Volume 12, Issue 2 (June 2015)

Editorial

Guest Editorial: Advances in Systems, Modeling and Languages

Guest Editorial: Advances in Information Technology

Regular papers


[ view | download | cite ]
Jian, W., Baigen, C., Jiang, L., Wei, S.: A Lane-Changing Behavioral Preferences Learning Agent with its Applications. Computer Science and Information Systems, Vol. 12, No. 2, 349–374. (2015), https://doi.org/10.2298/CSIS141229016J


[ view | download | cite ]
Hamioud, S., Atil, F.: Model-Driven Java Code Refactoring. Computer Science and Information Systems, Vol. 12, No. 2, 375-403. (2015), https://doi.org/10.2298/CSIS141025015H


[ view | download | cite ]
Maksimović-Moićević, S., Lukač, Ž., Temerinac, M.: Edge-texture 2D image quality metrics suitable for evaluation of image interpolation algorithms. Computer Science and Information Systems, Vol. 12, No. 2, 405-425. (2015), https://doi.org/10.2298/CSIS140402003M


[ view | download | cite ]
Zhang, F., Han, Z., Ge, H., Zhu, Y.: Optimization Design of Traffic Flow under Security Based on Cellular Automata Model. Computer Science and Information Systems, Vol. 12, No. 2, 427-443. (2015), https://doi.org/10.2298/CSIS141228008Z


[ view | download | cite ]
Pombinho, P., Carmo, M. B., Afonso, A. P.: Adaptive Mobile Visualization – The Chameleon Framework. Computer Science and Information Systems, Vol. 12, No. 2, 445-464. (2015), https://doi.org/10.2298/CSIS140607004P


[ view | download | cite ]
Mančev, D., Todorović, B.: k-Best Max-margin Approaches for Sequence Labeling. Computer Science and Information Systems, Vol. 12, No. 2, 465-486. (2015), https://doi.org/10.2298/CSIS140713014M


[ view | download | cite ]
Bozic, J., Babic, D.: EUR/RSD Exchange Rate Forecasting Using Hybrid Wavelet-Neural Model: A CASE STUDY. Computer Science and Information Systems, Vol. 12, No. 2, 487-508. (2015), https://doi.org/10.2298/CSIS140728005B


[ view | download | cite ]
Kocbek, M., Jošt, G., Heričko, M., Polančič, G.: Business Process Model and Notation: The Current State of Affairs. Computer Science and Information Systems, Vol. 12, No. 2, 509-539. (2015), https://doi.org/10.2298/CSIS140610006K


[ view | download | cite ]
Blanco, C., Guzmán, I. G. d., Fernández-Medina, E., Trujillo, J.: An MDA approach for developing Secure OLAP applications: metamodels and transformations. Computer Science and Information Systems, Vol. 12, No. 2, 541-565. (2015), https://doi.org/10.2298/CSIS140617007B

Special Section on Advances in Systems, Modeling and Languages


[ view | download | cite ]
Vicente, E., Mateos, A., Jiménez-Martín, A.: Fuzzified Risk Management: Selection of Safeguards to Minimize the Maximum Risk. Computer Science and Information Systems, Vol. 12, No. 2, 567-585. (2015), https://doi.org/10.2298/CSIS140925017V


[ view | download | cite ]
Suznjevic, M., Skorin-Kapov, L., Humar, I.: Statistical User Behavior Detection and QoE Evaluation for Thin Client Services. Computer Science and Information Systems, Vol. 12, No. 2, 587-605. (2015), https://doi.org/10.2298/CSIS140810018S


[ view | download | cite ]
Rodrigues, F., Oliveira, N., Barbosa, L. S.: Towards an engine for coordination-based architectural reconfigurations. Computer Science and Information Systems, Vol. 12, No. 2, 607-634. (2015), https://doi.org/10.2298/CSIS140912019R


[ view | download | cite ]
Leal, J. P., Costa, T.: Tuning a Semantic Relatedness Algorithm using a Multiscale Approach. Computer Science and Information Systems, Vol. 12, No. 2, 635-654. (2015), https://doi.org/10.2298/CSIS140905020L


