Search dblp for Publications

export results for "toc:db/journals/cit/cit28.bht:"

 download as .bib file

@article{DBLP:journals/cit/ChenHLZHS20,
  author       = {Ye Chen and
                  Zhihu Hong and
                  Yaohua Liao and
                  Mengmeng Zhu and
                  Tong Han and
                  Quan Shen},
  title        = {Automatic Detection of Display Defects for Smart Meters based on Deep
                  Learning},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {4},
  pages        = {241--254},
  year         = {2020},
  url          = {http://cit.fer.hr/index.php/CIT/article/view/5158},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cit/ChenHLZHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/FengZQ20,
  author       = {Jian Feng and
                  Ying Zhang and
                  Yuqiang Qiao},
  title        = {A Detection Method for Phishing Web Page Using DOM-Based Doc2Vec Model},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {1},
  pages        = {19--31},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1004899},
  doi          = {10.20532/CIT.2020.1004899},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/FengZQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/JiangLZWZLZW20,
  author       = {Zhouxian Jiang and
                  Honghui Li and
                  Dalin Zhang and
                  Rui Wang and
                  Junwen Zhang and
                  Xiuru Li and
                  Meng Zhang and
                  Penghao Wang},
  title        = {A Review of Software Reliability Testing Techniques},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {3},
  pages        = {147--164},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1005155},
  doi          = {10.20532/CIT.2020.1005155},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cit/JiangLZWZLZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Karaata20,
  author       = {Mehmet Hakan Karaata},
  title        = {Algorithms for Finding Diameter Cycles of Biconnected Graphs},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {4},
  pages        = {225--240},
  year         = {2020},
  url          = {http://cit.fer.hr/index.php/CIT/article/view/5136},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cit/Karaata20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/KotekaniV20,
  author       = {Shamitha S. Kotekani and
                  Ilango Velchamy},
  title        = {An Effective Data Sampling Procedure for Imbalanced Data Learning
                  on Health Insurance Fraud Detection},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {4},
  pages        = {269--285},
  year         = {2020},
  url          = {http://cit.fer.hr/index.php/CIT/article/view/5216},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cit/KotekaniV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Li20,
  author       = {Fengquan Li},
  title        = {A Markov-Based Intrusion Tolerance Finite Automaton},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {2},
  pages        = {89--100},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1005178},
  doi          = {10.20532/CIT.2020.1005178},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Li20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Li20a,
  author       = {Yanhua Li},
  title        = {Audit Risk Evaluation Model for Financial Statement Based on Artificial
                  Intelligence},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {3},
  pages        = {207--223},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1005180},
  doi          = {10.20532/CIT.2020.1005180},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Li20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/MaZY20,
  author       = {Ruizhe Ma and
                  Diwei Zheng and
                  Li Yan},
  title        = {Fast Online Similarity Search for Uncertain Time Series},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {1},
  pages        = {1--17},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1004574},
  doi          = {10.20532/CIT.2020.1004574},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/MaZY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/MaZY20a,
  author       = {Ruizhe Ma and
                  Xiaoping Zhu and
                  Li Yan},
  title        = {A Hybrid Approach for Clustering Uncertain Time Series},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {4},
  pages        = {255--267},
  year         = {2020},
  url          = {http://cit.fer.hr/index.php/CIT/article/view/4802},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cit/MaZY20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/MedicS20,
  author       = {Zoran Medic and
                  Jan Snajder},
  title        = {A Survey of Citation Recommendation Tasks and Methods},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {3},
  pages        = {183--205},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1005160},
  doi          = {10.20532/CIT.2020.1005160},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/MedicS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/MohammedH20,
  author       = {Suhaila Najim Mohammed and
                  Alia Karim Abdul Hassan},
  title        = {A Survey on Emotion Recognition for Human Robot Interaction},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {2},
  pages        = {125--146},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1004841},
  doi          = {10.20532/CIT.2020.1004841},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/MohammedH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/NaickerM20,
  author       = {Nalindren Naicker and
                  Manoj S. Maharaj},
  title        = {Investigating Secure Agile Requirements Engineering Practices in Software
                  Development},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {1},
  pages        = {33--58},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1004868},
  doi          = {10.20532/CIT.2020.1004868},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/NaickerM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Office20,
  author       = {C. I. T. Editorial Office},
  title        = {Editorial for Vol.28, No.1},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {1},
  pages        = {i--ii},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1005054},
  doi          = {10.20532/CIT.2020.1005054},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Office20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Office20a,
  author       = {C. I. T. Editorial Office},
  title        = {Editorial for Vol.28, No.2},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {2},
  pages        = {i--ii},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1005264},
  doi          = {10.20532/CIT.2020.1005264},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Office20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Office20b,
  author       = {C. I. T. Editorial Office},
  title        = {Editorial for Vol.28, No.3},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {3},
  pages        = {i--ii},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1005278},
  doi          = {10.20532/CIT.2020.1005278},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Office20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Office20c,
  author       = {C. I. T. Editorial Office},
  title        = {Editorial for Vol.28, No.4},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {4},
  pages        = {i--ii},
  year         = {2020},
  url          = {http://cit.fer.hr/index.php/CIT/article/view/5308},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cit/Office20c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/ShalabiT20,
  author       = {Luai A. Al Shalabi and
                  Yousra Tahhan},
  title        = {A {WGFS} Based Approach to Extract Factors Influencing the Marketing
                  of Korean Language in {GCC}},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {3},
  pages        = {165--181},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1004996},
  doi          = {10.20532/CIT.2020.1004996},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cit/ShalabiT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Skorin-KapovS20,
  author       = {Darko Skorin{-}Kapov and
                  Jadranka Skorin{-}Kapov},
  title        = {Network Connectivity Game},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {2},
  pages        = {73--87},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1005188},
  doi          = {10.20532/CIT.2020.1005188},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Skorin-KapovS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/SunL20,
  author       = {Junju Sun and
                  Liyun Lin},
  title        = {A Nonlinear System Identification Method Based on Adaptive Neural
                  Network},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {2},
  pages        = {111--123},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1005179},
  doi          = {10.20532/CIT.2020.1005179},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/SunL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/X20,
  title        = {Impressum},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {1},
  year         = {2020},
  url          = {http://cit.fer.hr/index.php/CIT/article/view/5055},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/X20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/X20a,
  title        = {Impressum},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {2},
  year         = {2020},
  url          = {http://cit.fer.hr/index.php/CIT/article/view/5269},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/X20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/X20b,
  title        = {Impressum},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {3},
  year         = {2020},
  url          = {http://cit.fer.hr/index.php/CIT/article/view/5289},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/X20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/ZargayounaZ20,
  author       = {Mahdi Zargayouna and
                  Besma Zeddini},
  title        = {Dispatching Requests for Agent-Based Online Vehicle Routing Problems
                  with Time Windows},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {1},
  pages        = {59--72},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1004374},
  doi          = {10.20532/CIT.2020.1004374},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/ZargayounaZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/ZhangM20,
  author       = {Zhihua Zhang and
                  Yongmin Mu},
  title        = {Fault Localization Based on Hybrid Genetic Simulated Annealing Algorithm},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {28},
  number       = {2},
  pages        = {101--109},
  year         = {2020},
  url          = {https://doi.org/10.20532/cit.2020.1005134},
  doi          = {10.20532/CIT.2020.1005134},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/ZhangM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics