf Zimmermann. 205-210 [doi]
- Information system monitoring and notifications using complex event processingFilip Nguyen, Tomás Pitner. 211-216 [doi]
- Statically typed matrix: in C++ libraryPredrag S. Rakic, Lazar Stricevic, Zorica Suvajdzin Rakic. 217-222 [doi]
- Formal modelling of a bio-inspired paradigm capable of exhibiting emergenceKonstantinos Rousis, George Eleftherakis, Ognen Paunovski, Anthony J. Cowling. 223-228 [doi]
- Community detection and analysis of community evolution in Apache Ant class collaboration networksMilos Savic, Milos Radovanovic, Mirjana Ivanovic. 229-234 [doi]
- Optimising Flash non-volatile memory using machine learning: a project overviewTom Arbuckle, Damien Hogan, Conor Ryan. 235-238 [doi]
- A set-based approach to negotiation with concessionsCostin Badica, Amelia Badica. 239-242 [doi]
- The modification of genetic algorithms for solving the balanced location problemVladimir Filipovic, Jozef Kratica, Aleksandar Savic, Djordje Dugosija. 243-246 [doi]
- Reservoir sampling techniques in modern data analysisAnze Pecar, Miha Zidar, Matjaz Kukar. 247-250 [doi]
- Extracting drug adverse and beneficial reactions in pediatric population from healthcare social networkJelena Hadzi-Puric, Jeca Grmusa. 251-254 [doi]
- Framework for open data mining in e-governmentPetar Milic, Natasa Veljkovic, Leonid Stoimenov. 255-258 [doi]
- A software tool that helps teachers in handling, processing and understanding the results of massive examsMarko Misic, Marko Lazic, Jelica Protic. 259-262 [doi]
- S-Suite: a multipart service oriented architecture for the car rental sectorMargarita Karkali, Michalis Vazirgiannis. 263-266 [doi]
- Storing XML documents in databases using existing object-relational featuresDusan Petkovic. 267-270 [doi]
- Insider threats in corporate environments: a case study for data leakage preventionVeroniki Stamati-Koromina, Christos Ilioudis, Richard E. Overill, Christos K. Georgiadis, Demosthenes Stamatis. 271-274 [doi]
- A BIBO ontology extension for evaluation of scientific research resultsBojana Dimic Surla, Milan Segedinac, Dragan Ivanovic. 275-278 [doi]
- Collective information extraction using first-order probabilistic modelsSlavko Zitnik, Lovro Subelj, Dejan Lavbic, Aljaz Zrnec, Marko Bajec. 279-282 [doi]
- Communication in machine-to-machine environmentsIva Bojic, Gordan Jezic, Damjan Katusic, Sasa Desic, Mario Kusek, Darko Huljenic. 283-286 [doi]
- SSQSA architectureZoran Budimac, Gordana Rakic, Milos Savic. 287-290 [doi]
- Rule-based assignment of comments to AST nodes in C++ programsTamás Cséri, Zalán Szügyi, Zoltán Porkoláb. 291-294 [doi]
- Evaluation of tools for automated unit testing for applications in OSGiFrantisek Geletka, Ladislav Samuelis, Jozef Vojtko. 295-297 [doi]
- Adoption of object-oriented software metrics for ontology evaluationRok Zontar, Marjan Hericko. 298-301 [doi]