Abstract is missing.
- CompSysTech: ten years after the beginning..Boris Rachev. 1 [doi]
- IPv6 - the next big bail-out: will IPv6 save the internet?Latif Ladid. 2 [doi]
- ICT infrastructure and scientific researchKiril Boyanov, Dimitar Todorov. 3 [doi]
- Polymorphic architectures: from media processing to supercomputingGeorgi Kuzmanov. 4 [doi]
- Advanced scalable algorithms for advanced architecturesVassil Alexandrov. 5 [doi]
- National broadband program of the republic of BulgariaRoumen Trifonov. 6 [doi]
- Non-contact ultrasound method for identification of yogurt according to its butter contentNikolay Shopov, Raycho Ilarionov, Ivan Simeonov, Hristo Kilifarev. 7 [doi]
- Model approach in the design of devices for 3D information input into computing environmentRaycho Ilarionov. 8 [doi]
- Hardware implementation of strategies for servicing queuesStoyan Prokopov, Dimitar Tyanev. 9 [doi]
- Micro-pipeline section for condition-controlled loopDimitar Tyanev, Stamen Kolev, Dragomir Yanev. 10 [doi]
- Outline of RISC-based core for multiprocessor on chip architecture supporting moving threadsJani Paakkulainen, Jari-Matti Mäkelä, Ville Leppänen, Martti Forsell. 11 [doi]
- Programming and applying of the multiple product distribution system by using PIC 16F877A microcontrollerÖzcan Varul, Melih Inal. 13 [doi]
- Experiences with embedding MPL security monitors into Java programsJari-Matti Mäkelä, Ville Leppänen. 14 [doi]
- MVTsim: software simulator for multicore on chip parallel computer architecturesJari-Matti Mäkelä, Jani Paakkulainen, Ville Leppänen. 15 [doi]
- Dynamic reconfiguration of multimodal architecturesHicham Djenidi, Amar Ramdane-Cherif, Nicole Lévy, Chakib Tadj. 16 [doi]
- Evaluating the method of the transforming ontology axioms to application domain rulesDiana Kalibatiene, Olegas Vasilecas. 17 [doi]
- Cyclic histogram thresholding and multithresholdingDimo Dimov, Lasko Laskov. 18 [doi]
- Researching product tiles in eBay using the eBay APINikolaj Cholakov. 19 [doi]
- Security assurance during the software development cycleIsaac Agudo, José Luis Vivas, Javier Lopez. 20 [doi]
- A practical approach for software project managementVioleta Bozhikova, Mariana Stoeva, Krasimir Tsonev. 21 [doi]
- Spider vs. Prolog: simulating Prolog in SpiderTzanko Golemanov, Kostadin Kratchanov, Emilia Golemanova. 22 [doi]
- Spider vs. Prolog: computation controlEmilia Golemanova, Kostadin Kratchanov, Tzanko Golemanov. 23 [doi]
- Architectural design of a software engine for adaptation control in the ADOPTA e-learning platformBoyan Bontchev, Dessislava Vassileva, Boryana Chavkova, Vladimir Mitev. 24 [doi]
- Approach for data replication on MS SQL ServerDessislava Petrova-Antonova, Ivelina Vacheva. 25 [doi]
- Design of service level agreements for software servicesDiana Berberova, Boyan Bontchev. 26 [doi]
- Application of contemporary measurement and analysis techniques to human cardiovascular systemMaja Bracic Lotric, Aneta Stefanovska. 27 [doi]
- A Bayesian approach to recognise facial expressions using vector flowsXiaofan Sun, Léon J. M. Rothkrantz, Dragos Datcu, Pascal Wiggers. 28 [doi]
- A bottom-up approach of fusion of events in surveillance systemsLéon J. M. Rothkrantz, Zhenke Yang, Michael Jepson, Dragos Datcu, Pascal Wiggers. 29 [doi]
- FACS-coding of facial expressionsLéon J. M. Rothkrantz, Dragos Datcu, Pascal Wiggers. 30 [doi]
- Controlling the speed of Coding Line Conveyor using fuzzy logicAtanas Atanassov. 31 [doi]
- XPDL: bringing business and software together - a case studyOrlin Genchev, John Galletly. 32 [doi]
- A vision-based attentive user interface with (semi-)automatic parameter calibrationFabio Fosso, Marco Porta. 33 [doi]
