CINXE.COM

ComSIS | Computer Science and Information Systems

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>ComSIS | Computer&nbsp;Science&nbsp;and&nbsp;Information&nbsp;Systems</title> <link rel="stylesheet" type="text/css" href="res/style1.css" /> </head> <body> <script type="text/javascript" src="res/wz_tooltip.js"></script> <script type="text/javascript" src="res/slide.js"></script> <div id="all"> <div id="header"> <h1>Computer&nbsp;Science&nbsp;and&nbsp;Information&nbsp;Systems</h1> </div> <!-- header --> <div id="main"> <div id="sidebar"> <p>About the journal</p> <ul> <li><a href="index.php">Home page</a></li> <li><a href="contact.php">Contact information</a></li> <li><a href="aims.php">Aims and scope</a></li> <li><a href="indexing.php">Indexing information</a></li> <li><a href="policies.php">Editorial policies</a></li> <li><a href="consortium.php">ComSIS consortium</a></li> <li><a href="boards.php">Journal boards</a></li> <li><a href="managing.php">Managing board</a></li> </ul> <p>For authors</p> <ul> <li><a href="information.php">Information for contributors</a></li> <li><a href="http://ojs.pmf.uns.ac.rs/index.php/comsis">Paper submission</a></li> <li><a href="submission.php">Article&nbsp;submission through&nbsp;OJS</a></li> <li><a href="copyright.php">Copyright transfer form</a></li> <li><a href="download.php">Download section</a></li> </ul> <p>For readers</p> <ul> <li><a href="archive.php?show=lstnew">Forthcoming articles</a></li> <li><a href="archive.php?show=vol2104">Current issue</a></li> <li><a href="archive.php">Archive</a></li> </ul> <p>For reviewers</p> <ul> <li><a href="http://ojs.pmf.uns.ac.rs/index.php/comsis">View and review submissions</a></li> </ul> <p>News</p> <ul> <li><a href="https://www.facebook.com/ComSISJournal/"> <img src="res/fb.png" alt="FB"/> Journal's Facebook page</a></li> <li><a href="cfp.php">Calls for special issues</a></li> <li><a href="notification.php">New issue notification</a></li> </ul> </div> <!-- sidebar --> <div id="content"> <!-- BEGIN --> <h1>Volume 14, Issue 2 (June 2017)</h1><h2></h2><p><a href="/archive.php?show=pag1402">Editorial</a></p><h2>Regular papers</h2><p><a class="hidden" href="/archive.php?show=ppr571-1511">Performance Evaluation and Implementation of IP and Robust Header Compression Schemes for TCP and UDP Traffic in Static and DynamicWireless Contexts<br/><em>Máté Tömösközi, Patrick Seeling, Péter Ekler and Frank H.P. Fitzek</em></a><br/>[ <a href="/archive.php?show=ppr571-1511">view</a> | <a href="pdf.php?id=571-1511">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Tömösközi, M., Seeling, P., Ekler, P., Fitzek, F. H.: Performance Evaluation and Implementation of IP and Robust Header Compression Schemes for TCP and UDP Traffic in Static and DynamicWireless Contexts. Computer Science and Information Systems, Vol. 14, No. 2, 283-308. (2017), https://doi.org/10.2298/CSIS151101006T</span></span></p><p><a class="hidden" href="/archive.php?show=ppr586-1603">Variable Neighborhood Search for solving Bandwidth Coloring Problem<br/><em>Dragan Matić, Jozef Kratica and Vladimir Filipović</em></a><br/>[ <a href="/archive.php?show=ppr586-1603">view</a> | <a href="pdf.php?id=586-1603">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Matić, D., Kratica, J., Filipović, V.: Variable Neighborhood Search for solving Bandwidth Coloring Problem. Computer Science and Information Systems, Vol. 14, No. 2, 309–327. (2017), https://doi.org/10.2298/CSIS160320012M</span></span></p><p><a class="hidden" href="/archive.php?show=ppr583-1602">Integer