default search action
Informatica (Slovenia), Volume 33
Volume 33, Number 1, 2009
- Shiguo Lian, Dimitris Kanellopoulos, Giancarlo Ruffo:
Editorial. 1-2 - Shiguo Lian, Dimitris Kanellopoulos, Giancarlo Ruffo:
Recent Advances in Multimedia Information System Security. 3-24 - S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj:
Detection of Stego Anomalies in Images Exploiting the Content Independent Statistical Footprints of the Steganograms. 25-40 - Xinpeng Zhang, Shuozhong Wang, Weiming Zhang:
Steganography Combining Data Decomposition Mechanism and Stego-coding Method. 41-48 - Hafiz Malik:
Blind Watermark Estimation Attack for Spread Spectrum Watermarking. 49-68 - Ye Yao, Zhengquan Xu, Jing Sun:
Visual Security Assessment for Cipher-Images based on Neighborhood Similarity. 69-76 - Marco Furini:
Secure, Portable, and Customizable Video Lectures for E-learning on the Move. 77-84 - Walter Allasia, Francesco Gallo, Marco Milanesio, Rossano Schifanella:
Indexing and Retrieval of Multimedia Metadata on a Secure DHT. 85-100 - Rok Gajsek, Vitomir Struc, France Mihelic, Anja Podlesek, Luka Komidar, Gregor Socan, Bostjan Bajec:
Multi-Modal Emotional Database: AvID. 101-106 - Damir Cavar, Ivo-Pavao Jazbec, Sinisa Runjaic:
Efficient Morphological Parsing with a Weighted Finite State Transducer. 107-113
Volume 33, Number 2, 2009
- Chiu-Hsiung Liao, Hon-Chan Chen, Ching-Te Wang:
An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card. 117-124 - Ami Marowka:
Routing Scalability in Multicore-Based Ad Hoc Networks. 125-134 - Melita Hajdinjak, Andrej Bauer:
Similarity Measures for Relational Databases. 135-141 - Sofiane Gherbi, Said Yahmedi, Moussa Sedraoui:
Robust H_Infinity Control of a Doubly Fed Asynchronous Machine. 143-150 - Mohsen Amini Salehi, Hossein Deldari, Bahare Mokarram Dorri:
Balancing Load in a Computational Grid Applying Adaptive, Intelligent Colonies of Ants. 151-159 - Zeljko Agic, Zdravko Dovedan, Marko Tadic:
Improving Part-of-Speech Tagging Accuracy for Croatian by Morphological Analysis. 161-167 - I. Elizabeth Shanthi, R. Nadarajan:
Applying SD-Tree for Object-Oriented query processing. 169-179 - Luka Pavlic, Marjan Hericko, Vili Podgorelec, Ivan Rozman:
Improving Design Pattern Adoption with An Ontology-Based Repository. 181-189 - William Leigh, Russell L. Purvis:
Historical Impulse Response of Return Analysis Shows Information Technology Improves Stock Market Efficiency. 191-195 - Mitja Lustrek, Bostjan Kaluza:
Fall Detection and Activity Recognition with Machine Learning. 197-204 - Ekambaram Naidu Mandalapu, E. G. Rajan:
Rajan Transform and its uses in Pattern Recognition. 205-212 - King Sing Cheung, Paul Kai-On Chow:
A Petri-Net Approach to Refining Object Behavioural Specifications. 213-224 - Gjorgji Madzarov, Dejan Gjorgjevikj, Ivan Chorbev:
A Multi-class SVM Classifier Utilizing Binary Decision Tree. 225-233 - Dzulijana Popovic, Bojana Dalbelo Basic:
Churn Prediction Model in Retail Banking Using Fuzzy C-Means Algorithm. 235-239
Volume 33, Number 3, 2009
- Reda Alhajj, Kang Zhang:
Special Issue on Information Reuse and Integration. 243 - Andres Folleco, Taghi M. Khoshgoftaar, Jason Van Hulse, Amri Napolitano:
Identifying Learners Robust to Low Quality Data. 245-259 - Behrouz H. Far, Vani Mudigonda, Abdel Halim Elamy:
A General Purpose Software Evaluation System. 261-270 - Tansel Özyer:
Online WordNet Based Tagging System for Social Sharing and Retrieval of Images on Visited Pages. 271-276 - Masahiro Shibata, Tomomi Nishiguchi, Yoichi Tomiura:
Dialog System for Open-Ended Conversation Using Web Documents. 277-284 - M. Faraz Rafi, Abbas K. Zaidi, Alexander H. Levis, P. Papantoni-Kazakos:
Optimization of Actions in Activation Timed Influence Nets. 285-296 - Taher Naser, Reda Alhajj, Mick J. Ridley:
Two-Way Mapping between Object-Oriented Databases and XML. 297-308 - James F. Glazebrook, Rodrick Wallace:
Rate Distortion Manifolds as Model Spaces for Cognitive Information. 309-345 - Marko Hölbl, Tatjana Welzer, Bostjan Brumen:
Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols. 347-355 - Delia Rusu, Blaz Fortuna, Marko Grobelnik, Dunja Mladenic:
Semantic Graphs Derived From Triplets with Application in Document Summarization. 357-362 - Przemyslaw Skibinski:
Improving HTML Compression. 363-373 - Henry Hexmoor, Shahram Rahimi, Jody T. Little:
Coordinated UAV Manoeuvring Flight Formation. 375-383 - Andrej Bregar, József Györkös, Matjaz B. Juric:
Robustness and Visualization of Decision Models. 385-395 - Saso Greiner:
Run-time Manipulation of Programs in a Statically-Typed Language. 397-398
Volume 33, Number 4, 2009
- Anna Derezinska:
Editor's Introduction to the Special Issue on System Modeling and Transformation Principles. 403 - Slawomir Samolej, Tomasz Rak:
Simulation and Performance Analysis of Distributed Internet Systems Using TCPNs. 405-415 - Tadeusz Pankowski, Tomasz Pilka:
Transformation of XML Data into XML Normal Form. 417-430 - Anna Derezinska, Romuald Pilitowski:
Realization of UML Class and State Machine Models in the C# Code Generation and Execution Framework. 431-440 - Vinod Patidar, Krishan K. Sud, Narendra K. Pareek:
A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing. 441-452 - Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang:
Computational Reduction of Wilson's Primality Test for Modern Cryptosystems. 453-458 - Samo Drobne, Anka Lisec:
Multi-attribute Decision Analysis in GIS: Weighted Linear Combination and Ordered Weighted Averaging. 459-474 - Ghassan J. Mohammed, Bingrong Hong, Ann A. Jarjes:
Eyeball Localization Based on Angular Integral Projection Function. 475-480 - Tzong-Sun Wu, Han-Yu Lin:
Secure Convertible Authenticated Encryption Scheme Based on RSA. 481-486 - Igor Kononenko, Matjaz Bevk:
Extended Symbolic Mining of Textures with Association Rules. 487-497 - Abdelkrim Amirat, Mourad Oussalah:
Systematic Construction of Software Architecture Supported by Enhanced First-Class Connectors. 499-509 - Monika Kapus-Kolar:
Improvements to a Roll-Back Mechanism for Asynchronous Checkpointing and Recovery. 511-519
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.