Volume 13, Issue 2 (June 2016)
Guest Editorial: Special Section: Advances in Information Technology
Papers
Extending identity management system with multimodal biometric authentication
Bojan Jovanović, Ivan Milenković, Marija Bogićević and Dejan Simić
[ view | download | cite ]
Jovanović, B., Milenković, I., Bogićević, M., Simić, D.: Extending identity management system with multimodal biometric authentication. Computer Science and Information Systems, Vol. 13, No. 2, 313–334. (2016), https://doi.org/10.2298/CSIS141030003J
Multifaceted Service Identification: Process, Requirement and Data
Mohammad Javad Amiri, Saeed Parsa and Amir Mohammadzade Lajevardi
[ view | download | cite ]
Amiri, M. J., Parsa, S., Lajevardi, A. M.: Multifaceted Service Identification: Process, Requirement and Data. Computer Science and Information Systems, Vol. 13, No. 2, 335–358. (2016), https://doi.org/10.2298/CSIS151105011A
Cross-Domain Item Recommendation Based on User Similarity
Zhenzhen Xu, Huizhen Jiang, Xiangjie Kong, Jialiang Kang, Wei Wang and Feng Xia
[ view | download | cite ]
Xu, Z., Jiang, H., Kong, X., Kang, J., Wang, W., Xia, F.: Cross-Domain Item Recommendation Based on User Similarity. Computer Science and Information Systems, Vol. 13, No. 2, 359–373. (2016), https://doi.org/10.2298/CSIS150730007Z
Intelligent SSD: A turbo for big data mining
Duck-Ho Bae, Jin-Hyung Kim, Yong-Yeon Jo, Sang-Wook Kim, Hyunok Oh and Chanik Park
[ view | download | cite ]
Bae, D., Kim, J., Jo, Y., Kim, S., Oh, H., Park, C.: Intelligent SSD: A turbo for big data mining. Computer Science and Information Systems, Vol. 13, No. 2, 375–394. (2016), https://doi.org/10.2298/CSIS150820008D
CESARSC: Framework for creating Cultural Entertainment Systems with Augmented Reality in Smart Cities
Ángel García-Crespo, Israel González-Carrasco, José L. López-Cuadrado, Daniel Villanueva and Álvaro González
[ view | download | cite ]
García-Crespo, Á., González-Carrasco, I., López-Cuadrado, J. L., Villanueva, D., González, Á.: CESARSC: Framework for creating Cultural Entertainment Systems with Augmented Reality in Smart Cities. Computer Science and Information Systems, Vol. 13, No. 2, 395–425. (2016), https://doi.org/10.2298/CSIS150620006G
Development of Middleware Architecture to Realize Context-Aware Service in Smart Home Environment
Hyun-Wook Kim, M. Robiul Hoque, Hyungyu Seo and Sung-Hyun Yang
[ view | download | cite ]
Kim, H., Hoque, M. R., Seo, H., Yang, S.: Development of Middleware Architecture to Realize Context-Aware Service in Smart Home Environment. Computer Science and Information Systems, Vol. 13, No. 2, 427–452. (2016), https://doi.org/10.2298/CSIS150701010H
Modeling Dynamical Systems with Data Stream Mining
Aljaž Osojnik, Panče Panov and Sašo Džeroski
[ view | download | cite ]
Osojnik, A., Panov, P., Džeroski, S.: Modeling Dynamical Systems with Data Stream Mining. Computer Science and Information Systems, Vol. 13, No. 2, 453–473. (2016), https://doi.org/10.2298/CSIS150518009O
Adaptive TDMA Scheduling for Real-Time Flows in Cluster-BasedWireless Sensor Networks
Gohar Ali, Kyong Hoon Kim and Ki-Il Kim
[ view | download | cite ]
Ali, G., Kim, K. H., Kim, K.: Adaptive TDMA Scheduling for Real-Time Flows in Cluster-BasedWireless Sensor Networks. Computer Science and Information Systems, Vol. 13, No. 2, 475–492. (2016), https://doi.org/10.2298/CSIS150401005G
Ontology-based generated learning objects for mobile language learning
Miloš Milutinović, Živko Bojović, Aleksandra Labus, Zorica Bogdanović and Marijana Despotović-Zrakić
[ view | download | cite ]
Milutinović, M., Bojović, Ž., Labus, A., Bogdanović, Z., Despotović-Zrakić, M.: Ontology-based generated learning objects for mobile language learning. Computer Science and Information Systems, Vol. 13, No. 2, 493–514. (2016), https://doi.org/10.2298/CSIS141030004M
Special Section: Advances in Information Technology
Improved Community Mining Method Based on LFM and EAGLE
Min Wang, Shenggang Yang and Liyuan Wu
[ view | download | cite ]
Wang, M., Yang, S., Wu, L.: Improved Community Mining Method Based on LFM and EAGLE. Computer Science and Information Systems, Vol. 13, No. 2, 515–530. (2016), https://doi.org/10.2298/CSIS160217012W
Fast Multicast Scheme with Secure Network Coding in Cloud Data Centers