Arithmetic Approximation of the HoG Algorithm used for Pedestrian Detection<br/><em>Srđan Sladojević, Andraš Anderla, Dubravko Ćulibrk, Darko Stefanović1 and Bojan Lalić</em></a><br/>[ <a href="/archive.php?show=ppr583-1602">view</a> | <a href="pdf.php?id=583-1602">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Sladojević, S., Anderla, A., Ćulibrk, D., Stefanović1, D., Lalić, B.: Integer Arithmetic Approximation of the HoG Algorithm used for Pedestrian Detection. Computer Science and Information Systems, Vol. 14, No. 2, 329-346. (2017), https://doi.org/10.2298/CSIS160229011S</span></span></p><p><a class="hidden" href="/archive.php?show=ppr596-1606">R-Tree for Phase Change Memory<br/><em>Elkhan Jabarov, Byung-Won On, Gyu Sang Choi and Myong-Soon Park</em></a><br/>[ <a href="/archive.php?show=ppr596-1606">view</a> | <a href="pdf.php?id=596-1606">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Jabarov, E., On, B., Choi, G. S., Park, M.: R-Tree for Phase Change Memory. Computer Science and Information Systems, Vol. 14, No. 2, 347–367. (2017), https://doi.org/10.2298/CSIS160620008J</span></span></p><p><a class="hidden" href="/archive.php?show=ppr601-1608">A Flash-Aware Buffering Scheme with the On-the-Fly Redo for Efficient Data Management in Flash Storage<br/><em>Kyosung Jeong, Sungchae Lim, Kichun Lee and Sang-Wook Kim</em></a><br/>[ <a href="/archive.php?show=ppr601-1608">view</a> | <a href="pdf.php?id=601-1608">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Jeong, K., Lim, S., Lee, K., Kim, S.: A Flash-Aware Buffering Scheme with the On-the-Fly Redo for Efficient Data Management in Flash Storage. Computer Science and Information Systems, Vol. 14, No. 2. (2017), https://doi.org/369–392</span></span></p><p><a class="hidden" href="/archive.php?show=ppr582-1602">Effort Estimation in Global Software Development - A Systematic Review<br/><em>Dilani Wickramaarachchi and Richard Lai</em></a><br/>[ <a href="/archive.php?show=ppr582-1602">view</a> | <a href="pdf.php?id=582-1602">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Wickramaarachchi, D., Lai, R.: Effort Estimation in Global Software Development - A Systematic Review. Computer Science and Information Systems, Vol. 14, No. 2, 393–421. (2017), https://doi.org/10.2298/CSIS160229007W</span></span></p><p><a class="hidden" href="/archive.php?show=ppr570-1511">Preserving Use Case Flows in Source Code: Approach, Context, and Challenges<br/><em>Michal Bystrický and Valentino Vranić</em></a><br/>[ <a href="/archive.php?show=ppr570-1511">view</a> | <a href="pdf.php?id=570-1511">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Bystrický, M., Vranić, V.: Preserving Use Case Flows in Source Code: Approach, Context, and Challenges. Computer Science and Information Systems, Vol. 14, No. 2, 423–445. (2017), https://doi.org/10.2298/CSIS151101005B</span></span></p><p><a class="hidden" href="/archive.php?show=ppr606-1610">REST API Example Generation Using Javadoc<br/><em>Petri Rantanen</em></a><br/>[ <a href="/archive.php?show=ppr606-1610">view</a> | <a href="pdf.php?id=606-1610">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Rantanen, P.: REST API Example Generation Using Javadoc. Computer Science and Information Systems, Vol. 14, No. 2, 447–466. (2017), https://doi.org/10.2298/CSIS161022009R</span></span></p><p><a class="hidden" href="/archive.php?show=ppr561-1507">LTR – MDTS structure – A structure for Multiple Dependent Time Series Prediction<br/><em>Predrag Pecev and Miloš Racković</em></a><br/>[ <a href="/archive.php?show=ppr561-1507">view</a> | <a