Using part-of-speech tags as deep-syntax indicators in determining short-text semantic similarityBatanović Vuk, Bojić Dragan
Computer Science and Information Systems, 2015 12(1):1-31
Details  
Cross Ref cited by(7) Full text (
602 KB)
https://doi.org/10.2298/CSIS131127082B
Betweenness versus LinerankKósa Balázs, Balassi Márton, Englert Péter, Kiss Attila
Computer Science and Information Systems, 2015 12(1):33-48
Details  
Cross Ref cited by(2) Full text (
629 KB)
https://doi.org/10.2298/CSIS141101092K
Fast DCT algorithms for EEG data compression in embedded systemsBirvinskas Darius, Jusas Vacius, Martisius Ignas, Damasevicius Robertas
Computer Science and Information Systems, 2015 12(1):49-62
Details  
Cross Ref cited by(17) Full text (
130 KB)
https://doi.org/10.2298/CSIS140101083B
Developing a fuzzy logic based system for monitoring and early detection of residential fire based on thermistor sensorsMaksimović Mirjana, Vujović Vladimir,
Perišić Branko , Milošević Vladimir
Computer Science and Information Systems, 2015 12(1):63-89
Details  
Cross Ref cited by(13) Full text (
917 KB)
https://doi.org/10.2298/CSIS140330090M
Distributed and collaborative Web Change Detection systemPrieto Víctor M., Álvarez Manuel, Carneiro Víctor, Cacheda Fidel
Computer Science and Information Systems, 2015 12(1):91-114
Details  
Cross Ref cited by(2) Full text (
1311 KB)
https://doi.org/10.2298/CSIS131120081P
Customized QoS-based mashups for the web of things: An application of AHPVesyropoulos Nikos, Georgiadis Christos K.
Computer Science and Information Systems, 2015 12(1):115-133
Details  
Full text (
363 KB)
https://doi.org/10.2298/CSIS140108085V
Academic data warehouse design using a hybrid methodologyDi Tria Francesco, Lefons Ezio, Tangorra Filippo
Computer Science and Information Systems, 2015 12(1):135-160
Details  
Cross Ref cited by(6) Full text (
735 KB)
https://doi.org/10.2298/CSIS140325087D
Security in cloud computing: A mapping studyCruz Zapata Belén, Fernández-Alemán José Luis, Toval Ambrosio
Computer Science and Information Systems, 2015 12(1):161-184
Details  
Cross Ref cited by(8) Full text (
613 KB)
https://doi.org/10.2298/CSIS140205086C
Exploiting geotagged resources to spatial ranking by extending HITS algorithmTri Nguyen Tuong, Jung Jason J.
Computer Science and Information Systems, 2015 12(1):185-201
Details  
Cross Ref cited by(9) Full text (
548 KB)
https://doi.org/10.2298/CSIS141015091T
A software engineering model for the development of adaptation rules and its application in a hinting adaptive e-learning systemMuñoz-Merino Pedro J., Kloos Carlos Delgado, Muñoz-Organero Mario, Pardo Abelardo
Computer Science and Information Systems, 2015 12(1):203-231
Details  
Cross Ref cited by(2) Full text (
650 KB)
https://doi.org/10.2298/CSIS140103084M