Volume 12, Issue 2 (June 2015)
Guest Editorial: Advances in Systems, Modeling and Languages
Guest Editorial: Advances in Information Technology
Regular papers
A Lane-Changing Behavioral Preferences Learning Agent with its Applications
Wang Jian, Cai Baigen, Liu Jiang and Shangguan Wei
[ view | download | cite ]
Jian, W., Baigen, C., Jiang, L., Wei, S.: A Lane-Changing Behavioral Preferences Learning Agent with its Applications. Computer Science and Information Systems, Vol. 12, No. 2, 349–374. (2015), https://doi.org/10.2298/CSIS141229016J
Model-Driven Java Code Refactoring
Sohaib Hamioud and Fadila Atil
[ view | download | cite ]
Hamioud, S., Atil, F.: Model-Driven Java Code Refactoring. Computer Science and Information Systems, Vol. 12, No. 2, 375-403. (2015), https://doi.org/10.2298/CSIS141025015H
Edge-texture 2D image quality metrics suitable for evaluation of image interpolation algorithms
Sanja Maksimović-Moićević, Željko Lukač and Miodrag Temerinac
[ view | download | cite ]
Maksimović-Moićević, S., Lukač, Ž., Temerinac, M.: Edge-texture 2D image quality metrics suitable for evaluation of image interpolation algorithms. Computer Science and Information Systems, Vol. 12, No. 2, 405-425. (2015), https://doi.org/10.2298/CSIS140402003M
Optimization Design of Traffic Flow under Security Based on Cellular Automata Model
Fan Zhang, Zhike Han, Hanyu Ge and Yingping Zhu
[ view | download | cite ]
Zhang, F., Han, Z., Ge, H., Zhu, Y.: Optimization Design of Traffic Flow under Security Based on Cellular Automata Model. Computer Science and Information Systems, Vol. 12, No. 2, 427-443. (2015), https://doi.org/10.2298/CSIS141228008Z
Adaptive Mobile Visualization – The Chameleon Framework
Paulo Pombinho, Maria Beatriz Carmo and Ana Paula Afonso
[ view | download | cite ]
Pombinho, P., Carmo, M. B., Afonso, A. P.: Adaptive Mobile Visualization – The Chameleon Framework. Computer Science and Information Systems, Vol. 12, No. 2, 445-464. (2015), https://doi.org/10.2298/CSIS140607004P
k-Best Max-margin Approaches for Sequence Labeling
Dejan Mančev and Branimir Todorović
[ view | download | cite ]
Mančev, D., Todorović, B.: k-Best Max-margin Approaches for Sequence Labeling. Computer Science and Information Systems, Vol. 12, No. 2, 465-486. (2015), https://doi.org/10.2298/CSIS140713014M
EUR/RSD Exchange Rate Forecasting Using Hybrid Wavelet-Neural Model: A CASE STUDY
Jovana Bozic and Djordje Babic
[ view | download | cite ]
Bozic, J., Babic, D.: EUR/RSD Exchange Rate Forecasting Using Hybrid Wavelet-Neural Model: A CASE STUDY. Computer Science and Information Systems, Vol. 12, No. 2, 487-508. (2015), https://doi.org/10.2298/CSIS140728005B
Business Process Model and Notation: The Current State of Affairs
Mateja Kocbek, Gregor Jošt, Marjan Heričko and Gregor Polančič
[ view | download | cite ]
Kocbek, M., Jošt, G., Heričko, M., Polančič, G.: Business Process Model and Notation: The Current State of Affairs. Computer Science and Information Systems, Vol. 12, No. 2, 509-539. (2015), https://doi.org/10.2298/CSIS140610006K
An MDA approach for developing Secure OLAP applications: metamodels and transformations
Carlos Blanco, Ignacio García-Rodríguez de Guzmán, Eduardo Fernández-Medina and Juan Trujillo
[ view | download | cite ]
