Forthcoming articles

Special Issue on Mobile Collaboration Technologies and Internet Services


[ view | cite ]
Huang, Y., Leu, F., Chen, J., Chu, W. C.: A True Random-Number Encryption Method Employing Block Cipher and PRNG. Computer Science and Information Systems


[ view | cite ]
Chen, C., Tsaur, W., Chen, Y., Chang, Y.: A Secure Mobile DRM System Based on Cloud Architecture. Computer Science and Information Systems


[ view | cite ]
Shahamabadi, M. S., Ali, B. M., Noordin, N. K., Rasid, M. F. b. A., Varahram, P., Jara, A. J.: A NEMO-HWSN Solution to Support 6LoWPAN Network Mobility in Hospital Wireless Sensor Network. Computer Science and Information Systems


[ view | cite ]
Moon, H., Pan, S. B.: Long Distance Face Recognition for Enhanced Performance of Internet of Things Service Interface. Computer Science and Information Systems


[ view | cite ]
Gao, T., Guo, N., Yim, K., Wang, Q.: PPS: A Privacy-Preserving Security Scheme for Multi-operator Wireless Mesh Networks with Enhanced User Experience. Computer Science and Information Systems


[ view | cite ]
Jeong, H. J., Ye, S., Lim, J., You, I., Hyun, W.: A Computer Remote Control System Based on Speech Recognition Technologies of Mobile Devices and Wireless Communication Technologies. Computer Science and Information Systems


[ view | cite ]
Chen, Y., Chen, M., Cheung, F., Chang, Y.: A New Hybrid Architecture with an Intersection-Based Coverage Algorithm in Wireless Sensor Networks. Computer Science and Information Systems


[ view | cite ]
Lee, T., Lee, H., Rhee, K., Shin, S. U.: The Efficient Implementation of Distributed Indexing with Hadoop for Digital Investigations on Big Data. Computer Science and Information Systems


[ view | cite ]
Han, Y., Choi, J., Cho, S., Yoo, H., Woo, J., Nah, Y., Park, M.: A New Detection Scheme of Software Copyright Infringement using Software Birthmark on Windows Systems. Computer Science and Information Systems


[ view | cite ]
Doh, I., Lim, J., Li, S., Chae, K.: Pairwise and Group Key Setup Mechanism for Secure Machine-to-Machine Communication. Computer Science and Information Systems


[ view | cite ]
Chen, H., Yang, C., Su, H., Wei, C., Lee, C.: A Secure E-Mail Protocol Using ID-based FNS Multicast Mechanism. Computer Science and Information Systems


[ view | cite ]
Park, H. W., Yeo, I. Y., Lee, J. R., Jang, H.: Study on Network Architecture of Big Data Center for the Efficient Control of Huge Data Traffic. Computer Science and Information Systems


[ view | cite ]
Wu, G., Chen, X., Yao, L., Lee, Y., Yim, K.: An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks. Computer Science and Information Systems


[ view | cite ]
Weng, C., Wen, J., Chen, H., Yang, L.: The Performance Analysis of Direct/Cooperative Transmission to Support QoS in WLANs. Computer Science and Information Systems


[ view | cite ]
Zhang, G., Sun, Y., Xu, M., Bie, R.: Weibo Clustering: A New Approach Utilizing Users’ Reposting Data in Social Networking Services. Computer Science and Information Systems


[ view | cite ]
Shih, N., Chen), H. C. (.: An Approach for Selecting Candidates in Soft-handover Procedure Using Multi-Generating Procedure and Second Grey Relational Analysis. Computer Science and Information Systems

Special Issue on Advances in Systems, Modeling, Languages and Agents


[ view | cite ]
Fourtounis, G., Papaspyrou, N. S., Theofilopoulos, P.: Modular Polymorphic Defunctionalization. Computer Science and Information Systems


[ view | cite ]
Santos, E. A. P., Vieira, A. D., Schaidt, S., Loures, E. d. F. R.: Modeling Constraint-based Processes: a Supervisory Control Theory Application. Computer Science and Information Systems


[ view | cite ]
Carvalho, N. R., Simões, A., Almeida, J. J.: DMOSS: Open Source Software Documentation Assessment. Computer Science and Information Systems


[ view | cite ]
Cunha, D., Neves, P., Sousa, P.: PaaS Manager: A Platform-as-a-Service Aggregation Framework. Computer Science and Information Systems


[ view | cite ]
Teófilo, L. F., Reis, L. P., Cardoso, H. L., Mendes, P.: Rule based strategies for large extensive-form games: A specification language for No-Limit Texas Hold’em agents. Computer Science and Information Systems


[ view | cite ]
Querini, M., Italiano, G. F.: Reliability and Data Density in High Capacity Color Barcodes. Computer Science and Information Systems


[ view | cite ]
Kryjak, T., Komorkiewicz, M., Gorgon, M.: Real-time Implementation of Foreground Object Detection From a Moving Camera Using the ViBE Algorithm. Computer Science and Information Systems


[ view | cite ]
Nosál, M., Porubän, J.: XML to Annotations Mapping Definition with Patterns. Computer Science and Information Systems


[ view | cite ]
Santos, J., Rocha, R.: A Team-Based Scheduling Model for Interfacing Or-Parallel Prolog Engines. Computer Science and Information Systems


[ view | cite ]
Zawoad, S., Mernik, M., Hasan, R.: Towards Building a Forensics Aware Language for Secure Logging. Computer Science and Information Systems


[ view | cite ]
Bohm, S., Behalek, M., Meca, O., Surkovsky, M.: Visual Programming of MPI Applications: Debugging, Performance Analysis, and Performance Prediction. Computer Science and Information Systems


[ view | cite ]
Milewicz, R., Mernik, M., Pirkelbauer, P.: SimpleConcepts: A Lightweight Extension to C++ to Support Constraints on Generic Types. Computer Science and Information Systems