Abstract is missing.
- Continuous Requirements EngineeringMarite Kirikova. 1-10 [doi]
- Gamification in Education: A Passing Trend or a Genuine Potential?Darina Dicheva. 11 [doi]
- Ant Colony Optimization Algorithm for Traffic Flow EstimationMilena Karova, Nikola Vasilev, Ivaylo Penev. 12-19 [doi]
- "Compatible" Fuzzy Cognitive Maps for Direct and Inverse InferenceVadim V. Borisov, Alexander S. Fedulov, Yaroslav Fedulov. 20-27 [doi]
- Situation Calculus for Multiple Action RepresentationMichael Zernov. 28-35 [doi]
- Extended Graph Backbone for Motif AnalysisAntonio Maratea, Alfredo Petrosino, Mario Manzo. 36-43 [doi]
- Incremental Rerouting Algorithm for single-vehicle VRPPDRoman Guralnik. 44-51 [doi]
- Neural Network Application in Financial AreaRoumen Trifonov, Dilyana Budakova, Galya Pavlova. 52-57 [doi]
- Smart Multifunctional Digital Content Ecosystem Using Emotion Analysis of VoiceAlexander I. Iliev, Peter Stanchev. 58-64 [doi]
- Evaluating Coherence of Essays using Sentence-similarity NetworksKaja Zupanc, Milos Savic, Zoran Bosnic, Mirjana Ivanovic. 65-72 [doi]
- Outlier Detection via Deep Learning ArchitectureIrina Kakanakova, Stefan Stoyanov. 73-79 [doi]
- Is the Visitor Reading or Navigating?Peter Krátky, Tomás Repiský, Daniela Chudá. 80-87 [doi]
- Modelling of Educational Data Following Big Data Value ChainDessislava Petrova-Antonova, Olga Georgieva, Sylvia Ilieva. 88-95 [doi]
- A Conceptual Model of a Virtual Collaboration Space for Bat ScientistsAngel Ivanov, Stanimira Deleva, Milena Georgieva, Daniela Orozova. 96-102 [doi]
- Text Classification Based on Enriched Vector Space ModelTsvetanka Georgieva-Trifonova. 103-110 [doi]
- Text Mining Based Adaptive Case Management Automation in the Field of Forensic MedicineBorislav Banchev. 111-118 [doi]
- An Algorithm for Micro-localization in Large Public BuildingsRosen Ivanov. 119-126 [doi]
- A Practical Approach to Spam MitigationDobrin Tashev. 127-132 [doi]
- A Comparison of Record and Play Honeypot DesignsJarko Papalitsas, Sampsa Rauti, Ville Leppänen. 133-140 [doi]
- A Survey on Application Sandboxing TechniquesSamuel Laurén, Sampsa Rauti, Ville Leppänen. 141-148 [doi]
- Pass-the-Hash: One of the Most Prevalent Yet Underrated Attacks for Credentials Theft and ReuseDimo Dimov, Yulian Tzonev. 149-154 [doi]
- Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation ProtocolAnna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis. 155-162 [doi]
- Cyber Threat Hunting Through the Use of an Isolation ForestDimitar Karev, Christopher McCubbin, Ruslan Vaulin. 163-170 [doi]
- What Should Application Developers Understand about Mobile Phone Position DataOskari Jahkola, Ari Happonen, Antti Knutas, Jouni Ikonen. 171-178 [doi]
- Measuring Software Security from the Design of SoftwareMarko Saarela, Shohreh Hosseinzadeh, Sami Hyrynsalmi, Ville Leppänen. 179-186 [doi]
- A Fine-Grained Access Control Model and ImplementationEkaterina A. Gorshkova, Boris Novikov, Manoj Kumar Shukla. 187-194 [doi]
- Limited Resources Platform Implementation of Complex Event Processing SystemJán Lang, Peter Gabas. 195-202 [doi]
- Requirements Management in Students' Software Development ProjectsPekka Mäkiaho, Timo Poranen, Zheying Zhang. 203-210 [doi]
- A System for Website Data Management in a Website Building SystemDimitar Z. Dimitrov. 211-218 [doi]
- Informatics Solutions for Smart Trading on Wholesale Electricity Markets Containing RES BiddersAdela Bara, Simona Vasilica Oprea, Adina Uta, Osman Bulent Tor, Mahmut Erkut Cebeci. 219-225 [doi]
- An Approach for Mammography Image SegmentationMariana Stoeva, Violeta Bozhikova. 226-232 [doi]
- Image Based Steganography Using Modified LSB Insertion Method with Contrast StretchingAntoniya Tasheva, Zhaneta Tasheva, Plamen Nakov. 233-240 [doi]
- CutSurf: a Software Tool for Cut Surface Evaluation of White CheeseAtanaska Bosakova-Ardenska, Hristina Andreeva, Petya Boyanova, Peter Panayotov. 241-248 [doi]
- Real Time GPU Accelerated Radar Scan Conversion and VisualizationVesselin Pezhgorski, Milena Lazarova. 249-256 [doi]
- Mass-spring Cloth Simulation with Shape MatchingTzvetomir I. Vassilev. 257-264 [doi]
- Intelligent PlantingIvan Ivanov, Vasilen Tsvetkov. 265-271 [doi]
- Internet-of-Things Communication Protocol for Low-Cost Devices in Heterogeneous Wireless NetworksSvetozar Ilchev, Zlatoliliya Ilcheva. 272-279 [doi]
- Fuzzy Model of an Intelligent Agent Behaviour and Method of Fire Extinguishing ControlAleksey Senkov, Aleksander Chepikov. 280-287 [doi]
- An Affective Distant Learning Model Using Avatars as User Stand-inLéon J. M. Rothkrantz. 288-295 [doi]
- A Conceptual Model of an Electronic Appendix Called "Nursing file for palliative care", for Training Students from the Speciality of NurseGreta Koleva, Despina Georgieva, Yavor Stefanov. 296-301 [doi]
- Utility and Optimal Usage of ICT in SchoolsValentina Terzieva, Katia Todorova, Yuri Pavlov, Petia Kademova-Katzarova. 302-309 [doi]
- Designing a Virtual Laboratory for Teaching ProgrammingGalya Shivacheva, Veselina Nedeva, Svetoslav Atanasov. 310-317 [doi]
- 3D Augmented Reality Software Solution for Mechanical Engineering EducationYuksel Aliev, Vasil Kozov, Galina Ivanova 0002, Aleksandar Ivanov. 318-325 [doi]
- MATLAB-Based Software Tool for Implementation of Bifid CiphersAdriana Borodzhieva. 326-333 [doi]