Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cit/cit23.bht:"
@article{DBLP:journals/cit/AhsanH15, author = {Sk. Md. Masudul Ahsan and K. M. Azharul Hasan}, title = {Segment Oriented Compression Scheme for {MOLAP} Based on Extendible Multidimensional Arrays}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {2}, pages = {111--121}, year = {2015}, url = {https://doi.org/10.2498/cit.1002441}, doi = {10.2498/CIT.1002441}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/AhsanH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/AmmiC15, author = {Meryem Ammi and Salim Chikhi}, title = {A Generalized Island Model Based on Parallel and Cooperating Metaheuristics for Effective Large Capacitated Vehicle Routing Problem Solving}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {2}, pages = {141--155}, year = {2015}, url = {https://doi.org/10.2498/cit.1002465}, doi = {10.2498/CIT.1002465}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/AmmiC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/BelfedhalF15, author = {Alaa Eddine Belfedhal and Kamel Mohamed Faraoun}, title = {Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {4}, pages = {317--328}, year = {2015}, url = {https://doi.org/10.2498/cit.1002639}, doi = {10.2498/CIT.1002639}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/BelfedhalF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/BusseHLMRRSSTZ15, author = {Johannes Busse and Bernhard G. Humm and Christoph L{\"{u}}bbert and Frank Moelter and Anatol Reibold and Matthias Rewald and Veronika Schl{\"{u}}ter and Bernhard Seiler and Erwin Tegtmeier and Thomas Zeh}, title = {Actually, What Does "Ontology" Mean?}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {1}, pages = {29--41}, year = {2015}, url = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2508}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/BusseHLMRRSSTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/ChakrabortyGNK15, author = {Arpita Chakraborty and Srinjoy Ganguly and Mrinal Kanti Naskar and Anupam Karmakar}, title = {Trust Integrated Congestion Aware Energy Efficient Routing forWireless Multimedia Sensor Networks {(TCEER)}}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {2}, pages = {95--109}, year = {2015}, url = {https://doi.org/10.2498/cit.1002480}, doi = {10.2498/CIT.1002480}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/ChakrabortyGNK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/DongEWZ15, author = {Ziqian (Cecilia) Dong and Randolph Espejo and Yu Wan and Wenjie Zhuang}, title = {Detecting and Locating Man-in-the-Middle Attacks in Fixed Wireless Networks}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {4}, pages = {283--293}, year = {2015}, url = {https://doi.org/10.2498/cit.1002530}, doi = {10.2498/CIT.1002530}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/DongEWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/DragulescuBV15, author = {Bogdan Dragulescu and Marian Bucos and Radu Vasiu}, title = {Social Network Analysis on Educational Data Set in {RDF} Format}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {3}, pages = {269--281}, year = {2015}, url = {https://doi.org/10.2498/cit.1002645}, doi = {10.2498/CIT.1002645}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/DragulescuBV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/ElzamlyH15, author = {Abdelrafe Elzamly and Burairah Hussin}, title = {Modelling and Evaluating Software Project Risks with Quantitative Analysis Techniques in Planning Software Development}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {2}, pages = {123--139}, year = {2015}, url = {https://doi.org/10.2498/cit.1002457}, doi = {10.2498/CIT.1002457}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/ElzamlyH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Felice15, author = {Paolino Di Felice}, title = {Towards a Software Tool Supporting Urban Decision Makers in Locating and Sizing the Household Garbage Accumulation Points Within Cities}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {3}, pages = {211--229}, year = {2015}, url = {https://doi.org/10.2498/cit.1002416}, doi = {10.2498/CIT.1002416}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Felice15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/GhanemDVS15, author = {Khadoudja Ghanem and Amer Draa and Elvis Vyumvuhore and Ars{\`{e}}ne Simbabawe}, title = {Differential Evolution to Optimize Hidden Markov Models Training: Application to Facial Expression Recognition}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {2}, pages = {157--170}, year = {2015}, url = {https://doi.org/10.2498/cit.1002412}, doi = {10.2498/CIT.1002412}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/GhanemDVS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Glavinic15, author = {Vlado Glavinic}, title = {Editorial}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {2}, pages = {i--ii}, year = {2015}, url = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2732}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Glavinic15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Glavinic15a, author = {Vlado Glavinic}, title = {Editorial}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {3}, pages = {i--ii}, year = {2015}, url = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2756}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Glavinic15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Glavinic15b, author = {Vlado Glavinic}, title = {Editorial}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {4}, pages = {i--ii}, year = {2015}, url = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2863}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Glavinic15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/HuangMZ15, author = {Ping Huang and Haibing Mu and Fei Zeng}, title = {Analysis on the Performance of Server-less {RFID} Searching Protocol}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {4}, pages = {295--302}, year = {2015}, url = {https://doi.org/10.2498/cit.1002549}, doi = {10.2498/CIT.1002549}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/HuangMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/IyiladeOV15, author = {Johnson Iyilade and Rita Orji and Julita Vassileva}, title = {Factors Influencing User's Attitude to Secondary Information Sharing and Usage}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {3}, pages = {231--244}, year = {2015}, url = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2535}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/IyiladeOV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Kulathuramaiyer15, author = {Narayanan Kulathuramaiyer and Hermann A. Maurer}, title = {A Survey of Communications and Collaborative Web Technologies}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {1}, pages = {1--18}, year = {2015}, url = {https://doi.org/10.2498/cit.1002507}, doi = {10.2498/CIT.1002507}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Kulathuramaiyer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/LiangTDW15, author = {Xiaoyuan Liang and Jie Tian and Xiaoning Ding and Guiling Wang}, title = {A Risk and Similarity Aware Application Recommender System}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {4}, pages = {303--315}, year = {2015}, url = {https://doi.org/10.2498/cit.1002537}, doi = {10.2498/CIT.1002537}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/LiangTDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/MaarryLB15, author = {Kinda El Maarry and Christoph Lofi and Wolf{-}Tilo Balke}, title = {Crowdsourcing for Query Processing on Web Data: {A} Case Study on the Skyline Operator}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {1}, pages = {43--60}, year = {2015}, url = {https://doi.org/10.2498/cit.1002509}, doi = {10.2498/CIT.1002509}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/MaarryLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/MaurerK15, author = {Hermann A. Maurer and Narayanan Kulathuramaiyer}, title = {Guest Editorial}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {1}, pages = {i}, year = {2015}, url = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2563}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/MaurerK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/McGuffeyLS15, author = {Charles McGuffey and Chen Liu and Stephanie Schuckers}, title = {Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {4}, pages = {329--340}, year = {2015}, url = {https://doi.org/10.2498/cit.1002764}, doi = {10.2498/CIT.1002764}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/McGuffeyLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/MehmoodK15, author = {Rizwan Mehmood and Petra Korica{-}Pehserl}, title = {The Web is Big Business}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {1}, pages = {19--27}, year = {2015}, url = {https://doi.org/10.2498/cit.1002513}, doi = {10.2498/CIT.1002513}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/MehmoodK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/NajarMN15, author = {Amir Shareghi Najar and Antonija Mitrovic and Kourosh Neshatian}, title = {Eye Tracking and Studying Examples: How Novices and Advanced Learners Study {SQL} Examples}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {2}, pages = {171--190}, year = {2015}, url = {https://doi.org/10.2498/cit.1002627}, doi = {10.2498/CIT.1002627}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/NajarMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/RenYZW15, author = {Min Ren and Feng Yang and Guangchun Zhou and Haiping Wang}, title = {Mining Individual Behavior Pattern Based on Semantic Knowledge Discovery of Trajectory}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {3}, pages = {245--254}, year = {2015}, url = {https://doi.org/10.2498/cit.1002578}, doi = {10.2498/CIT.1002578}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/RenYZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/ScerbakovES15, author = {Alexei Scerbakov and Martin Ebner and Nikolai Scerbakov}, title = {Using Cloud Services in a Modern Learning Management System}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {1}, pages = {75--86}, year = {2015}, url = {https://doi.org/10.2498/cit.1002517}, doi = {10.2498/CIT.1002517}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/ScerbakovES15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Serdyukov15, author = {Peter Serdyukov}, title = {Does Online Education Need a Special Pedagogy?}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {1}, pages = {61--74}, year = {2015}, url = {https://doi.org/10.2498/cit.1002511}, doi = {10.2498/CIT.1002511}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Serdyukov15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/ShyamalaP15, author = {Coimbatore Kandasamy Shyamala and Tattamangalam Ramachandran Padmanabhan}, title = {An Integrated Distributed Storage Design Offering Data Retrievability and Recoverability Using Soft Decision Decoding of Block Codes}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {3}, pages = {191--210}, year = {2015}, url = {https://doi.org/10.2498/cit.1002490}, doi = {10.2498/CIT.1002490}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/ShyamalaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/TangC15, author = {Lijun Tang and Xu Chen}, title = {Ontology-Based Semantic Retrieval for Education Management Systems}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {3}, pages = {255--267}, year = {2015}, url = {https://doi.org/10.2498/cit.1002493}, doi = {10.2498/CIT.1002493}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/TangC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/White15, author = {Bebo White}, title = {Discovering the Future of the Web}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {1}, pages = {87--93}, year = {2015}, url = {https://doi.org/10.2498/cit.1002516}, doi = {10.2498/CIT.1002516}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/White15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/YangLF15, author = {Ching{-}Nung Yang and Jia{-}Bin Lai and Zhangjie Fu}, title = {Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {4}, pages = {341--355}, year = {2015}, url = {https://doi.org/10.2498/cit.1002593}, doi = {10.2498/CIT.1002593}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/YangLF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/ZhaoK15, author = {Hong Zhao and Kevin A. Kwiat}, title = {Guest Editorial}, journal = {J. Comput. Inf. Technol.}, volume = {23}, number = {4}, pages = {iii--iv}, year = {2015}, url = {http://cit.srce.unizg.hr/index.php/CIT/article/view/2833}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/ZhaoK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.