Volume 8, Issue 3 (June 2011)
Regular Papers
Building Computers in Serbia: The First Half of the Digital Century
Jelica Protić and Dejan Ristanović
[ view | download | cite ]
Protić, J., Ristanović, D.: Building Computers in Serbia: The First Half of the Digital Century. Computer Science and Information Systems, Vol. 8, No. 3, 549-571. (2011), https://doi.org/DOI: 10.2298/CSIS110505021P
Workflow Specification for Interaction Management between Experts in a Cooperative Remote Diagnosis Process
M.A. Laredj and K. Bouamrane
[ view | download | cite ]
Laredj, M., Bouamrane, K.: Workflow Specification for Interaction Management between Experts in a Cooperative Remote Diagnosis Process. Computer Science and Information Systems, Vol. 8, No. 3, 573-590. (2011), https://doi.org/10.2298/CSIS100326001L
Access Control Framework for XML Document Collections
Goran Sladić, Branko Milosavljević, Zora Konjović and Milan Vidaković
[ view | download | cite ]
Sladić, G., Milosavljević, B., Konjović, Z., Vidaković, M.: Access Control Framework for XML Document Collections. Computer Science and Information Systems, Vol. 8, No. 3, 591-609. (2011), https://doi.org/10.2298/CSIS100827002S
Feature Diagram Formalization Based on Directed Hypergraphs
Miguel A. Laguna, Jose M. Marques and Guillermo Rodrıguez-Cano
[ view | download | cite ]
Laguna, M. A., Marques, J. M., Rodrıguez-Cano, G.: Feature Diagram Formalization Based on Directed Hypergraphs. Computer Science and Information Systems, Vol. 8, No. 3, 611-633. (2011), https://doi.org/10.2298/CSIS100804016L
Integrating Instance-level and Attribute-level Knowledge into Document Clustering
Jinlong Wang, Shunyao Wu, Gang Li and Zhe Wei
[ view | download | cite ]
Wang, J., Wu, S., Li, G., Wei, Z.: Integrating Instance-level and Attribute-level Knowledge into Document Clustering. Computer Science and Information Systems, Vol. 8, No. 3, 635-651. (2011), https://doi.org/10.2298/CSIS100906003W
Papers selected from ISCSCT 2010, September 14–15, 2010, Jiaozuo, China and ISECS 2011, June 24–26, 2011, Shanghai, China
Code Cache Management Based on Working Set in Dynamic Binary Translator
Ruhui Ma, Zhichen Ni, Erzhou Zhu, Kai Chen and Haibing Guan
[ view | download | cite ]
Ma, R., Ni, Z., Zhu, E., Chen, K., Guan, H.: Code Cache Management Based on Working Set in Dynamic Binary Translator. Computer Science and Information Systems, Vol. 8, No. 3, 653-671. (2011), https://doi.org/10.2298/CSIS100327022M
Data Extraction and Annotation Based on Domain-specific Ontology Evolution for Deep Web
Chen Kerui, Zuo Wanli, He Fengling, Chen Yongheng and Wang Ying
[ view | download | cite ]
Kerui, C., Wanli, Z., Fengling, H., Yongheng, C., Ying, W.: Data Extraction and Annotation Based on Domain-specific Ontology Evolution for Deep Web. Computer Science and Information Systems, Vol. 8, No. 3, 673-692. (2011), https://doi.org/10.2298/CSIS101011023K
Extracting Minimal Unsatisfiable Subformulas in Satisfiability Modulo Theories
Jianmin Zhang, Shengyu Shen, Jun Zhang and Sikun Li
[ view | download | cite ]
Zhang, J., Shen, S., Zhang, J., Li, S.: Extracting Minimal Unsatisfiable Subformulas in Satisfiability Modulo Theories. Computer Science and Information Systems, Vol. 8, No. 3, 693-710. (2011), https://doi.org/10.2298/CSIS101019024Z
Indexing Temporal Information for Web Pages
Peiquan Jin, Hong Chen, Xujian Zhao, Xiaowen Li and Lihua Yue
[ view | download | cite ]
Jin, P., Chen, H., Zhao, X., Li, X., Yue, L.: Indexing Temporal Information for Web Pages. Computer Science and Information Systems, Vol. 8, No. 3, 711-737. (2011), https://doi.org/10.2298/CSIS100407025J