Kaixiang Huang, Yue Chen, Hongyong Jia, Julong Lan, Xincheng Yan and Zhiwei Wang
[ view | download | cite ]
Huang, K., Chen, Y., Jia, H., Lan, J., Yan, X., Wang, Z.: Fast Multicast Scheme with Secure Network Coding in Cloud Data Centers. Computer Science and Information Systems, Vol. 13, No. 2, 531–545. (2016), https://doi.org/10.2298/CSIS160222013H
Reliability-Based Controller Placement Algorithm in Software Defined Networking
Jiang Liu, Juan Liu and Renchao Xie
[ view | download | cite ]
Liu, J., Liu, J., Xie, R.: Reliability-Based Controller Placement Algorithm in Software Defined Networking. Computer Science and Information Systems, Vol. 13, No. 2, 547–560. (2016), https://doi.org/10.2298/CSIS160225014L
Learn to Human-level Control in Dynamic Environment Using Incremental Batch Interrupting Temporal Abstraction
Yuchen Fu, Zhipeng Xu, Fei Zhu, Quan Liu and Xiaoke Zhou
[ view | download | cite ]
Fu, Y., Xu, Z., Zhu, F., Liu, Q., Zhou, X.: Learn to Human-level Control in Dynamic Environment Using Incremental Batch Interrupting Temporal Abstraction. Computer Science and Information Systems, Vol. 13, No. 2, 561–577. (2016), https://doi.org/10.2298/CSIS160210015F
Design of Online Double Auction Mechanism for Aging Sensitive Commodity
Xiaolong Ma, Yonghui Dai, Ziyi Wang and Lanjuan Liu
[ view | download | cite ]
Ma, X., Dai, Y., Wang, Z., Liu, L.: Design of Online Double Auction Mechanism for Aging Sensitive Commodity. Computer Science and Information Systems, Vol. 13, No. 2, 579–592. (2016), https://doi.org/10.2298/CSIS160212016M
Routing Optimization for Server-Centric Data Center Networks
Huanzhao Wang, Kun Qian, ChengChen Hu, Che Zhang and Yadong Zhou
[ view | download | cite ]
Wang, H., Qian, K., Hu, C., Zhang, C., Zhou, Y.: Routing Optimization for Server-Centric Data Center Networks. Computer Science and Information Systems, Vol. 13, No. 2, 593–608. (2016), https://doi.org/10.2298/CSIS160228017W
A Robust Low-overhead Watermarking for Field Authentication of Intellectual Property Cores
Jing Long, Dafang Zhang, Chen Zuo, Jiajun Duan and Weihong Huang
[ view | download | cite ]
Long, J., Zhang, D., Zuo, C., Duan, J., Huang, W.: A Robust Low-overhead Watermarking for Field Authentication of Intellectual Property Cores. Computer Science and Information Systems, Vol. 13, No. 2, 609–622. (2016), https://doi.org/10.2298/CSIS160210018L
A Two-step MF Signal Acquisition Method for Wireless Underground Sensor Networks
Wei Liang, Yong Xie, Xuhui Chen, Osama Hosam and Xiaoyan Chen
[ view | download | cite ]
Liang, W., Xie, Y., Chen, X., Hosam, O., Chen, X.: A Two-step MF Signal Acquisition Method for Wireless Underground Sensor Networks. Computer Science and Information Systems, Vol. 13, No. 2, 623–638. (2016), https://doi.org/10.2298/CSIS160224019L
A Mechanism Achieving Low Latency for Wireless Datacenter Applications
Tao Huang, Jiao Zhang and Yunjie Liu
[ view | download | cite ]
Huang, T., Zhang, J., Liu, Y.: A Mechanism Achieving Low Latency for Wireless Datacenter Applications. Computer Science and Information Systems, Vol. 13, No. 2, 639–658. (2016), https://doi.org/10.2298/CSIS160301020H
An Anomaly Detection on the Application-Layer-Based QoS in the Cloud Storage System
Dezhi Han, Kun Bi, Bolin Xie, Lili Huang and Ruijun Wang
[ view | download | cite ]
Han, D., Bi, K., Xie, B., Huang, L., Wang, R.: An Anomaly Detection on the Application-Layer-Based QoS in the Cloud Storage System. Computer Science and Information Systems, Vol. 13, No. 2, 659–676. (2016), https://doi.org/10.2298/CSIS160201021H
K Maximum Probability Attack Paths Dynamic Generation Algorithm
Kun Bi, Dezhi Han and Jun Wang
[ view | download | cite ]
Bi, K., Han, D., Wang, J.: K Maximum Probability Attack Paths Dynamic Generation Algorithm. Computer Science and Information Systems, Vol. 13, No. 2, 677–689. (2016), https://doi.org/10.2298/CSIS160227022B
Performance Analyses of Recurrent Neural Network Models Exploited for Online Time-Varying Nonlinear Optimization
Mei Liu, Bolin Liao, Lei Ding and Lin Xiao
[ view | download | cite ]
Liu, M., Liao, B., Ding, L., Xiao, L.: Performance Analyses of Recurrent Neural Network Models Exploited for Online Time-Varying Nonlinear Optimization. Computer Science and Information Systems, Vol. 13, No. 2, 691–705. (2016), https://doi.org/10.2298/CSIS160215023L