Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cit/cit28.bht:"
@article{DBLP:journals/cit/ChenHLZHS20, author = {Ye Chen and Zhihu Hong and Yaohua Liao and Mengmeng Zhu and Tong Han and Quan Shen}, title = {Automatic Detection of Display Defects for Smart Meters based on Deep Learning}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {4}, pages = {241--254}, year = {2020}, url = {http://cit.fer.hr/index.php/CIT/article/view/5158}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cit/ChenHLZHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/FengZQ20, author = {Jian Feng and Ying Zhang and Yuqiang Qiao}, title = {A Detection Method for Phishing Web Page Using DOM-Based Doc2Vec Model}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {1}, pages = {19--31}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1004899}, doi = {10.20532/CIT.2020.1004899}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/FengZQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/JiangLZWZLZW20, author = {Zhouxian Jiang and Honghui Li and Dalin Zhang and Rui Wang and Junwen Zhang and Xiuru Li and Meng Zhang and Penghao Wang}, title = {A Review of Software Reliability Testing Techniques}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {3}, pages = {147--164}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1005155}, doi = {10.20532/CIT.2020.1005155}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cit/JiangLZWZLZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Karaata20, author = {Mehmet Hakan Karaata}, title = {Algorithms for Finding Diameter Cycles of Biconnected Graphs}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {4}, pages = {225--240}, year = {2020}, url = {http://cit.fer.hr/index.php/CIT/article/view/5136}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cit/Karaata20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/KotekaniV20, author = {Shamitha S. Kotekani and Ilango Velchamy}, title = {An Effective Data Sampling Procedure for Imbalanced Data Learning on Health Insurance Fraud Detection}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {4}, pages = {269--285}, year = {2020}, url = {http://cit.fer.hr/index.php/CIT/article/view/5216}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cit/KotekaniV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Li20, author = {Fengquan Li}, title = {A Markov-Based Intrusion Tolerance Finite Automaton}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {2}, pages = {89--100}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1005178}, doi = {10.20532/CIT.2020.1005178}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Li20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Li20a, author = {Yanhua Li}, title = {Audit Risk Evaluation Model for Financial Statement Based on Artificial Intelligence}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {3}, pages = {207--223}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1005180}, doi = {10.20532/CIT.2020.1005180}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Li20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/MaZY20, author = {Ruizhe Ma and Diwei Zheng and Li Yan}, title = {Fast Online Similarity Search for Uncertain Time Series}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {1}, pages = {1--17}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1004574}, doi = {10.20532/CIT.2020.1004574}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/MaZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/MaZY20a, author = {Ruizhe Ma and Xiaoping Zhu and Li Yan}, title = {A Hybrid Approach for Clustering Uncertain Time Series}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {4}, pages = {255--267}, year = {2020}, url = {http://cit.fer.hr/index.php/CIT/article/view/4802}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cit/MaZY20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/MedicS20, author = {Zoran Medic and Jan Snajder}, title = {A Survey of Citation Recommendation Tasks and Methods}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {3}, pages = {183--205}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1005160}, doi = {10.20532/CIT.2020.1005160}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/MedicS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/MohammedH20, author = {Suhaila Najim Mohammed and Alia Karim Abdul Hassan}, title = {A Survey on Emotion Recognition for Human Robot Interaction}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {2}, pages = {125--146}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1004841}, doi = {10.20532/CIT.2020.1004841}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/MohammedH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/NaickerM20, author = {Nalindren Naicker and Manoj S. Maharaj}, title = {Investigating Secure Agile Requirements Engineering Practices in Software Development}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {1}, pages = {33--58}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1004868}, doi = {10.20532/CIT.2020.1004868}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/NaickerM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Office20, author = {C. I. T. Editorial Office}, title = {Editorial for Vol.28, No.1}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {1}, pages = {i--ii}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1005054}, doi = {10.20532/CIT.2020.1005054}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Office20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Office20a, author = {C. I. T. Editorial Office}, title = {Editorial for Vol.28, No.2}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {2}, pages = {i--ii}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1005264}, doi = {10.20532/CIT.2020.1005264}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Office20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Office20b, author = {C. I. T. Editorial Office}, title = {Editorial for Vol.28, No.3}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {3}, pages = {i--ii}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1005278}, doi = {10.20532/CIT.2020.1005278}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Office20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Office20c, author = {C. I. T. Editorial Office}, title = {Editorial for Vol.28, No.4}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {4}, pages = {i--ii}, year = {2020}, url = {http://cit.fer.hr/index.php/CIT/article/view/5308}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cit/Office20c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/ShalabiT20, author = {Luai A. Al Shalabi and Yousra Tahhan}, title = {A {WGFS} Based Approach to Extract Factors Influencing the Marketing of Korean Language in {GCC}}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {3}, pages = {165--181}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1004996}, doi = {10.20532/CIT.2020.1004996}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cit/ShalabiT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Skorin-KapovS20, author = {Darko Skorin{-}Kapov and Jadranka Skorin{-}Kapov}, title = {Network Connectivity Game}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {2}, pages = {73--87}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1005188}, doi = {10.20532/CIT.2020.1005188}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Skorin-KapovS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/SunL20, author = {Junju Sun and Liyun Lin}, title = {A Nonlinear System Identification Method Based on Adaptive Neural Network}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {2}, pages = {111--123}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1005179}, doi = {10.20532/CIT.2020.1005179}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/SunL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/X20, title = {Impressum}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {1}, year = {2020}, url = {http://cit.fer.hr/index.php/CIT/article/view/5055}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/X20a, title = {Impressum}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {2}, year = {2020}, url = {http://cit.fer.hr/index.php/CIT/article/view/5269}, timestamp = {Wed, 23 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/X20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/X20b, title = {Impressum}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {3}, year = {2020}, url = {http://cit.fer.hr/index.php/CIT/article/view/5289}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/X20b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/ZargayounaZ20, author = {Mahdi Zargayouna and Besma Zeddini}, title = {Dispatching Requests for Agent-Based Online Vehicle Routing Problems with Time Windows}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {1}, pages = {59--72}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1004374}, doi = {10.20532/CIT.2020.1004374}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/ZargayounaZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/ZhangM20, author = {Zhihua Zhang and Yongmin Mu}, title = {Fault Localization Based on Hybrid Genetic Simulated Annealing Algorithm}, journal = {J. Comput. Inf. Technol.}, volume = {28}, number = {2}, pages = {101--109}, year = {2020}, url = {https://doi.org/10.20532/cit.2020.1005134}, doi = {10.20532/CIT.2020.1005134}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/ZhangM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.