Building computers in Serbia: The first half of the digital century
Protić Jelica, Ristanović Dejan
Computer Science and Information Systems, 2011 8(3):549-571
Details  Full text ( 686 KB)  DOI:10.2298/CSIS110505021P
Workflow specification for interaction management between experts in a cooperative remote diagnosis process
Laredj M.A., Bouamrane K.
Computer Science and Information Systems, 2011 8(3):573-590
Details  Full text ( 382 KB)  DOI:10.2298/CSIS100326001L
Access control framework for XML document collections
Sladić Goran, Milosavljević Branko, Konjović Zora, Vidaković Milan
Computer Science and Information Systems, 2011 8(3):591-609
Details  Cross Ref cited by(1)  Full text ( 446 KB)  DOI:10.2298/CSIS100827002S
Feature diagram formalization based on directed hypergraphs
Laguna Miguel A., Marqués José M., Rodríguez-Cano Guillermo
Computer Science and Information Systems, 2011 8(3):611-633
Details  Full text ( 586 KB)  DOI:10.2298/CSIS100804016L
Integrating instance-level and attribute-level knowledge into document clustering
Wang Jinlong, Wu Shunyao, Li Gang, Wei Zhe
Computer Science and Information Systems, 2011 8(3):635-651
Details  Full text ( 331 KB)  DOI:10.2298/CSIS100906003W
Code cache management based on working set in dynamic binary translator
Ma Ruhui, Guan Haibing, Zhu Erzhou, Gao Yongqiang, Liang Alei
Computer Science and Information Systems, 2011 8(3):653-671
Details  Full text ( 239 KB)  DOI:10.2298/CSIS100327022M
Data extraction and annotation based on domain-specific ontology evolution for deep web
Kerui Chen, Zuo Wanli, He Fengling, Chen Yongheng, Wang Ying
Computer Science and Information Systems, 2011 8(3):673-692
Details  Full text ( 524 KB)  DOI:10.2298/CSIS101011023K
Extracting minimal unsatisfiable subformulas in satisfiability modulo theories
Zhang Jianmin, Shen Shengyu, Zhang Jun, Xu Weixia, Sikun LI.
Computer Science and Information Systems, 2011 8(3):693-710
Details  Full text ( 162 KB)  DOI:10.2298/CSIS101019024Z
Indexing temporal information for web pages
Jin Peiquan, Chen Hong, Zhao Xujian, Li Xiaowen, Yue Lihua
Computer Science and Information Systems, 2011 8(3):711-737
Details  Cross Ref cited by(1)  Full text ( 432 KB)  DOI:10.2298/CSIS100407025J
Parallel processing on block-based Gauss-Jordan algorithm for desktop grid
Shang Yizi, Lu Guiming, Shang Ling, Wang Guangqian
Computer Science and Information Systems, 2011 8(3):739-759
Details  Full text ( 1004 KB)  DOI:10.2298/CSIS100907026S
Problem solving by soaking the concept network
Fu Xixu, Wei Hui
Computer Science and Information Systems, 2011 8(3):761-778
Details  Full text ( 277 KB)  DOI:10.2298/CSIS100915027F
Research on discovering deep web entries
Wang Ying, Li Huilai, Zuo Wanli, He Fengling, Wang Xin, Chen Kerui
Computer Science and Information Systems, 2011 8(3):779-799
Details  Cross Ref cited by(1)  Full text ( 487 KB)  DOI:10.2298/CSIS100322028W
Study of privacy-preserving framework for cloud storage
Ruwei Huang, Xiaolin Gui, Si Yu, Wei Zhuang
Computer Science and Information Systems, 2011 8(3):801-819
Details  Cross Ref cited by(1)  Full text ( 625 KB)  DOI:10.2298/CSIS100327029R
SVM based forest fire detection using static and dynamic features
Zhao Jianhui, Zhang Zhong, Han Shizhong, Qu Chengzhang, Yuan Zhiyong, Zhang Dengyi
Computer Science and Information Systems, 2011 8(3):821-841
Details  Cross Ref cited by(2)  Full text ( 442 KB)  DOI:10.2298/CSIS101012030Z
The trustworthiness analyzing of interacting business process based on the induction information
Fang Xianwen, Jiang Changjun, Yin Zhixiang, Fan Xiaoqin
Computer Science and Information Systems, 2011 8(3):843-867
Details  Cross Ref cited by(1)  Full text ( 508 KB)  DOI:10.2298/CSIS100411031F
Voice activity detection method based on multivalued coarse-graining Lempel-Ziv complexity
Zhao Huan, Wang Gangjin, Xu Cheng, Yu Fei
Computer Science and Information Systems, 2011 8(3):869-888
Details  Full text ( 406 KB)  DOI:10.2298/CSIS100906032Z
Worst case performance bounds for multimedia flows in QoS-enhanced TNPOSS network
Xiong Ke, Zhang Yu, Wang Shenghui, Zhang Zhifei, Qiu Zhengding
Computer Science and Information Systems, 2011 8(3):890-908
Details  Full text ( 529 KB)  DOI:10.2298/CSIS101201033X
A two-tiered reliable application layer multicast
Xinchang Zhang, Yang Meihong, Geng Guanggang, Luo Wanming, Xingfeng Li
Computer Science and Information Systems, 2011 8(3):909-929
Details  Full text ( 600 KB)  DOI:10.2298/CSIS101223034X
Multi-scale image semantic recognition with hierarchical visual vocabulary
Jiang Xinghao, Sun Tanfeng, Guanglei Fu
Computer Science and Information Systems, 2011 8(3):931-951
Details  Cross Ref cited by(1)  Full text ( 610 KB)  DOI:10.2298/CSIS100423035J