Search dblp for Publications

export results for "toc:db/journals/cit/cit23.bht:"

 download as .bib file

@article{DBLP:journals/cit/AhsanH15,
  author       = {Sk. Md. Masudul Ahsan and
                  K. M. Azharul Hasan},
  title        = {Segment Oriented Compression Scheme for {MOLAP} Based on Extendible
                  Multidimensional Arrays},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {111--121},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002441},
  doi          = {10.2498/CIT.1002441},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/AhsanH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/AmmiC15,
  author       = {Meryem Ammi and
                  Salim Chikhi},
  title        = {A Generalized Island Model Based on Parallel and Cooperating Metaheuristics
                  for Effective Large Capacitated Vehicle Routing Problem Solving},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {141--155},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002465},
  doi          = {10.2498/CIT.1002465},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/AmmiC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/BelfedhalF15,
  author       = {Alaa Eddine Belfedhal and
                  Kamel Mohamed Faraoun},
  title        = {Building Secure and Fast Cryptographic Hash Functions Using Programmable
                  Cellular Automata},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {317--328},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002639},
  doi          = {10.2498/CIT.1002639},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/BelfedhalF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/BusseHLMRRSSTZ15,
  author       = {Johannes Busse and
                  Bernhard G. Humm and
                  Christoph L{\"{u}}bbert and
                  Frank Moelter and
                  Anatol Reibold and
                  Matthias Rewald and
                  Veronika Schl{\"{u}}ter and
                  Bernhard Seiler and
                  Erwin Tegtmeier and
                  Thomas Zeh},
  title        = {Actually, What Does "Ontology" Mean?},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {29--41},
  year         = {2015},
  url          = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2508},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/BusseHLMRRSSTZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/ChakrabortyGNK15,
  author       = {Arpita Chakraborty and
                  Srinjoy Ganguly and
                  Mrinal Kanti Naskar and
                  Anupam Karmakar},
  title        = {Trust Integrated Congestion Aware Energy Efficient Routing forWireless
                  Multimedia Sensor Networks {(TCEER)}},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {95--109},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002480},
  doi          = {10.2498/CIT.1002480},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/ChakrabortyGNK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/DongEWZ15,
  author       = {Ziqian (Cecilia) Dong and
                  Randolph Espejo and
                  Yu Wan and
                  Wenjie Zhuang},
  title        = {Detecting and Locating Man-in-the-Middle Attacks in Fixed Wireless
                  Networks},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {283--293},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002530},
  doi          = {10.2498/CIT.1002530},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/DongEWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/DragulescuBV15,
  author       = {Bogdan Dragulescu and
                  Marian Bucos and
                  Radu Vasiu},
  title        = {Social Network Analysis on Educational Data Set in {RDF} Format},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {269--281},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002645},
  doi          = {10.2498/CIT.1002645},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/DragulescuBV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/ElzamlyH15,
  author       = {Abdelrafe Elzamly and
                  Burairah Hussin},
  title        = {Modelling and Evaluating Software Project Risks with Quantitative
                  Analysis Techniques in Planning Software Development},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {123--139},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002457},
  doi          = {10.2498/CIT.1002457},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/ElzamlyH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Felice15,
  author       = {Paolino Di Felice},
  title        = {Towards a Software Tool Supporting Urban Decision Makers in Locating
                  and Sizing the Household Garbage Accumulation Points Within Cities},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {211--229},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002416},
  doi          = {10.2498/CIT.1002416},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Felice15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/GhanemDVS15,
  author       = {Khadoudja Ghanem and
                  Amer Draa and
                  Elvis Vyumvuhore and
                  Ars{\`{e}}ne Simbabawe},
  title        = {Differential Evolution to Optimize Hidden Markov Models Training:
                  Application to Facial Expression Recognition},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {157--170},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002412},
  doi          = {10.2498/CIT.1002412},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/GhanemDVS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Glavinic15,
  author       = {Vlado Glavinic},
  title        = {Editorial},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {i--ii},
  year         = {2015},
  url          = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2732},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Glavinic15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Glavinic15a,
  author       = {Vlado Glavinic},
  title        = {Editorial},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {i--ii},
  year         = {2015},
  url          = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2756},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Glavinic15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Glavinic15b,
  author       = {Vlado Glavinic},
  title        = {Editorial},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {i--ii},
  year         = {2015},
  url          = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2863},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Glavinic15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/HuangMZ15,
  author       = {Ping Huang and
                  Haibing Mu and
                  Fei Zeng},
  title        = {Analysis on the Performance of Server-less {RFID} Searching Protocol},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {295--302},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002549},
  doi          = {10.2498/CIT.1002549},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/HuangMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/IyiladeOV15,
  author       = {Johnson Iyilade and
                  Rita Orji and
                  Julita Vassileva},
  title        = {Factors Influencing User's Attitude to Secondary Information Sharing
                  and Usage},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {231--244},
  year         = {2015},
  url          = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2535},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/IyiladeOV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Kulathuramaiyer15,
  author       = {Narayanan Kulathuramaiyer and
                  Hermann A. Maurer},
  title        = {A Survey of Communications and Collaborative Web Technologies},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {1--18},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002507},
  doi          = {10.2498/CIT.1002507},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Kulathuramaiyer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/LiangTDW15,
  author       = {Xiaoyuan Liang and
                  Jie Tian and
                  Xiaoning Ding and
                  Guiling Wang},
  title        = {A Risk and Similarity Aware Application Recommender System},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {303--315},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002537},
  doi          = {10.2498/CIT.1002537},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/LiangTDW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/MaarryLB15,
  author       = {Kinda El Maarry and
                  Christoph Lofi and
                  Wolf{-}Tilo Balke},
  title        = {Crowdsourcing for Query Processing on Web Data: {A} Case Study on
                  the Skyline Operator},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {43--60},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002509},
  doi          = {10.2498/CIT.1002509},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/MaarryLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/MaurerK15,
  author       = {Hermann A. Maurer and
                  Narayanan Kulathuramaiyer},
  title        = {Guest Editorial},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {i},
  year         = {2015},
  url          = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2563},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/MaurerK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/McGuffeyLS15,
  author       = {Charles McGuffey and
                  Chen Liu and
                  Stephanie Schuckers},
  title        = {Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems
                  for Network Security},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {329--340},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002764},
  doi          = {10.2498/CIT.1002764},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/McGuffeyLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/MehmoodK15,
  author       = {Rizwan Mehmood and
                  Petra Korica{-}Pehserl},
  title        = {The Web is Big Business},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {19--27},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002513},
  doi          = {10.2498/CIT.1002513},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/MehmoodK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/NajarMN15,
  author       = {Amir Shareghi Najar and
                  Antonija Mitrovic and
                  Kourosh Neshatian},
  title        = {Eye Tracking and Studying Examples: How Novices and Advanced Learners
                  Study {SQL} Examples},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {2},
  pages        = {171--190},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002627},
  doi          = {10.2498/CIT.1002627},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/NajarMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/RenYZW15,
  author       = {Min Ren and
                  Feng Yang and
                  Guangchun Zhou and
                  Haiping Wang},
  title        = {Mining Individual Behavior Pattern Based on Semantic Knowledge Discovery
                  of Trajectory},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {245--254},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002578},
  doi          = {10.2498/CIT.1002578},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/RenYZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/ScerbakovES15,
  author       = {Alexei Scerbakov and
                  Martin Ebner and
                  Nikolai Scerbakov},
  title        = {Using Cloud Services in a Modern Learning Management System},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {75--86},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002517},
  doi          = {10.2498/CIT.1002517},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/ScerbakovES15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Serdyukov15,
  author       = {Peter Serdyukov},
  title        = {Does Online Education Need a Special Pedagogy?},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {61--74},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002511},
  doi          = {10.2498/CIT.1002511},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Serdyukov15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/ShyamalaP15,
  author       = {Coimbatore Kandasamy Shyamala and
                  Tattamangalam Ramachandran Padmanabhan},
  title        = {An Integrated Distributed Storage Design Offering Data Retrievability
                  and Recoverability Using Soft Decision Decoding of Block Codes},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {191--210},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002490},
  doi          = {10.2498/CIT.1002490},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/ShyamalaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/TangC15,
  author       = {Lijun Tang and
                  Xu Chen},
  title        = {Ontology-Based Semantic Retrieval for Education Management Systems},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {3},
  pages        = {255--267},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002493},
  doi          = {10.2498/CIT.1002493},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/TangC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/White15,
  author       = {Bebo White},
  title        = {Discovering the Future of the Web},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {1},
  pages        = {87--93},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002516},
  doi          = {10.2498/CIT.1002516},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/White15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/YangLF15,
  author       = {Ching{-}Nung Yang and
                  Jia{-}Bin Lai and
                  Zhangjie Fu},
  title        = {Protecting User Privacy for Cloud Computing by Bivariate Polynomial
                  Based Secret Sharing},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {341--355},
  year         = {2015},
  url          = {https://doi.org/10.2498/cit.1002593},
  doi          = {10.2498/CIT.1002593},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/YangLF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/ZhaoK15,
  author       = {Hong Zhao and
                  Kevin A. Kwiat},
  title        = {Guest Editorial},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {23},
  number       = {4},
  pages        = {iii--iv},
  year         = {2015},
  url          = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2833},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/ZhaoK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics