Content of Issue 14
DOI: 10.3217/jucs-018-14
|
Managing Editor's Column |
C. Gütl |
1905 |
A Hybrid Metaheuristic Strategy for Covering with Wireless Devices |
A.L. Bajuelos, S. Canales, G. Hernández, M. Martins |
1906 |
An Exploratory Study of Game-based M-learning for Software Project Management |
A.Y. Chua, R.S. Balkunje |
1933 |
Behavioral and Temporal Pattern Detection within Financial Data with Hidden Information |
D. Drusinsky |
1950 |
Multilevel Steganography: Improving Hidden Communication in Networks |
W. Frączek, W. Mazurczyk, K. Szczypiorski |
1967 |
Optimized On-Chip-Pipelining for Memory-Intensive Computations on Multi-Core Processors with Explicit Memory Hierarchy |
J. Keller, C.W. Kessler, R. Hultén |
1987 |
Controlled Pure Grammar Systems |
A. Meduna, P. Zemek |
2024 |
Software Cost Modelling and Estimation Using Artificial Neural Networks Enhanced by Input Sensitivity Analysis |
E. Papatheocharous, A.S. Andreou |
2041 |
Modeling the Value of End-to-End Multipath Protocols |
H. Suomi, K. Kilkki, H. Hämmäinen |
2071 |