


default search action
Computing and Informatics, Volume 32
Volume 32, Number 1, 2013
- Periasamy Vivekanandan, M. Rajalakshmi, Raju Nedunchezhian:

An Intelligent Genetic Algorithm for Mining Classification Rules in Large Datasets. 1-22 - Peng Zhang, Wenbo Zhao, Daming Zhu:

Complexity and Approximation Results for the Min-Sum and Min-Max Disjoint Paths Problems. 23-45 - Yongfeng Huang, Shanyu Tang, Wanxia Yang:

An Information- Theoretical Model for Streaming Media Based Stegosystems. 47-62 - Yanyun Tao, Minglu Li, Jian Cao:

A New Dynamic Population Variation in Genetic Programming. 63-87 - Jiuchuan Jiang, Yungui Zhang:

A Social Force Model for Adjusting Sensing Ranges in Multiple Sensing Agent Systems. 89-112 - Manuel Aurelio Rodriguez Pascual, Rafael Mayo García, Ignacio Martín Llorente:

Montera: A Framework for Efficient Execution of Monte Carlo Codes on Grid Infrastructures. 113-144 - Igor Santos, Xabier Ugarte-Pedrero, Felix Brezo, Pablo García Bringas, José María Gómez Hidalgo:

NOA: An Information Retrieval Based Malware Detection System. 145-174 - Nathalie Cindy Kuicheu, Ning Wang, Gile Narcisse Fanzou Tchuissang, De Xu, Guojun Dai, François Siewe:

Managing Uncertain Mediated Schema and Semantic Mappings Automatically in Dataspace Support Platforms. 175-202 - Vijay Kumar, Arun Sharma, Rajesh Kumar:

Applying Soft Computing Approaches to Predict Defect Density in Software Product Releases: An Empirical Study. 203-224
Volume 32, Number 2, 2013
- César A. L. de Oliveira, Natália Cabral Silva, Cecília Leite Sabat, Ricardo Massa Ferreira Lima:

Reducing the Gap Between Business and Information Systems Through Complex Event Processing. 225-250 - Roland Dobai, Marcel Baláz:

Compressed Skewed-Load Delay Test Generation Based on Evolution and Deterministic Initialization of Populations. 251-272 - Santiago Iturriaga, Sergio Nesmachnow, Bernabé Dorronsoro, Pascal Bouvry

:
Energy Efficient Scheduling in Heterogeneous Systems with a Parallel Multiobjective Local Search. 273-294 - Jianhua Sun, Hao Chen, Cheng Chang, Xingbang Li:

Kernel Code Integrity Protection Based on a Virtualized Memory Architecture. 295-311 - Mihai Talmaciu, Elena Nechita, Barna Iantovics:

Recognition and Combinatorial Optimization Algorithms for Bipartite Chain Graphs. 313-329 - Anna Nepomniaschaya:

Efficient Parallel Implementation of the Ramalingam Decremental Algorithm for Updating the Shortest Paths Subgraph. 331-354 - Peter Butka, Jozef Pócs:

Generalization of One-Sided Concept Lattices. 355-370 - Abdunabi Ubul, El-Sayed Atlam, Hiroya Kitagawa, Masao Fuketa, Kazuhiro Morita, Jun-ichi Aoe:

An Efficient Method of Summarizing Documents Using Impression Measurements. 371-391 - Doina Tatar, Diana Inkpen, Gabriela Czibula:

Text Segmentation Using Roget-Based Weighted Lexical Chains. 393-410 - Tanakorn Wichaiwong, Chuleerat Jaruskulchai:

A Double Scoring Method for XML Element Retrieval. 411-440
Volume 32, Number 3, 2013
- Liaojun Pang, Huixian Li:

nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness. 441-460 - Binh Minh Nguyen, Viet D. Tran, Ladislav Hluchý:

A Generic Development and Deployment Framework for Cloud Computing and Distributed Applications. 461-485 - Teréz Anna Várkonyi:

Robust Fixed Point Transformations-based Control of Chaotic Systems. 487-507 - Anita Sabo, Bojan Kuljic, Tibor Szakáll:

Educational Tools for Object-Oriented DSP Interactive DSL Framework. 509-526 - Mohammad Hussain:

Efficient Decimation of Polygonal Models Using Normal Field Deviation. 527-547 - Majid Ghayoori, Mostafa S. Haghjoo:

A Model to Overcome Integrity Challenges of an Untrusted DSMS Server. 549-571 - Cristian Vidal Silva, Rodrigo Saens, Carolina Del Río, Rodolfo Villarroel:

Aspect-Oriented Modeling: Applying Aspect-Oriented UML Use Cases and Extending Aspect-Z. 573-593 - Jack Mario Mingo, Ricardo Aler, Darío Maravall, Javier de Lope Asiaín:

Investigations into Lamarckism, Baldwinism and Local Search in Grammatical Evolution Guided by Reinforcement. 595-627 - Boban Vesin, Aleksandra Klasnja-Milicevic, Mirjana Ivanovic, Zoran Budimac:

Applying Recommender Systems and Adaptive Hypermedia for e-Learning Personalizatio. 629-659
Volume 32, Number 4, 2013
- Verena Christina Horak, Tobias Berka, Marián Vajtersic:

