Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 18

Content of Issue 14
DOI: 10.3217/jucs-018-14
Managing Editor's Column C. Gütl 1905
A Hybrid Metaheuristic Strategy for Covering with Wireless Devices A.L. Bajuelos, S. Canales, G. Hernández, M. Martins 1906
An Exploratory Study of Game-based M-learning for Software Project Management A.Y. Chua, R.S. Balkunje 1933
Behavioral and Temporal Pattern Detection within Financial Data with Hidden Information D. Drusinsky 1950
Multilevel Steganography: Improving Hidden Communication in Networks W. Frączek, W. Mazurczyk, K. Szczypiorski 1967
Optimized On-Chip-Pipelining for Memory-Intensive Computations on Multi-Core Processors with Explicit Memory Hierarchy J. Keller, C.W. Kessler, R. Hultén 1987
Controlled Pure Grammar Systems A. Meduna, P. Zemek 2024
Software Cost Modelling and Estimation Using Artificial Neural Networks Enhanced by Input Sensitivity Analysis E. Papatheocharous, A.S. Andreou 2041
Modeling the Value of End-to-End Multipath Protocols H. Suomi, K. Kilkki, H. Hämmäinen 2071