A lane-changing behavioral preferences learning agent with its applicationsJian Wang, Baigen Cai, Jiang Liu, Wei Shangguan
Computer Science and Information Systems, 2015 12(2):349-374
Details  
Full text (
825 KB)
https://doi.org/10.2298/CSIS141229016J
Model-driven Java code refactoringHamioud Sohaib, Atil Fadila
Computer Science and Information Systems, 2015 12(2):375-403
Details  
Cross Ref cited by(2) Full text (
912 KB)
https://doi.org/10.2298/CSIS141025015H
Edge-texture 2D image quality metrics suitable for evaluation of image interpolation algorithmsMaksimović-Moićević Sanja, Lukač Željko, Temerinac Miodrag
Computer Science and Information Systems, 2015 12(2):405-425
Details  
Cross Ref cited by(2) Full text (
1052 KB)
https://doi.org/10.2298/CSIS140402003M
Optimization design of traffic flow under security based on cellular automata modelZhang Fan, Han Zhike, Ge Hanyu, Zhu Yingping
Computer Science and Information Systems, 2015 12(2):427-443
Details  
Cross Ref cited by(3) Full text (
657 KB)
https://doi.org/10.2298/CSIS141228008Z
Adaptive mobile visualization - the chameleon frameworkPombinho Paulo, Carmo Maria Beatriz, Afonso Ana Paula
Computer Science and Information Systems, 2015 12(2):445-464
Details  
Cross Ref cited by(3) Full text (
720 KB)
https://doi.org/10.2298/CSIS140607004P
K-best max-margin approaches for sequence labelingMančev Dejan,
Todorović Branimir Computer Science and Information Systems, 2015 12(2):465-486
Details  
Full text (
317 KB)
https://doi.org/10.2298/CSIS140713014M
EUR/RSD exchange rate forecasting using hybrid wavelet-neural model: A case studyBozić Jovana, Babić Đorđe
Computer Science and Information Systems, 2015 12(2):487-508
Details  
Cross Ref cited by(3) Full text (
663 KB)
https://doi.org/10.2298/CSIS140728005B
Business process model and notation: The current state of affairsKocbek Mateja, Jošt Gregor, Heričko Marjan, Polančič Gregor
Computer Science and Information Systems, 2015 12(2):509-539
Details  
Cross Ref cited by(27) Full text (
841 KB)
https://doi.org/10.2298/CSIS140610006K
An MDA approach for developing secure OLAP applications: Metamodels and transformationsBlanco Carlos, de Guzmán Ignacio García-Rodríguez, Fernández-Medina Eduardo, Trujillo Juan
Computer Science and Information Systems, 2015 12(2):541-565
Details  
Cross Ref cited by(2) Full text (
974 KB)
https://doi.org/10.2298/CSIS140617007B
Fuzzified risk management: Selection of safeguards to minimize the maximum riskVicente Eloy, Mateos Alfonso, Jiménez-Martín Antonio
Computer Science and Information Systems, 2015 12(2):567-585
Details  
Full text (
559 KB)
https://doi.org/10.2298/CSIS140925017V