Blanco, C., Guzmán, I. G. d., Fernández-Medina, E., Trujillo, J.: An MDA approach for developing Secure OLAP applications: metamodels and transformations. Computer Science and Information Systems, Vol. 12, No. 2, 541-565. (2015), https://doi.org/10.2298/CSIS140617007B
Special Section on Advances in Systems, Modeling and Languages
Fuzzified Risk Management: Selection of Safeguards to Minimize the Maximum Risk
Eloy Vicente, Alfonso Mateos and Antonio Jiménez-Martín
[ view | download | cite ]
Vicente, E., Mateos, A., Jiménez-Martín, A.: Fuzzified Risk Management: Selection of Safeguards to Minimize the Maximum Risk. Computer Science and Information Systems, Vol. 12, No. 2, 567-585. (2015), https://doi.org/10.2298/CSIS140925017V
Statistical User Behavior Detection and QoE Evaluation for Thin Client Services
Mirko Suznjevic, Lea Skorin-Kapov and Iztok Humar
[ view | download | cite ]
Suznjevic, M., Skorin-Kapov, L., Humar, I.: Statistical User Behavior Detection and QoE Evaluation for Thin Client Services. Computer Science and Information Systems, Vol. 12, No. 2, 587-605. (2015), https://doi.org/10.2298/CSIS140810018S
Towards an engine for coordination-based architectural reconfigurations
Flávio Rodrigues, Nuno Oliveira and Luís S. Barbosa
[ view | download | cite ]
Rodrigues, F., Oliveira, N., Barbosa, L. S.: Towards an engine for coordination-based architectural reconfigurations. Computer Science and Information Systems, Vol. 12, No. 2, 607-634. (2015), https://doi.org/10.2298/CSIS140912019R
Tuning a Semantic Relatedness Algorithm using a Multiscale Approach
José Paulo Leal and Teresa Costa
[ view | download | cite ]
Leal, J. P., Costa, T.: Tuning a Semantic Relatedness Algorithm using a Multiscale Approach. Computer Science and Information Systems, Vol. 12, No. 2, 635-654. (2015), https://doi.org/10.2298/CSIS140905020L
On Distributed Concern Delivery in User Interface Design
Tomas Cerny, Miroslav Macik, Michael J. Donahoo and Jan Janousek
[ view | download | cite ]
Cerny, T., Macik, M., Donahoo, M. J., Janousek, J.: On Distributed Concern Delivery in User Interface Design. Computer Science and Information Systems, Vol. 12, No. 2, 655-681. (2015), https://doi.org/10.2298/CSIS141202021C
Teaching Pragmatic Model-Driven Software Development
Jaroslav Porubän, Michaela Bačíková, Sergej Chodarev and Milan Nosál’
[ view | download | cite ]
Porubän, J., Bačíková, M., Chodarev, S., Nosál’, M.: Teaching Pragmatic Model-Driven Software Development. Computer Science and Information Systems, Vol. 12, No. 2, 683-705. (2015), https://doi.org/10.2298/CSIS140107022P
Model-Driven Acceptance Test Automation Based on Use Cases
Tomasz Straszak and Michał Śmiałek
[ view | download | cite ]
Straszak, T., Śmiałek, M.: Model-Driven Acceptance Test Automation Based on Use Cases. Computer Science and Information Systems, Vol. 12, No. 2, 707-728. (2015), https://doi.org/10.2298/CSIS141217033S
Special Section on Advances in Information Technology
VANET Middleware for Service Sharing based on OSGi
Juan Luo, Qiu Pan and Zanyi He
[ view | download | cite ]
Luo, J., Pan, Q., He, Z.: VANET Middleware for Service Sharing based on OSGi. Computer Science and Information Systems, Vol. 12, No. 2, 729–742. (2015), https://doi.org/10.2298/CSIS141012023L
A Meta-Modeling Framework for a Specific Social Domain: Public Opinion Event
Zongchen Fan, Xiaogang Qiu, Weihui Dai, Yuanzheng Ge, Liang Liu and Yunsuo Duan
[ view | download | cite ]