- A design of an integrated document system for project managementIulian Întorsureanu, Rodica Mihalca, Adina Uta, Anca Andreescu. 34 [doi]
- A general software development process suitable for explicit manipulation of business rulesAnca Andreescu. 35 [doi]
- Web based portfolio optimizationTodor Stoilov, Krasimira Stoilova. 36 [doi]
- Learning by negation of the negative examples: single model versus double modelZekie Shevked, Ludmil Dakovski. 37 [doi]
- Executable Petri Nets: towards modelling and management of e-learning processesHristo Indzhov, Dimitar Blagoev, George Totkov. 38 [doi]
- Implementation design of access control system local database in flash memory arrayRadoslav Mladenov, Sava Ivanov. 39 [doi]
- Open source solution for workflow execution architectureMartin Tsenov, Krasimir Trichkov, Simeon Tsvetanov. 40 [doi]
- One approach to HTML wrappers creation: using Document Object Model treeViera Rozinajová, Ondrej Hluchý. 41 [doi]
- Keeping artifacts alive: towards a knowledge management systemHilda Tellioglu. 42 [doi]
- 1-Wire based data acquisition systemGeorgi Georgiev. 43 [doi]
- Personalized web search using context enhanced queryMichal Kajaba, Pavol Návrat. 44 [doi]
- Distillation column control using genetic algorithms for LQR designKarl O. Jones, Wilfried Hengue. 45 [doi]
- Limitations of multivariable controller tuning using genetic algorithmsKarl O. Jones, Wilfried Hengue. 46 [doi]
- Augmenting UML with decision table techniqueKestutis Normantas, Olegas Vasilecas, Sergejus Sosunovas. 47 [doi]
- GPROM: a tool for non-invasive personal trackingAndrea Girardello, Giancarlo Succi. 48 [doi]
- Remote identification and information processing with a near field communication compatible mobile phoneRaine Kelkka, Tommi Kallonen, Jouni Ikonen. 49 [doi]
- An access control and time management software solution using RFIDJani Peusaari, Raine Kelkka, Jouni Ikonen. 50 [doi]
- RFID and business card informationTommi Kallonen, Juho Vartiainen, Jouni Ikonen. 51 [doi]
- Distributed mobile traffic monitoring system based on free and open source softwareVelislava Spasova, Grisha Spasov. 52 [doi]
- Architectural models for realization of web-based personal health systemsMitko Shopov, Grisha Spasov, Galidia Petrova. 53 [doi]
- Algorithm for modeling self-similar ethernet trafficEvgeniya Gospodinova. 54 [doi]
- The influence of self-similar traffic on telecommunication network queuingEvgeniya Gospodinova, Mitko Gospodinov. 55 [doi]
- Cooperation requirements for packet forwarding in vehicular ad-hoc networks (VANETs)Candelaria Hernández-Goya, Pino Caballero-Gil, Jezabel Molina-Gil, Cándido Caballero-Gil. 56 [doi]
- The application of fuzzy expert cooling system for multi core microprocessors and mainboardsKürsat Zühtüogullari, Ismail Saritas, Novruz Allahverdi. 57 [doi]
- Modeling the performance and emission characteristics of diesel engine and petrol-driven engine by ANNKemal Tütüncü, Novruz Allahverdi. 58 [doi]
- A nonlinear programming case study to a sensor location problemPéter Gábor Szabó. 59 [doi]
- Multidimensional scaling: multi-objective optimization approachAusra Mackute-Varoneckiene, Antanas Zilinskas, Audrius Varoneckas. 60 [doi]
- An application of an algorithm for common subgraph detection for comparison of protein moleculesStoicho Stoichev, Dobrinka Petrova. 61 [doi]
- Gustafson-Kessel algorithm for evolving data stream clusteringOlga Georgieva, Dimitar Filev. 62 [doi]
- Implementing common array algorithms on modern GPUsTzvetomir Vassilev. 63 [doi]
- Distributed secret on the basis of the linear correcting codesNina Siniagina, Boncho Aleksandrov, Petko Kochevski. 64 [doi]
- Investigation of the text entry speed and accuracy in mobile devicesTsvetozar Georgiev, Evgeniya Georgieva. 65 [doi]
