Volume 18, Issue 1 (January 2021)
EDITORIAL
Mirjana Ivanović and Miloš Radovanović
[ view | download | cite ]
Ivanović, M., Radovanović, M.: EDITORIAL. Computer Science and Information Systems, Vol. 18, No. 1, i–iv. (2021), https://doi.org/10.2298/CSIS210100iI
Papers
Throughput Prediction based on ExtraTree for Stream Processing Tasks
Zheng Chu, Jiong Yu and Askar Hamdulla
[ view | download | cite ]
Chu, Z., Yu, J., Hamdulla, A.: Throughput Prediction based on ExtraTree for Stream Processing Tasks. Computer Science and Information Systems, Vol. 18, No. 1, 1–22. (2021), https://doi.org/10.2298/CSIS200131031C
Multi-Objective Optimization of Container-Based Microservice Scheduling in Edge Computing
Guisheng Fan, Liang Chen, Huiqun Yu and Wei Qi
[ view | download | cite ]
Fan, G., Chen, L., Yu, H., Qi, W.: Multi-Objective Optimization of Container-Based Microservice Scheduling in Edge Computing. Computer Science and Information Systems, Vol. 18, No. 1, 23–42. (2021), https://doi.org/10.2298/CSIS200229041F
PureEdgeSim: A Simulation Framework for Performance Evaluation of Cloud, Edge and Mist Computing Environments
Charafeddine Mechalikh, Hajer Taktak and Faouzi Moussa
[ view | download | cite ]
Mechalikh, C., Taktak, H., Moussa, F.: PureEdgeSim: A Simulation Framework for Performance Evaluation of Cloud, Edge and Mist Computing Environments. Computer Science and Information Systems, Vol. 18, No. 1, 43–66. (2021), https://doi.org/10.2298/CSIS200301042M
DroidClone: Attack of the Android Malware Clones - A Step Towards Stopping Them
Shahid Alam and Ibrahim Sogukpinar
[ view | download | cite ]
Alam, S., Sogukpinar, I.: DroidClone: Attack of the Android Malware Clones - A Step Towards Stopping Them. Computer Science and Information Systems, Vol. 18, No. 1, 43–66. (2021), https://doi.org/10.2298/CSIS200301042M
TrustRec: An Effective Approach to Exploit Implicit Trust and Distrust Relationships along with Explicit ones for Accurate Recommendations
Masoud Reyhani Hamedani, Irfan Ali, Jiwon Hong and Sang-Wook Kim
[ view | download | cite ]
Hamedani, M. R., Ali, I., Hong, J., Kim, S.: TrustRec: An Effective Approach to Exploit Implicit Trust and Distrust Relationships along with Explicit ones for Accurate Recommendations. Computer Science and Information Systems, Vol. 18, No. 1, 93–114. (2021), https://doi.org/10.2298/CSIS200608039H
A Dual Hybrid Recommender System based on SCoR and the Random Forest
Costas Panagiotakis, Harris Papadakis and Paraskevi Fragopoulou
[ view | download | cite ]
Panagiotakis, C., Papadakis, H., Fragopoulou, P.: A Dual Hybrid Recommender System based on SCoR and the Random Forest. Computer Science and Information Systems, Vol. 18, No. 1, 115–128. (2021), https://doi.org/10.2298/CSIS200515046P
A method of assessing rework for implementing software requirements changes
Shalinka Jayatilleke and Richard Lai
[ view | download | cite ]
Jayatilleke, S., Lai, R.: A method of assessing rework for implementing software requirements changes. Computer Science and Information Systems, Vol. 18, No. 1, 129–154. (2021), https://doi.org/10.2298/CSIS200221032J
Double-Layer Affective Visual Question Answering Network
Zihan Guo, Dezhi Han and Kuan-Ching Li
[ view | download | cite ]
Guo, Z., Han, D., Li, K.: Double-Layer Affective Visual Question Answering Network. Computer Science and Information Systems, Vol. 18, No. 1, 155–168. (2021), https://doi.org/10.2298/CSIS200515038G
Spatio-temporal Summarized Visualization of SmartX Multi-View Visibility in Cloud-native Edge Boxes
Muhammad Ahmad Rathore and JongWon Kim
[ view | download | cite ]