[ view | download | cite ]
Cerny, T., Macik, M., Donahoo, M. J., Janousek, J.: On Distributed Concern Delivery in User Interface Design. Computer Science and Information Systems, Vol. 12, No. 2, 655-681. (2015), https://doi.org/10.2298/CSIS141202021C


[ view | download | cite ]
Porubän, J., Bačíková, M., Chodarev, S., Nosál’, M.: Teaching Pragmatic Model-Driven Software Development. Computer Science and Information Systems, Vol. 12, No. 2, 683-705. (2015), https://doi.org/10.2298/CSIS140107022P


[ view | download | cite ]
Straszak, T., Śmiałek, M.: Model-Driven Acceptance Test Automation Based on Use Cases. Computer Science and Information Systems, Vol. 12, No. 2, 707-728. (2015), https://doi.org/10.2298/CSIS141217033S

Special Section on Advances in Information Technology


[ view | download | cite ]
Luo, J., Pan, Q., He, Z.: VANET Middleware for Service Sharing based on OSGi. Computer Science and Information Systems, Vol. 12, No. 2, 729–742. (2015), https://doi.org/10.2298/CSIS141012023L


[ view | download | cite ]
Fan, Z., Qiu, X., Dai, W., Ge, Y., Liu, L., Duan, Y.: A Meta-Modeling Framework for a Specific Social Domain: Public Opinion Event. Computer Science and Information Systems, Vol. 12, No. 2, 743–763. (2015), https://doi.org/10.2298/CSIS140927024F


[ view | download | cite ]
He, H., Feng, Y., Li, Z., Zhu, Z., Zhang, W., Cheng, A.: Dynamic Load Balancing Technology for Cloud-oriented CDN. Computer Science and Information Systems, Vol. 12, No. 2, 765–786. (2015), https://doi.org/10.2298/CSIS141104025H


[ view | download | cite ]
Zhu, F., Liu, Q., Zhong, S., Yang, Y.: Human-level Moving Object Recognition from Traffic Video. Computer Science and Information Systems, Vol. 12, No. 2, 787–799. (2015), https://doi.org/10.2298/CSIS141114026Z


[ view | download | cite ]
Bok, K., Ryu, E., Park, J., Jung, J., Yoo, J.: Multimedia Congestion Control in Wireless Sensor Networks. Computer Science and Information Systems, Vol. 12, No. 2, 801–821. (2015), https://doi.org/10.2298/CSIS141009027B


[ view | download | cite ]
Liang, W., Wu, K., Xie, Y., Duan, J.: TDCM: An IP Watermarking Algorithm based on Two Dimensional Chaotic Mapping. Computer Science and Information Systems, Vol. 12, No. 2, 823–841. (2015), https://doi.org/10.2298/CSIS141017028L


[ view | download | cite ]
Chen, Z., Jia, M., Yang, B., Li, X.: Detecting Overlapping Community in Complex Network Based on Node Similarity. Computer Science and Information Systems, Vol. 12, No. 2, 843–855. (2015), https://doi.org/10.2298/CSIS141021029C


[ view | download | cite ]
Khan, M. K., Chaturvedi, A., Mishra, D., Kumari, S.: On the Security Enhancement of Integrated Electronic Patient Records Information Systems. Computer Science and Information Systems, Vol. 12, No. 2, 857–872. (2015), https://doi.org/10.2298/CSIS141029030K


[ view | download | cite ]
Liu, J., Qiao, S.: A Image Segmentation Algorithm Based on Differential Evolution Particle Swarm Optimization Fuzzy C-Means Clustering. Computer Science and Information Systems, Vol. 12, No. 2, 873–893. (2015), https://doi.org/10.2298/CSIS141108031L


[ view | download | cite ]
Shu, J., Jiang, S., Liu, Q., Liu, L., Geng, X.: A Connectivity Monitoring Model of Opportunistic Sensor Network Based on Evolving Graph. Computer Science and Information Systems, Vol. 12, No. 2, 895–909. (2015), https://doi.org/10.2298/CSIS141023032S