Volume 13, Issue 2 (June 2016)

Editorial

Guest Editorial: Special Section: Advances in Information Technology

Papers


[ view | download | cite ]
Jovanović, B., Milenković, I., Bogićević, M., Simić, D.: Extending identity management system with multimodal biometric authentication. Computer Science and Information Systems, Vol. 13, No. 2, 313–334. (2016), https://doi.org/10.2298/CSIS141030003J


[ view | download | cite ]
Amiri, M. J., Parsa, S., Lajevardi, A. M.: Multifaceted Service Identification: Process, Requirement and Data. Computer Science and Information Systems, Vol. 13, No. 2, 335–358. (2016), https://doi.org/10.2298/CSIS151105011A


[ view | download | cite ]
Xu, Z., Jiang, H., Kong, X., Kang, J., Wang, W., Xia, F.: Cross-Domain Item Recommendation Based on User Similarity. Computer Science and Information Systems, Vol. 13, No. 2, 359–373. (2016), https://doi.org/10.2298/CSIS150730007Z


[ view | download | cite ]
Bae, D., Kim, J., Jo, Y., Kim, S., Oh, H., Park, C.: Intelligent SSD: A turbo for big data mining. Computer Science and Information Systems, Vol. 13, No. 2, 375–394. (2016), https://doi.org/10.2298/CSIS150820008D


[ view | download | cite ]
García-Crespo, Á., González-Carrasco, I., López-Cuadrado, J. L., Villanueva, D., González, Á.: CESARSC: Framework for creating Cultural Entertainment Systems with Augmented Reality in Smart Cities. Computer Science and Information Systems, Vol. 13, No. 2, 395–425. (2016), https://doi.org/10.2298/CSIS150620006G


[ view | download | cite ]
Kim, H., Hoque, M. R., Seo, H., Yang, S.: Development of Middleware Architecture to Realize Context-Aware Service in Smart Home Environment. Computer Science and Information Systems, Vol. 13, No. 2, 427–452. (2016), https://doi.org/10.2298/CSIS150701010H


[ view | download | cite ]
Osojnik, A., Panov, P., Džeroski, S.: Modeling Dynamical Systems with Data Stream Mining. Computer Science and Information Systems, Vol. 13, No. 2, 453–473. (2016), https://doi.org/10.2298/CSIS150518009O


[ view | download | cite ]
Ali, G., Kim, K. H., Kim, K.: Adaptive TDMA Scheduling for Real-Time Flows in Cluster-BasedWireless Sensor Networks. Computer Science and Information Systems, Vol. 13, No. 2, 475–492. (2016), https://doi.org/10.2298/CSIS150401005G


[ view | download | cite ]
Milutinović, M., Bojović, Ž., Labus, A., Bogdanović, Z., Despotović-Zrakić, M.: Ontology-based generated learning objects for mobile language learning. Computer Science and Information Systems, Vol. 13, No. 2, 493–514. (2016), https://doi.org/10.2298/CSIS141030004M

Special Section: Advances in Information Technology


[ view | download | cite ]
Wang, M., Yang, S., Wu, L.: Improved Community Mining Method Based on LFM and EAGLE. Computer Science and Information Systems, Vol. 13, No. 2, 515–530. (2016), https://doi.org/10.2298/CSIS160217012W


[ view | download | cite ]
Huang, K., Chen, Y., Jia, H., Lan, J., Yan, X., Wang, Z.: Fast Multicast Scheme with Secure Network Coding in Cloud Data Centers. Computer Science and Information Systems, Vol. 13, No. 2, 531–545. (2016), https://doi.org/10.2298/CSIS160222013H


[ view | download | cite ]
Liu, J., Liu, J., Xie, R.: Reliability-Based Controller Placement Algorithm in Software Defined Networking. Computer Science and Information Systems, Vol. 13, No. 2, 547–560. (2016), https://doi.org/10.2298/CSIS160225014L


[ view | download | cite ]
Fu, Y., Xu, Z., Zhu, F., Liu, Q., Zhou, X.: Learn to Human-level Control in Dynamic Environment Using Incremental Batch Interrupting Temporal Abstraction. Computer Science and Information Systems, Vol. 13, No. 2, 561–577. (2016), https://doi.org/10.2298/CSIS160210015F


[ view | download | cite ]
Ma, X., Dai, Y., Wang, Z., Liu, L.: Design of Online Double Auction Mechanism for Aging Sensitive Commodity. Computer Science and Information Systems, Vol. 13, No. 2, 579–592. (2016), https://doi.org/10.2298/CSIS160212016M


[ view | download | cite ]
Wang, H., Qian, K., Hu, C., Zhang, C., Zhou, Y.: Routing Optimization for Server-Centric Data Center Networks. Computer Science and Information Systems, Vol. 13, No. 2, 593–608. (2016), https://doi.org/10.2298/CSIS160228017W


[ view | download | cite ]
Long, J., Zhang, D., Zuo, C., Duan, J., Huang, W.: A Robust Low-overhead Watermarking for Field Authentication of Intellectual Property Cores. Computer Science and Information Systems, Vol. 13, No. 2, 609–622. (2016), https://doi.org/10.2298/CSIS160210018L


[ view | download | cite ]
Liang, W., Xie, Y., Chen, X., Hosam, O., Chen, X.: A Two-step MF Signal Acquisition Method for Wireless Underground Sensor Networks. Computer Science and Information Systems, Vol. 13, No. 2, 623–638. (2016), https://doi.org/10.2298/CSIS160224019L


[ view | download | cite ]
Huang, T., Zhang, J., Liu, Y.: A Mechanism Achieving Low Latency for Wireless Datacenter Applications. Computer Science and Information Systems, Vol. 13, No. 2, 639–658. (2016), https://doi.org/10.2298/CSIS160301020H


[ view | download | cite ]
Han, D., Bi, K., Xie, B., Huang, L., Wang, R.: An Anomaly Detection on the Application-Layer-Based QoS in the Cloud Storage System. Computer Science and Information Systems, Vol. 13, No. 2, 659–676. (2016), https://doi.org/10.2298/CSIS160201021H


[ view | download | cite ]
Bi, K., Han, D., Wang, J.: K Maximum Probability Attack Paths Dynamic Generation Algorithm. Computer Science and Information Systems, Vol. 13, No. 2, 677–689. (2016), https://doi.org/10.2298/CSIS160227022B


[ view | download | cite ]
Liu, M., Liao, B., Ding, L., Xiao, L.: Performance Analyses of Recurrent Neural Network Models Exploited for Online Time-Varying Nonlinear Optimization. Computer Science and Information Systems, Vol. 13, No. 2, 691–705. (2016), https://doi.org/10.2298/CSIS160215023L