Rathore, M. A., Kim, J.: Spatio-temporal Summarized Visualization of SmartX Multi-View Visibility in Cloud-native Edge Boxes. Computer Science and Information Systems, Vol. 18, No. 1, 169–188. (2021), https://doi.org/10.2298/CSIS200317034R
A QPSO Algorithm Based on Hierarchical Weight and Its Application in Cloud Computing Task Scheduling
Guolong Yu, Yong Zhao, Zhongwei Cui and Yu Zuo
[ view | download | cite ]
Yu, G., Zhao, Y., Cui, Z., Zuo, Y.: A QPSO Algorithm Based on Hierarchical Weight and Its Application in Cloud Computing Task Scheduling. Computer Science and Information Systems, Vol. 18, No. 1, 189–212. (2021), https://doi.org/10.2298/CSIS200223033Y
Convexity of hesitant fuzzy sets based on aggregation functions
Pedro Huidobro, Pedro Alonso, Vladimír Janiš and Susana Montes
[ view | download | cite ]
Huidobro, P., Alonso, P., Janiš, V., Montes, S.: Convexity of hesitant fuzzy sets based on aggregation functions. Computer Science and Information Systems, Vol. 18, No. 1, 213–230. (2021), https://doi.org/10.2298/CSIS200428045H
Spoken Notifications in Smart Environments Using Croatian Language
Renato Šoić, Marin Vuković and Gordan Ježić
[ view | download | cite ]
Šoić, R., Vuković, M., Ježić, G.: Spoken Notifications in Smart Environments Using Croatian Language. Computer Science and Information Systems, Vol. 18, No. 1, 231–250. (2021), https://doi.org/10.2298/CSIS200424036S
Students' Preferences in Selection of Computer Science and Informatics Studies - A Comprehensive Empirical Case Study
Miloš Savić, Mirjana Ivanović, Ivan Luković, Boris Delibašić, Jelica Protić and Dragan Janković
[ view | download | cite ]
Savić, M., Ivanović, M., Luković, I., Delibašić, B., Protić, J., Janković, D.: Students' Preferences in Selection of Computer Science and Informatics Studies - A Comprehensive Empirical Case Study. Computer Science and Information Systems, Vol. 18, No. 1, 251–283. (2021), https://doi.org/10.2298/CSIS200901054S
Special section: Invited papers of Distinguished Top Cited ComSIS authors
Hypothetical Tensor-based Multi-criteria Recommender System for New Users with Partial Preferences
Minsung Hong and Jason J. Jung
[ view | download | cite ]
Hong, M., Jung, J. J.: Hypothetical Tensor-based Multi-criteria Recommender System for New Users with Partial Preferences. Computer Science and Information Systems, Vol. 18, No. 1, 285–301. (2021), https://doi.org/10.2298/CSIS200531056H
Metaphor Research in the 21st Century: A Bibliographic Analysis
Dongyu Zhang, Minghao Zhang, Ciyuan Peng, Jason J. Jung and Feng Xia
[ view | download | cite ]
Zhang, D., Zhang, M., Peng, C., Jung, J. J., Xia, F.: Metaphor Research in the 21st Century: A Bibliographic Analysis. Computer Science and Information Systems, Vol. 18, No. 1, 303–321. (2021), https://doi.org/10.2298/CSIS201109059Z
Incorporating privacy by design in Body Sensor Networks for Medical Applications: A Privacy and Data Protection Framework
Christos Kalloniatis, Costas Lambrinoudakis, Mathias Musahl, Athanasios Kanatas and Stefanos Gritzalis
[ view | download | cite ]
Kalloniatis, C., Lambrinoudakis, C., Musahl, M., Kanatas, A., Gritzalis, S.: Incorporating privacy by design in Body Sensor Networks for Medical Applications: A Privacy and Data Protection Framework. Computer Science and Information Systems, Vol. 18, No. 1, 323–350. (2021), https://doi.org/10.2298/CSIS200922057K
A JSSP Solution for Production Planning Optimization Combining Industrial Engineering and Evolutionary Algorithms
Sašo Sršen and Marjan Mernik
[ view | download | cite ]
Sršen, S., Mernik, M.: A JSSP Solution for Production Planning Optimization Combining Industrial Engineering and Evolutionary Algorithms. Computer Science and Information Systems, Vol. 18, No. 1, 349–378. (2021), https://doi.org/10.2298/CSIS201009058S