href="pdf.php?id=561-1507">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Pecev, P., Racković, M.: LTR – MDTS structure – A structure for Multiple Dependent Time Series Prediction. Computer Science and Information Systems, Vol. 14, No. 2, 467–490. (2017), https://doi.org/10.2298/CSIS150815004P</span></span></p><p><a class="hidden" href="/archive.php?show=ppr594-1606">An Online-Processing Critical Patient Monitoring System- An Interoperability Overview<br/><em>Filipe Portela, Filipe Miranda, Manuel Filipe Santos, António Abelha and José Machado</em></a><br/>[ <a href="/archive.php?show=ppr594-1606">view</a> | <a href="pdf.php?id=594-1606">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Portela, F., Miranda, F., Santos, M. F., Abelha, A., Machado, J.: An Online-Processing Critical Patient Monitoring System- An Interoperability Overview. Computer Science and Information Systems, Vol. 14, No. 2, 491–515. (2017), https://doi.org/10.2298/CSIS160604013P</span></span></p><h2>Special section: Advanced Information Engineering Systems</h2><p><a class="hidden" href="/archive.php?show=pprcaise5016">Visual Requirements Modeling for Cross-Device Systems<br/><em>Dennis Wolters, Christian Gerth and Gregor Engels</em></a><br/>[ <a href="/archive.php?show=pprcaise5016">view</a> | <a href="pdf.php?id=caise5016">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Wolters, D., Gerth, C., Engels, G.: Visual Requirements Modeling for Cross-Device Systems. Computer Science and Information Systems, Vol. 14, No. 2, 517-536. (2017), https://doi.org/10.2298/CSIS160930015W</span></span></p><p><a class="hidden" href="/archive.php?show=pprcaise4974">Modeling the Delivery of Security Advisories and CVEs<br/><em>Jukka Ruohonen, Sami Hyrynsalmi and Ville Leppänen</em></a><br/>[ <a href="/archive.php?show=pprcaise4974">view</a> | <a href="pdf.php?id=caise4974">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Ruohonen, J., Hyrynsalmi, S., Leppänen, V.: Modeling the Delivery of Security Advisories and CVEs. Computer Science and Information Systems, Vol. 14, No. 2, 537–555. (2017), https://doi.org/10.2298/CSIS161010010R</span></span></p><p><a class="hidden" href="/archive.php?show=pprcaise5039">A Conceptual Model to Support Security Analysis in the Internet of Things<br/><em>Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis and Christos Kalloniatis</em></a><br/>[ <a href="/archive.php?show=pprcaise5039">view</a> | <a href="pdf.php?id=caise5039">download</a> | <a class="cite">cite</a> ]<br/><span class="citation"><span>Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E., Kalloniatis, C.: A Conceptual Model to Support Security Analysis in the Internet of Things. Computer Science and Information Systems, Vol. 14, No. 2, 557–578. (2017), https://doi.org/10.2298/CSIS160110016M</span></span></p> <!-- END --> </div> <!-- content --> </div> <!-- main --> <div id="footer_top"> </div> <div id="footer"> <div class="left">Faculty of Sciences, Trg Dositeja Obradovi&#263;a 3, 21000 Novi Sad, Serbia, <a href="mailto:comsis@uns.ac.rs">comsis@uns.ac.rs</a></div> <div class="left">Published by ComSIS Consortium under<br/><a rel="license" href="http://creativecommons.org/licenses/by-nc-nd/4.0/">Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License<br><img alt="Creative Commons License" style="border-width:0" src="https://i.creativecommons.org/l/by-nc-nd/4.0/88x31.png"/></a></div> <div class="clearer">&nbsp;</div> </div> <!-- footer --> </div> <!-- all --> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10