Parallel Processing on Block-based Gauss-Jordan Algorithm for Desktop Grid
Yizi SHANG, Guiming LU, Ling SHANG and Guangqian WANG
[ view | download | cite ]
SHANG, Y., LU, G., SHANG, L., WANG, G.: Parallel Processing on Block-based Gauss-Jordan Algorithm for Desktop Grid. Computer Science and Information Systems, Vol. 8, No. 3, 739-759. (2011), https://doi.org/10.2298/CSIS100907026S
Problem Solving by Soaking the Concept Network
Xixu Fu and Hui Wei
[ view | download | cite ]
Fu, X., Wei, H.: Problem Solving by Soaking the Concept Network. Computer Science and Information Systems, Vol. 8, No. 3, 761-778. (2011), https://doi.org/10.2298/CSIS100915027F
Research on Discovering Deep Web Entries
Ying Wang, Huilai Li, Wanli Zuo, Fengling He, Xin Wang and Kerui Chen
[ view | download | cite ]
Wang, Y., Li, H., Zuo, W., He, F., Wang, X., Chen, K.: Research on Discovering Deep Web Entries. Computer Science and Information Systems, Vol. 8, No. 3, 779-799. (2011), https://doi.org/10.2298/CSIS100322028W
Study of Privacy-Preserving Framework for Cloud Storage
Huang RuWei, Gui XiaoLin, Yu Si and Zhuang Wei
[ view | download | cite ]
RuWei, H., XiaoLin, G., Si, Y., Wei, Z.: Study of Privacy-Preserving Framework for Cloud Storage. Computer Science and Information Systems, Vol. 8, No. 3, 801-819. (2011), https://doi.org/10.2298/CSIS100327029R
SVM Based Forest Fire Detection Using Static and Dynamic Features
Jianhui Zhao, Zhong Zhang, Shizhong Han, Chengzhang Qu, Zhiyong Yuan and Dengyi Zhang
[ view | download | cite ]
Zhao, J., Zhang, Z., Han, S., Qu, C., Yuan, Z., Zhang, D.: SVM Based Forest Fire Detection Using Static and Dynamic Features. Computer Science and Information Systems, Vol. 8, No. 3, 821-841. (2011), https://doi.org/10.2298/CSIS101012030Z
The Trustworthiness Analyzing of Interacting Business Process Based on the Induction Information
Xianwen Fang, Changjun Jiang, Zhixiang Yin and Xiaoqin Fan
[ view | download | cite ]
Fang, X., Jiang, C., Yin, Z., Fan, X.: The Trustworthiness Analyzing of Interacting Business Process Based on the Induction Information. Computer Science and Information Systems, Vol. 8, No. 3, 843-867. (2011), https://doi.org/10.2298/CSIS100411031F
Voice Activity Detection Method Based on Multi-valued Coarse-graining Lempel-Ziv Complexity
Huan Zhao, Gangjin Wang, Cheng Xu and Fei Yu
[ view | download | cite ]
Zhao, H., Wang, G., Xu, C., Yu, F.: Voice Activity Detection Method Based on Multi-valued Coarse-graining Lempel-Ziv Complexity. Computer Science and Information Systems, Vol. 8, No. 3, 869-888. (2011), https://doi.org/10.2298/CSIS100906032Z
Worst Case Performance Bounds for Multimedia Flows in QoS-enhanced TNPOSS Network
Ke Xiong and Zhengding Qiu
[ view | download | cite ]
Xiong, K., Qiu, Z.: Worst Case Performance Bounds for Multimedia Flows in QoS-enhanced TNPOSS Network. Computer Science and Information Systems, Vol. 8, No. 3, 889-908. (2011), https://doi.org/10.2298/CSIS101201033X
A Two-Tiered Reliable Application Layer Multicast
Xinchang Zhang, Meihong Yang, Guanggang Geng, Wanming Luo and Xingfeng Li
[ view | download | cite ]
Zhang, X., Yang, M., Geng, G., Luo, W., Li, X.: A Two-Tiered Reliable Application Layer Multicast. Computer Science and Information Systems, Vol. 8, No. 3, 990-929. (2011), https://doi.org/10.2298/CSIS101223034X
Multi-Scale Image Semantic Recognition with Hierarchical Visual Vocabulary
Xinghao Jiang, Tanfeng Sun and GuangLei Fu
[ view | download | cite ]
Jiang, X., Sun, T., Fu, G.: Multi-Scale Image Semantic Recognition with Hierarchical Visual Vocabulary. Computer Science and Information Systems, Vol. 8, No. 3, 931-951. (2011), https://doi.org/10.2298/CSIS100423035J