Volume 14, Issue 2 (June 2017)

Editorial

Regular papers


[ view | download | cite ]
Tömösközi, M., Seeling, P., Ekler, P., Fitzek, F. H.: Performance Evaluation and Implementation of IP and Robust Header Compression Schemes for TCP and UDP Traffic in Static and DynamicWireless Contexts. Computer Science and Information Systems, Vol. 14, No. 2, 283-308. (2017), https://doi.org/10.2298/CSIS151101006T


[ view | download | cite ]
Matić, D., Kratica, J., Filipović, V.: Variable Neighborhood Search for solving Bandwidth Coloring Problem. Computer Science and Information Systems, Vol. 14, No. 2, 309–327. (2017), https://doi.org/10.2298/CSIS160320012M


[ view | download | cite ]
Sladojević, S., Anderla, A., Ćulibrk, D., Stefanović1, D., Lalić, B.: Integer Arithmetic Approximation of the HoG Algorithm used for Pedestrian Detection. Computer Science and Information Systems, Vol. 14, No. 2, 329-346. (2017), https://doi.org/10.2298/CSIS160229011S


[ view | download | cite ]
Jabarov, E., On, B., Choi, G. S., Park, M.: R-Tree for Phase Change Memory. Computer Science and Information Systems, Vol. 14, No. 2, 347–367. (2017), https://doi.org/10.2298/CSIS160620008J


[ view | download | cite ]
Jeong, K., Lim, S., Lee, K., Kim, S.: A Flash-Aware Buffering Scheme with the On-the-Fly Redo for Efficient Data Management in Flash Storage. Computer Science and Information Systems, Vol. 14, No. 2. (2017), https://doi.org/369–392


[ view | download | cite ]
Wickramaarachchi, D., Lai, R.: Effort Estimation in Global Software Development - A Systematic Review. Computer Science and Information Systems, Vol. 14, No. 2, 393–421. (2017), https://doi.org/10.2298/CSIS160229007W


[ view | download | cite ]
Bystrický, M., Vranić, V.: Preserving Use Case Flows in Source Code: Approach, Context, and Challenges. Computer Science and Information Systems, Vol. 14, No. 2, 423–445. (2017), https://doi.org/10.2298/CSIS151101005B


[ view | download | cite ]
Rantanen, P.: REST API Example Generation Using Javadoc. Computer Science and Information Systems, Vol. 14, No. 2, 447–466. (2017), https://doi.org/10.2298/CSIS161022009R


[ view | download | cite ]
Pecev, P., Racković, M.: LTR – MDTS structure – A structure for Multiple Dependent Time Series Prediction. Computer Science and Information Systems, Vol. 14, No. 2, 467–490. (2017), https://doi.org/10.2298/CSIS150815004P


[ view | download | cite ]
Portela, F., Miranda, F., Santos, M. F., Abelha, A., Machado, J.: An Online-Processing Critical Patient Monitoring System- An Interoperability Overview. Computer Science and Information Systems, Vol. 14, No. 2, 491–515. (2017), https://doi.org/10.2298/CSIS160604013P

Special section: Advanced Information Engineering Systems


[ view | download | cite ]
Wolters, D., Gerth, C., Engels, G.: Visual Requirements Modeling for Cross-Device Systems. Computer Science and Information Systems, Vol. 14, No. 2, 517-536. (2017), https://doi.org/10.2298/CSIS160930015W


[ view | download | cite ]
Ruohonen, J., Hyrynsalmi, S., Leppänen, V.: Modeling the Delivery of Security Advisories and CVEs. Computer Science and Information Systems, Vol. 14, No. 2, 537–555. (2017), https://doi.org/10.2298/CSIS161010010R


[ view | download | cite ]
Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E., Kalloniatis, C.: A Conceptual Model to Support Security Analysis in the Internet of Things. Computer Science and Information Systems, Vol. 14, No. 2, 557–578. (2017), https://doi.org/10.2298/CSIS160110016M