Parallel Classification with Two-Stage Bagging Classifiers. 661-677 - Jongwan Kim, Dukshin Oh, Keecheon Kim:

QMBRi: Inverse quantization of minimum bounding rectangles for spatial data compression. 679-696 - Kashif Zafar, Abdul Rauf Baig:

Multiple Route Generation Using Simulated Niche Based Particle Swarm Optimization. 697-721 - Jin Li, Xiaofeng Chen:

Efficient Multi-User Keyword Search over Encrypted Data in Cloud Computing. 723-738 - Radu Iosif, Adam Rogalewicz:

Automata-Based Termination Proofs. 739-775 - Sandra García-Rodríguez, David Quintana, Inés María Galván, Pedro Isasi:

Multiobjective Algorithms with Resampling for Portfolio Optimization. 777-796 - Mahdi Rahimi Naddaf, Vahid Rafe:

Performance Modeling and Analysis of Software Architectures Specified Through Graph Transformations. 797-826 - Ying Pan, Yong Tang:

Pay-As-You-Go Software Artifacts Managemen. 827-843 - Zsolt Csaba Johanyák:

Fuzzy Modeling of Thermoplastic Composites' Melt Volume Rate. 845-857 - Pawel Russek, Kazimierz Wiatr:

The Enhancement of a Computer System for Sorting Capabilities Using FPGA Custom Architecture. 859-876 - Lujiang Zhang, Xiaohui Hu:

Word Combination Kernel for Text Classification with Support Vector Machines. 877-896
Volume 32, Number 5, 2013
- Chouvalit Khancome, Veera Boonjing:

A New Linear-Time Dynamic Dictionary Matching Algorithm. 897-923 - Xiaowang Zhang, Zuoquan Lin:

An Approach to Generating Arguments over DL-Lite Ontologies. 924-948 - Frantisek Darena, Jan Zizka:

Approaches to samples selection for machine learning based classification of textual data. 949-967 - Zhijun Ding, Jiegi Liu, Junli Wang, Fang Wang:

An Executable Service Composition Code Automatic Creation Tool Based on Petri Net Model. 968-986 - Xiaofeng Ding, Hai Jin, Hui Xu, Wei Song:

Probabilistic Skyline Queries over Uncertain Moving Objects. 987-1012 - Puniethaa Prabhu, Karuppusamy Duraiswamy:

An Efficient Visual Analysis Method for Cluster Tendency Evaluation, Data Partitioning and Internal Cluster Validation. 1013-1037 - Daniela Sturczová, Petr Rapant:

Enhanced Methodology for Ontology Development. 1038-1054 - Bartlomiej Sniezynski:

Agent Strategy Generation by Rule Induction. 1055-1078 - Karam Gouda, Mosab Hassaan:

Efficiently Using Prime-Encoding for Mining Frequent Itemsets in Sparse Data. 1079-1099 - Piotr Dziubecki, Piotr Grabowski, Michal Krysinski, Tomasz Kuczynski, Krzysztof Kurowski, Tomasz Piontek, Dawid Szejnfeld:

New Science Gateways for Advanced Computing Simulations and Visualization Using Vine Toolkit in PL-Grid. 1100-1115
Volume 32, Number 6, 2013
- Dániel Stojcsics, András Molnár:

Autonomous Takeoff and Landing Control for Small Size Unmanned Aerial Vehicles. 1117-1130 - Marek Bundzel, Tomás Kasanický, Richard Pincak:

Experimental Analysis of the Prediction Model Based on String Invariants. 1131-1146 - Antonio J. Alencar, Carlos A. S. Franco, Eber A. Schmitz, Alexandre L. Correa:

A Statistical Approach for the Maximization of the Financial Benefits Yielded by a Large Set of MMFs and AEs. 1147-1169 - Lamiaa Fattouh Ibrahim, Hesham Abou El Fetouh Salman:

Applying Clustering Techniques in Hybrid Network in the Presence of 2D and 3D Obstacles. 1170-1191 - Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Kangbin Yim:

Database Security System for Applying Sophisticated Access Control via Database Firewall Server. 1192-1211 - Bon-Woo Hwang, Seung-Jun Kwon, Sang-Woong Lee:

Facial Image Reconstruction from a Corrupted Image by Support Vector Data Description. 1212-1228 - Xiaoqian Li, Huachun Zhou, Hongbin Luo, Hongke Zhang, Feng Qiu, Ilsun You:

HMS: A Hierarchical Mapping System for the Locator/ID Separation Network. 1229-1255 - AndrzejOlszewski Olszewski, Marcin Wolter:

A Needle in the Haystack: Higgs Boson Searches in the ATLAS Experiment. 1256-1271 - Agnieszka Dabrowska-Boruch, Grzegorz Gancarczyk, Kazimierz Wiatr:

Implementation of a RANLUX Based Pseudo-Random Number Generator in FPGA Using VHDL and Impulse C. 1272-1292 - Junwei Lei, Hongchao Zhao, Jinyong Yu, Zuoe Fan, Heng Li, Kehua Li:

Research on Tracking and Synchronization of Uncertain Chaotic Systems. 1293-1311 - Kristián Valentín, Michal Malý:

Network Firewall using Artificial Neural Networks. 1312-1327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














