Volume 14, Issue 2 (June 2017)
Regular papers
Performance Evaluation and Implementation of IP and Robust Header Compression Schemes for TCP and UDP Traffic in Static and DynamicWireless Contexts
Máté Tömösközi, Patrick Seeling, Péter Ekler and Frank H.P. Fitzek
[ view | download | cite ]
Tömösközi, M., Seeling, P., Ekler, P., Fitzek, F. H.: Performance Evaluation and Implementation of IP and Robust Header Compression Schemes for TCP and UDP Traffic in Static and DynamicWireless Contexts. Computer Science and Information Systems, Vol. 14, No. 2, 283-308. (2017), https://doi.org/10.2298/CSIS151101006T
Variable Neighborhood Search for solving Bandwidth Coloring Problem
Dragan Matić, Jozef Kratica and Vladimir Filipović
[ view | download | cite ]
Matić, D., Kratica, J., Filipović, V.: Variable Neighborhood Search for solving Bandwidth Coloring Problem. Computer Science and Information Systems, Vol. 14, No. 2, 309–327. (2017), https://doi.org/10.2298/CSIS160320012M
Integer Arithmetic Approximation of the HoG Algorithm used for Pedestrian Detection
Srđan Sladojević, Andraš Anderla, Dubravko Ćulibrk, Darko Stefanović1 and Bojan Lalić
[ view | download | cite ]
Sladojević, S., Anderla, A., Ćulibrk, D., Stefanović1, D., Lalić, B.: Integer Arithmetic Approximation of the HoG Algorithm used for Pedestrian Detection. Computer Science and Information Systems, Vol. 14, No. 2, 329-346. (2017), https://doi.org/10.2298/CSIS160229011S
R-Tree for Phase Change Memory
Elkhan Jabarov, Byung-Won On, Gyu Sang Choi and Myong-Soon Park
[ view | download | cite ]
Jabarov, E., On, B., Choi, G. S., Park, M.: R-Tree for Phase Change Memory. Computer Science and Information Systems, Vol. 14, No. 2, 347–367. (2017), https://doi.org/10.2298/CSIS160620008J
A Flash-Aware Buffering Scheme with the On-the-Fly Redo for Efficient Data Management in Flash Storage
Kyosung Jeong, Sungchae Lim, Kichun Lee and Sang-Wook Kim
[ view | download | cite ]
Jeong, K., Lim, S., Lee, K., Kim, S.: A Flash-Aware Buffering Scheme with the On-the-Fly Redo for Efficient Data Management in Flash Storage. Computer Science and Information Systems, Vol. 14, No. 2. (2017), https://doi.org/369–392
Effort Estimation in Global Software Development - A Systematic Review
Dilani Wickramaarachchi and Richard Lai
[ view | download | cite ]
Wickramaarachchi, D., Lai, R.: Effort Estimation in Global Software Development - A Systematic Review. Computer Science and Information Systems, Vol. 14, No. 2, 393–421. (2017), https://doi.org/10.2298/CSIS160229007W
Preserving Use Case Flows in Source Code: Approach, Context, and Challenges
Michal Bystrický and Valentino Vranić
[ view | download | cite ]
Bystrický, M., Vranić, V.: Preserving Use Case Flows in Source Code: Approach, Context, and Challenges. Computer Science and Information Systems, Vol. 14, No. 2, 423–445. (2017), https://doi.org/10.2298/CSIS151101005B
REST API Example Generation Using Javadoc
Petri Rantanen
[ view | download | cite ]
Rantanen, P.: REST API Example Generation Using Javadoc. Computer Science and Information Systems, Vol. 14, No. 2, 447–466. (2017), https://doi.org/10.2298/CSIS161022009R
LTR – MDTS structure – A structure for Multiple Dependent Time Series Prediction
Predrag Pecev and Miloš Racković
[ view | download | cite ]
Pecev, P., Racković, M.: LTR – MDTS structure – A structure for Multiple Dependent Time Series Prediction. Computer Science and Information Systems, Vol. 14, No. 2, 467–490. (2017), https://doi.org/10.2298/CSIS150815004P
An Online-Processing Critical Patient Monitoring System- An Interoperability Overview
Filipe Portela, Filipe Miranda, Manuel Filipe Santos, António Abelha and José Machado
[ view | download | cite ]
Portela, F., Miranda, F., Santos, M. F., Abelha, A., Machado, J.: An Online-Processing Critical Patient Monitoring System- An Interoperability Overview. Computer Science and Information Systems, Vol. 14, No. 2, 491–515. (2017), https://doi.org/10.2298/CSIS160604013P
Special section: Advanced Information Engineering Systems
Visual Requirements Modeling for Cross-Device Systems
Dennis Wolters, Christian Gerth and Gregor Engels
[ view | download | cite ]
Wolters, D., Gerth, C., Engels, G.: Visual Requirements Modeling for Cross-Device Systems. Computer Science and Information Systems, Vol. 14, No. 2, 517-536. (2017), https://doi.org/10.2298/CSIS160930015W
Modeling the Delivery of Security Advisories and CVEs
Jukka Ruohonen, Sami Hyrynsalmi and Ville Leppänen
[ view | download | cite ]
Ruohonen, J., Hyrynsalmi, S., Leppänen, V.: Modeling the Delivery of Security Advisories and CVEs. Computer Science and Information Systems, Vol. 14, No. 2, 537–555. (2017), https://doi.org/10.2298/CSIS161010010R
A Conceptual Model to Support Security Analysis in the Internet of Things
Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis and Christos Kalloniatis
[ view | download | cite ]
Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E., Kalloniatis, C.: A Conceptual Model to Support Security Analysis in the Internet of Things. Computer Science and Information Systems, Vol. 14, No. 2, 557–578. (2017), https://doi.org/10.2298/CSIS160110016M