Table of Contents
Articles
Towards the Formal Development of Software Based Systems: Access Control System as a Case Study | |
Ammar Boucherit, Laura M. Castro, Abdallah Khababa, Osman Hasan | 393 - 405 |
Low Energy Consumption and Data Redundancy Approach of Wireless Sensor Networks with Bigdata | |
Xunli Fan, Wei Wei, Marcin Wozniak, Ye Li | 406 - 418 |
A New State Machine Behaviour Model for Procedural Control Entities in Industrial Process Control Systems | |
Giovanni Godena, Stanko Strmčnik | 419 - 430 |
Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee’s Scheme | |
Azeem Irshad, Husnain Naqvi, Shehzad Ashraf Chaudhary, Muhammad Usman, Muhammad Shafiq, Omid Mir, Ambrina Kanwal | 431 - 446 |
Soft Variable Structure Control of Linear Systems via Desired Pole Paths | |
Mojtaba Kaheni, Mohammad Hadad Zarif, Ali Akbarzadeh Kalat, Mohammad Sami Fadali | 447 - 456 |
Extended Feature Spaces Based Classifier Ensembles for Sentiment Analysis of Short Texts | |
Zeynep Hilal Kilimci, Sevinç İlhan Omurca | 457 - 470 |
Variable Neighborhood Search Methods for the Dynamic Minimum Cost Hybrid Berth Allocation Problem | |
Nataša Kovač, Tatjana Davidović, Zorica Stanimirović | 471 - 488 |
Two Faces of the Framework for Analysis and Prediction, Part 2 - Research | |
Vladimir Kurbalija, Mirjana Ivanović, Zoltan Geler, Miloš Radovanović | 489 - 502 |
A NEW HYBRID GENETIC ALGORITHM FOR THE GREY PATTERN QUADRATIC ASSIGNMENT PROBLEM | |
Alfonsas Misevičius, Evelina Stanevičienė | 503 - 520 |
Analogue Integrated Circuits Design-for-Testability Flow Oriented onto OBIST Strategy | |
Sergey G. Mosin | 521 - 531 |
Multi-Criteria Decision Making for Optimal Configuration of Business Process Model Families | |
Ramo Šendelj, Ivana Ognjanović | 532 - 550 |
Self-Tuning Method of PID Parameters Based on Belief Rule Base Inference | |
Xiao-Bin Xu, Xue Ma, Cheng-Lin Wen, Da-Rong Huang, Jian-Ning Li | 551 - 563 |
Robust Quantized H∞ ILC Design for Uncertain Systems with Communication Constraints | |
Xuhui Bu, Zhongyuan Cui, Lizhi Cui, Wei Qian | 564 - 574 |
Security Analysis of a Revocable and Strongly Unforgeable Identity-Based Signature Scheme | |
Xiaodong Yang, Tingchun Ma, Ping Yang, Faying An, Caifen Wang | 575 - 587 |
On Improving Efficiency and Utilization of Last Level Cache in Multicore Systems | |
Yumna Zahid, Hina Khurshid, Zulfiqar Ali Memon | 588 - 607 |
Print ISSN: 1392-124X
Online ISSN: 2335-884X