- Wavelet classifiers for Bulgarian sorting machines ASM 501Nikolay Shopov, Veselin Nachev, Chavdar Damyanov, Tanya Titova. 66 [doi]
- About singularity of two approaches to solving problems of portfolio selection under riskStela Sotirova, Lyubomir Sotirov. 67 [doi]
- Research over correlation properties of families optical orthogonal codesAleksandar Milev, Valentin Mutkov. 68 [doi]
- An information system for temperature monitoring of administrative buildingsValentin Mutkov, Aleksandar Milev. 69 [doi]
- Wireless sensor networks to support elementary school learning activitiesRicardo Silva, Nadya Antonova, Jorge Silva, António José Mendes, Maria José Marcelino. 71 [doi]
- Net-generation learning style: a challenge for higher educationAneliya Ivanova, Galina Ivanova. 72 [doi]
- LOGOPED 2.0: software system for e-consulting and therapy of people with communicative disordersVania Sivakova, George Totkov, Todorka Terzieva. 73 [doi]
- FSM decomposition with application to FPGA synthesisAlexander Sudnitson, Dmitri Mihhailov, Margus Kruus, Konstantin Tarletski. 74 [doi]
- You must be independent and have self-confidence: attitudes of distance learnersÁsrún Matthíasdóttir. 75 [doi]
- A web search methodology for different user typologiesMarco Alfano, Biagio Lenzitti. 76 [doi]
- The Jigsaw collaborative method in e-learning environment MoodleGeorgi Tuparov, Daniela Tuparova, Ilka Zafirova. 77 [doi]
- Scoring concept maps: an overviewAlla Anohina, Janis Grundspenkis. 78 [doi]
- Algorithm for defining of initial package of notions for purpose of e-learningMitko Mitev, Elena Racheva, Ginka Marinova. 79 [doi]
- The emerging global campus modelRoumen Nikolov. 80 [doi]
- Some remarks about OO teachingJanusz Jablonowski. 81 [doi]
- Creating an e-training course on computer operating systemsYuri Hopteriev. 82 [doi]
- An approach to development of personalized e-learning environment for dyslexic pupils acquisition of reading competenceRumen Andreev, Valentina Terzieva, Petia Kademova-Katzarova. 83 [doi]
- On using of random access machine simulators in teaching of theoretical computer scienceDaniela Chudá, Martin Nehéz, Michal Cernanský. 84 [doi]
- Information system topics for studies in software engineeringMirjana Ivanovic, Dragana Todoric-Vukasin, Zoran Budimac. 85 [doi]
- European standardization: mobility without bordersRositsa Doneva, George Totkov, Nikolay Kasakliev, Elena Somova. 86 [doi]
- Python prevailsVambola Leping, Marina Lepp, Margus Niitsoo, Eno Tõnisson, Varmo Vene, Anne Villems. 87 [doi]
- A shape based approach for biometrical analysesMariana Stoeva, Violeta Bozhikova. 88 [doi]
- Multifactor authentication based on keystroke dynamicsDaniela Chudá, Michal Durfina. 89 [doi]
- A computer system for graphometric handwriting analysisDobrin Nestorov, Stefan Benchev, Stefan Bonchev, Ruslan Kostashki, Georgi Gluhchev. 90 [doi]
- Prototype of a platform for monitoring and management of asynchronous network events: (network simulator of asynchronous events)Vanya Topalova. 91 [doi]
- Runtime generation of a user interface, described in a databasePlamen Paskalev, Ilka Serafimova. 92 [doi]
- Rule based GUI modification and adaptationPlamen Paskalev. 93 [doi]
- Clustering and prediction of risk spread curvesVentsislav Nikolov. 94 [doi]
- Possibilities of grid computing for realization of simulation problemsIvaylo Penev, Anatoliy Antonov. 95 [doi]
- Ensuring consistency of information systems rules modelsOlegas Vasilecas, Ruta Dubauskaite. 96 [doi]
- Development of duty schedule using rules approachDarius Jurkevicius, Olegas Vasilecas. 97 [doi]
- Data extraction by visual matchingLukás Barinka, Ivan Jelínek. 98 [doi]
- Proposing of modular system for web information extractionVojtech Jirkovský, Ivan Jelínek. 99 [doi]