Volume 11, Issue 2 (June 2014)

Editorials

Editorial

Guest editorial: Contemporary ICT Research Trends Emerging from South-East Europe

Guest editorial: Computational Intelligence in Business Administration

Regular Papers


[ view | download | cite ]
Castela, N., Dias, P., Zacarias, M., Tribolet, J.: Collaborative Method to Maintain Business Process Models Updated. Computer Science and Information Systems, Vol. 11, No. 2, 461–480. (2014), https://doi.org/10.2298/CSIS130117031C


[ view | download | cite ]
Borges, C. R., Macías, J. A.: Facilitating the Interaction with Data Warehouse Schemas through a Visual Web-Based Approach. Computer Science and Information Systems, Vol. 11, No. 2, 481-501. (2014), https://doi.org/10.2298/CSIS131130032B


[ view | download | cite ]
Macek, O., Richta, K.: Application and Relational Database Co-Refactoring. Computer Science and Information Systems, Vol. 11, No. 2, 503–524. (2014), https://doi.org/10.2298/CSIS130610033M


[ view | download | cite ]
Drosatos, G., Efraimidis, P. S.: User-Centric Privacy-Preserving Statistical Analysis of Ubiquitous Health Monitoring Data?. Computer Science and Information Systems, Vol. 11, No. 2, 525–548. (2014), https://doi.org/10.2298/CSIS130120022D


[ view | download | cite ]
Szilagyi, P.: Iris: A decentralized approach to backend messaging middlewares. Computer Science and Information Systems, Vol. 11, No. 2, 549–567. (2014), https://doi.org/10.2298/CSIS130823024S


[ view | download | cite ]
Krneta, D., Jovanović, V., Marjanović, Z.: A Direct Approach to Physical Data Vault Design. Computer Science and Information Systems, Vol. 11, No. 2, 569–599. (2014), https://doi.org/10.2298/CSIS130523034K


[ view | download | cite ]
Abuadlla, Y., Kvascev, G., Gajin, S., Jovanovic, Z.: Flow-Based Anomaly Intrusion Detection System Using Two Neural Network Stages. Computer Science and Information Systems, Vol. 11, No. 2, 601-622. (2014), https://doi.org/10.2298/CSIS130415035A


[ view | download | cite ]
Alatrish, E. S., Tošić, D., Milenković, N.: Building ontologies for different natural languages. Computer Science and Information Systems, Vol. 11, No. 2, 623–644. (2014), https://doi.org/10.2298/CSIS130429023A


[ view | download | cite ]
Pavlič, L., Podgorelec, V., Heričko, M.: A Question-Based Design Pattern Advisement Approach. Computer Science and Information Systems, Vol. 11, No. 2, 645–664. (2014), https://doi.org/10.2298/CSIS130824025P

Special Section: Contemporary ICT Research Trends Emerging from South-East Europe


[ view | download | cite ]
Ougiaroglou, S., Evangelidis, G.: Efficient data abstraction using weighted IB2 prototypes. Computer Science and Information Systems, Vol. 11, No. 2, 665–678. (2014), https://doi.org/10.2298/CSIS140212036O


[ view | download | cite ]
Ristic, S., Aleksic, S., Celikovic, M., Lukovic, I.: Generic and Standard Database Constraint Meta-Models. Computer Science and Information Systems, Vol. 11, No. 2, 679–696. (2014), https://doi.org/10.2298/CSIS140216037R


[ view | download | cite ]
Badica, C., Bassiliades, N., Ilie, S., Kravari, K.: Agent Reasoning on the Web using Web Services. Computer Science and Information Systems, Vol. 11, No. 2, 697–721. (2014), https://doi.org/10.2298/CSIS140301038B


[ view | download | cite ]
Christinaki, E., Vidakis, N., Triantafyllidis, G.: A Novel Educational Game for teaching Emotion Identification Skills to Preschoolers with Autism Diagnosis. Computer Science and Information Systems, Vol. 11, No. 2, 723–743. (2014), https://doi.org/10.2298/CSIS140215039C


[ view | download | cite ]
Karapiperis, D., Verykios, V. S.: A Distributed Near-Optimal LSH-based Framework for Privacy-Preserving Record Linkage. Computer Science and Information Systems, Vol. 11, No. 2, 745–763. (2014), https://doi.org/10.2298/CSIS140215040K

Special Section: Computational Intelligence in Business Administration


[ view | download | cite ]
Rojas-Mora, J., Gil-Lafuente, J.: An asymmetric index to compare trapezoidal fuzzy numbers. Computer Science and Information Systems, Vol. 11, No. 2, 765–778. (2014), https://doi.org/10.2298/CSIS121212041R


[ view | download | cite ]
Gil-Lafuente, A. M., Klimova, A.: Approximation to the Theory of Affinities to Manage the Problems of the Grouping Process. Computer Science and Information Systems, Vol. 11, No. 2, 779–796. (2014), https://doi.org/10.2298/CSIS130125042G


[ view | download | cite ]
Xu, Y., Llopis-Albert, C., González, J.: An application of Structural Equation Modeling for Continuous Improvement. Computer Science and Information Systems, Vol. 11, No. 2, 797–808. (2014), https://doi.org/10.2298/CSIS130113043X


[ view | download | cite ]
Edelhauser, E., Ionică, A.: A Business Intelligence Software Made in Romania: A Solution for Romanian Companies During the Economic Crisis. Computer Science and Information Systems, Vol. 11, No. 2, 809–823. (2014), https://doi.org/10.2298/CSIS121207044E


[ view | download | cite ]
Andrés-Sánchez, J. d.: Fuzzy Claim Reserving In Non-Life Insurance. Computer Science and Information Systems, Vol. 11, No. 2, 825–838. (2014), https://doi.org/10.2298/CSIS121225045A


[ view | download | cite ]
Shouzhen, Z., Qifeng, W., Merigó, J. M., Tiejun, P.: Induced intuitionistic fuzzy ordered weighted averaging - weighted average operator and its application to business decision-making. Computer Science and Information Systems, Vol. 11, No. 2, 839–857. (2014), https://doi.org/10.2298/CSIS130109046S


[ view | download | cite ]
Terceño, A., Barberà-Mariné, M. G., Vigier, H., Laumann, Y.: Stability of Beta Coefficients of Sector and Subsector Portfolios in an Uncertain Environment. Computer Science and Information Systems, Vol. 11, No. 2, 859–880. (2014), https://doi.org/10.2298/CSIS121222047T


[ view | download | cite ]
Georgescu, V.: Joint Propagation of Ontological and Epistemic Uncertainty across Risk Assessment and Fuzzy Time Series Models. Computer Science and Information Systems, Vol. 11, No. 2, 881–904. (2014), https://doi.org/10.2298/CSIS121215048G