Volume 8, Issue 3 (June 2011)

 

Editorial

Guest Editorial

Regular Papers


[ view | download | cite ]
Protić, J., Ristanović, D.: Building Computers in Serbia: The First Half of the Digital Century. Computer Science and Information Systems, Vol. 8, No. 3, 549-571. (2011), https://doi.org/DOI: 10.2298/CSIS110505021P


[ view | download | cite ]
Laredj, M., Bouamrane, K.: Workflow Specification for Interaction Management between Experts in a Cooperative Remote Diagnosis Process. Computer Science and Information Systems, Vol. 8, No. 3, 573-590. (2011), https://doi.org/10.2298/CSIS100326001L


[ view | download | cite ]
Sladić, G., Milosavljević, B., Konjović, Z., Vidaković, M.: Access Control Framework for XML Document Collections. Computer Science and Information Systems, Vol. 8, No. 3, 591-609. (2011), https://doi.org/10.2298/CSIS100827002S


[ view | download | cite ]
Laguna, M. A., Marques, J. M., Rodrıguez-Cano, G.: Feature Diagram Formalization Based on Directed Hypergraphs. Computer Science and Information Systems, Vol. 8, No. 3, 611-633. (2011), https://doi.org/10.2298/CSIS100804016L


[ view | download | cite ]
Wang, J., Wu, S., Li, G., Wei, Z.: Integrating Instance-level and Attribute-level Knowledge into Document Clustering. Computer Science and Information Systems, Vol. 8, No. 3, 635-651. (2011), https://doi.org/10.2298/CSIS100906003W

Papers selected from ISCSCT 2010, September 14–15, 2010, Jiaozuo, China and ISECS 2011, June 24–26, 2011, Shanghai, China


[ view | download | cite ]
Ma, R., Ni, Z., Zhu, E., Chen, K., Guan, H.: Code Cache Management Based on Working Set in Dynamic Binary Translator. Computer Science and Information Systems, Vol. 8, No. 3, 653-671. (2011), https://doi.org/10.2298/CSIS100327022M


[ view | download | cite ]
Kerui, C., Wanli, Z., Fengling, H., Yongheng, C., Ying, W.: Data Extraction and Annotation Based on Domain-specific Ontology Evolution for Deep Web. Computer Science and Information Systems, Vol. 8, No. 3, 673-692. (2011), https://doi.org/10.2298/CSIS101011023K


[ view | download | cite ]
Zhang, J., Shen, S., Zhang, J., Li, S.: Extracting Minimal Unsatisfiable Subformulas in Satisfiability Modulo Theories. Computer Science and Information Systems, Vol. 8, No. 3, 693-710. (2011), https://doi.org/10.2298/CSIS101019024Z


[ view | download | cite ]
Jin, P., Chen, H., Zhao, X., Li, X., Yue, L.: Indexing Temporal Information for Web Pages. Computer Science and Information Systems, Vol. 8, No. 3, 711-737. (2011), https://doi.org/10.2298/CSIS100407025J


[ view | download | cite ]
SHANG, Y., LU, G., SHANG, L., WANG, G.: Parallel Processing on Block-based Gauss-Jordan Algorithm for Desktop Grid. Computer Science and Information Systems, Vol. 8, No. 3, 739-759. (2011), https://doi.org/10.2298/CSIS100907026S


[ view | download | cite ]
Fu, X., Wei, H.: Problem Solving by Soaking the Concept Network. Computer Science and Information Systems, Vol. 8, No. 3, 761-778. (2011), https://doi.org/10.2298/CSIS100915027F


[ view | download | cite ]
Wang, Y., Li, H., Zuo, W., He, F., Wang, X., Chen, K.: Research on Discovering Deep Web Entries. Computer Science and Information Systems, Vol. 8, No. 3, 779-799. (2011), https://doi.org/10.2298/CSIS100322028W


[ view | download | cite ]
RuWei, H., XiaoLin, G., Si, Y., Wei, Z.: Study of Privacy-Preserving Framework for Cloud Storage. Computer Science and Information Systems, Vol. 8, No. 3, 801-819. (2011), https://doi.org/10.2298/CSIS100327029R


[ view | download | cite ]
Zhao, J., Zhang, Z., Han, S., Qu, C., Yuan, Z., Zhang, D.: SVM Based Forest Fire Detection Using Static and Dynamic Features. Computer Science and Information Systems, Vol. 8, No. 3, 821-841. (2011), https://doi.org/10.2298/CSIS101012030Z


[ view | download | cite ]
Fang, X., Jiang, C., Yin, Z., Fan, X.: The Trustworthiness Analyzing of Interacting Business Process Based on the Induction Information. Computer Science and Information Systems, Vol. 8, No. 3, 843-867. (2011), https://doi.org/10.2298/CSIS100411031F


[ view | download | cite ]
Zhao, H., Wang, G., Xu, C., Yu, F.: Voice Activity Detection Method Based on Multi-valued Coarse-graining Lempel-Ziv Complexity. Computer Science and Information Systems, Vol. 8, No. 3, 869-888. (2011), https://doi.org/10.2298/CSIS100906032Z


[ view | download | cite ]
Xiong, K., Qiu, Z.: Worst Case Performance Bounds for Multimedia Flows in QoS-enhanced TNPOSS Network. Computer Science and Information Systems, Vol. 8, No. 3, 889-908. (2011), https://doi.org/10.2298/CSIS101201033X


[ view | download | cite ]
Zhang, X., Yang, M., Geng, G., Luo, W., Li, X.: A Two-Tiered Reliable Application Layer Multicast. Computer Science and Information Systems, Vol. 8, No. 3, 990-929. (2011), https://doi.org/10.2298/CSIS101223034X


[ view | download | cite ]
Jiang, X., Sun, T., Fu, G.: Multi-Scale Image Semantic Recognition with Hierarchical Visual Vocabulary. Computer Science and Information Systems, Vol. 8, No. 3, 931-951. (2011), https://doi.org/10.2298/CSIS100423035J