Content of Issue 14
DOI: 10.3217/jucs-018-14
|
| Managing Editor's Column |
C. Gütl |
1905 |
| A Hybrid Metaheuristic Strategy for Covering with Wireless Devices |
A.L. Bajuelos, S. Canales, G. Hernández, M. Martins |
1906 |
| An Exploratory Study of Game-based M-learning for Software Project Management |
A.Y. Chua, R.S. Balkunje |
1933 |
| Behavioral and Temporal Pattern Detection within Financial Data with Hidden Information |
D. Drusinsky |
1950 |
| Multilevel Steganography: Improving Hidden Communication in Networks |
W. Frączek, W. Mazurczyk, K. Szczypiorski |
1967 |
| Optimized On-Chip-Pipelining for Memory-Intensive Computations on Multi-Core Processors with Explicit Memory Hierarchy |
J. Keller, C.W. Kessler, R. Hultén |
1987 |
| Controlled Pure Grammar Systems |
A. Meduna, P. Zemek |
2024 |
| Software Cost Modelling and Estimation Using Artificial Neural Networks Enhanced by Input Sensitivity Analysis |
E. Papatheocharous, A.S. Andreou |
2041 |
| Modeling the Value of End-to-End Multipath Protocols |
H. Suomi, K. Kilkki, H. Hämmäinen |
2071 |