Fan, Z., Qiu, X., Dai, W., Ge, Y., Liu, L., Duan, Y.: A Meta-Modeling Framework for a Specific Social Domain: Public Opinion Event. Computer Science and Information Systems, Vol. 12, No. 2, 743–763. (2015), https://doi.org/10.2298/CSIS140927024F
Dynamic Load Balancing Technology for Cloud-oriented CDN
Hui He, Yana Feng, Zhigang Li, Zhenguang Zhu, Weizhe Zhang and Albert Cheng
[ view | download | cite ]
He, H., Feng, Y., Li, Z., Zhu, Z., Zhang, W., Cheng, A.: Dynamic Load Balancing Technology for Cloud-oriented CDN. Computer Science and Information Systems, Vol. 12, No. 2, 765–786. (2015), https://doi.org/10.2298/CSIS141104025H
Human-level Moving Object Recognition from Traffic Video
Fei Zhu, Quan Liu, Shan Zhong and Yang Yang
[ view | download | cite ]
Zhu, F., Liu, Q., Zhong, S., Yang, Y.: Human-level Moving Object Recognition from Traffic Video. Computer Science and Information Systems, Vol. 12, No. 2, 787–799. (2015), https://doi.org/10.2298/CSIS141114026Z
Multimedia Congestion Control in Wireless Sensor Networks
Kyoungsoo Bok, Eunkyung Ryu, Junho Park, Jaijin Jung and Jaesoo Yoo
[ view | download | cite ]
Bok, K., Ryu, E., Park, J., Jung, J., Yoo, J.: Multimedia Congestion Control in Wireless Sensor Networks. Computer Science and Information Systems, Vol. 12, No. 2, 801–821. (2015), https://doi.org/10.2298/CSIS141009027B
TDCM: An IP Watermarking Algorithm based on Two Dimensional Chaotic Mapping
Wei Liang, Keshou Wu, Yong Xie and Jiajun Duan
[ view | download | cite ]
Liang, W., Wu, K., Xie, Y., Duan, J.: TDCM: An IP Watermarking Algorithm based on Two Dimensional Chaotic Mapping. Computer Science and Information Systems, Vol. 12, No. 2, 823–841. (2015), https://doi.org/10.2298/CSIS141017028L
Detecting Overlapping Community in Complex Network Based on Node Similarity
Zuo Chen, Mengyuan Jia, Bing Yang and Xiaodong Li
[ view | download | cite ]
Chen, Z., Jia, M., Yang, B., Li, X.: Detecting Overlapping Community in Complex Network Based on Node Similarity. Computer Science and Information Systems, Vol. 12, No. 2, 843–855. (2015), https://doi.org/10.2298/CSIS141021029C
On the Security Enhancement of Integrated Electronic Patient Records Information Systems
Muhammad Khurram Khan, Ankita Chaturvedi, Dheerendra Mishra and Saru Kumari
[ view | download | cite ]
Khan, M. K., Chaturvedi, A., Mishra, D., Kumari, S.: On the Security Enhancement of Integrated Electronic Patient Records Information Systems. Computer Science and Information Systems, Vol. 12, No. 2, 857–872. (2015), https://doi.org/10.2298/CSIS141029030K
A Image Segmentation Algorithm Based on Differential Evolution Particle Swarm Optimization Fuzzy C-Means Clustering
Jiansheng Liu and Shangping Qiao
[ view | download | cite ]
Liu, J., Qiao, S.: A Image Segmentation Algorithm Based on Differential Evolution Particle Swarm Optimization Fuzzy C-Means Clustering. Computer Science and Information Systems, Vol. 12, No. 2, 873–893. (2015), https://doi.org/10.2298/CSIS141108031L
A Connectivity Monitoring Model of Opportunistic Sensor Network Based on Evolving Graph
Jian Shu, Shandong Jiang, Qun Liu, Linlan Liu and Xiaotian Geng
[ view | download | cite ]
Shu, J., Jiang, S., Liu, Q., Liu, L., Geng, X.: A Connectivity Monitoring Model of Opportunistic Sensor Network Based on Evolving Graph. Computer Science and Information Systems, Vol. 12, No. 2, 895–909. (2015), https://doi.org/10.2298/CSIS141023032S