


default search action
Central European Journal of Computer Science, Volume 2
Volume 2, Number 1, March 2012
- Steven Braeger, Nicholas Arnold, Damian Dechev:

Scalable n-body event prediction. 1-15 - Wolfgang Kramper, Ralf Wanker, Karl-Heinz Zimmermann:

Analysis of swarm behavior using compound eye and neural network control. 16-32 - T. S. Ghouse Basha, M. N. Giri Prasad, P. V. Sridevi:

Beam forming in smart antenna with improved gain and suppressed interference using genetic algorithm. 33-46 - Mohammad Taherdangkoo, Mehran Yazdi

, Mohammad Hadi Bagheri:
A powerful and efficient evolutionary optimization algorithm based on stem cells algorithm for data clustering. 47-59 - Saru Kumari

, Mridul Kumar Gupta
, Manoj Kumar:
Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. 60-75 - Mohammad Ayoub Khan, Abdul Quaiyum Ansari

:
Area-efficient programmable arbiter for inter-layer communications in 3-D network-on-chip. 76-85 - Anooj Padmakumari Kunjunninair:

Erratum to: "Clinical decision support system: risk level prediction of heart disease using weighted fuzzy rules and decision tree rules". 86
Volume 2, Number 2, June 2012
- Poulcheria Benou, Costas Vassilakis

:
A context management architecture for m-commerce applications. 87-117 - Abe Hall, Michael Gabilondo, Damian Dechev:

Using parallelization to improve the efficiency of an automated taxi route generation algorithm. 118-127 - Urszula Boryczka, Przemyslaw Juszczuk

:
A new evolutionary approach for computing Nash equilibria in bimatrix games with known support. 128-142 - Christoph Lass

:
Minimal number of clues for Sudokus. 143-151 - B. B. V. L. Deepak

, Dayal R. Parhi
:
PSO based path planner of an autonomous mobile robot. 152-168
Volume 2, Number 3, October 2012
- Valerie Novitzká, Juraj Giertl, William Steingartner

:
Selected Papers from the International Scientific Conference INFORMATICS'2011. 169 - Jaroslav Zendulka, Martin Pesek:

Mining moving object data. 183-193 - Mykola S. Nikitchenko

, Valentyn G. Tymofieiev:
Satisfiability in composition-nominative logics. 194-213 - Daniel Mihályi, Valerie Novitzká, Martina Lalová:

Intrusion detection system episteme. 214-221 - Ivan Petko, Stefan Hudák:

General composition for high level Petri nets and its properties. 222-235 - Ján Gamec, Daniel Urdzik, Mária Gamcová:

Algorithm of traffic signs recognition based on the rapid transform. 236-244 - Erika Baksa-Varga, László Kovács:

Modeling generalization and specialization with Extended Conceptual Graphs. 245-260 - Branislav Sobota

, Stefan Korecko
, Frantisek Hrozek:
On building an object-oriented parallel virtual reality system. 261-271 - Frantisek Hrozek, Branislav Sobota

, Csaba Szabó
:
Digital preservation of historical buildings using virtual reality technologies. 272-282 - Milan Nosál

, Jaroslav Porubän
:
Supporting multiple configuration sources using abstraction. 283-299 - Michaela Bacíková, Jaroslav Porubän

:
Analyzing stereotypes of creating graphical user interfaces. 300-315 - Darko Galinec, William Steingartner

, Danijel Macanga:
Command and control information systems semantic interoperability using a canonical messaging approach. 316-330 - Adrián Pekár

, Martin Révés, Juraj Giertl, Peter Fecilak:
Overview and insight into the MONICA research group. 331-343 - Katarína Kleinová, Peter Fecilak

:
New approach to remote laboratory in regard to topology change and self-repair feature. 344-353 - Mikulás Alexík:

Process models using hardware in simulation loop. 354-366
Volume 2, Number 4, December 2012
- Muhammad Kashif Hanif

, Karl-Heinz Zimmermann:
Graphics card processing: accelerating profile-profile alignment. 367-388 - Aleksandr Cariow

, Galina Cariowa
:
Rationalized algorithm for computing the product of two sedenions. 389-397 - Adrian-Gabriel Chifu

, Radu Tudor Ionescu:
Word sense disambiguation to improve precision for ambiguous queries. 398-411 - Marek Kozlowski:

Introducing OGR - a new approach to anonymous IP datagram transmission based on the Chaumian 'onion' encryption and the KISS principle. 412-425 - Aloysius George, D. Binu

:
DRL-Prefixspan: A novel pattern growth algorithm for discovering downturn, revision and launch (DRL) sequential patterns. 426-439 - Dariusz Jacek Jakóbczak

:
Application of Hurwitz-Radon matrices in curve interpolation and almost-smoothing. 440-458

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














