Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 25

Content of Issue 1
DOI: 10.3217/jucs-025-01
Managing Editor's Column C. Gütl 1
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection R. Kozik, M. Choras, J. Keller 2
A Systematic Mapping Study on Soft Skills in Software Engineering G. Matturro, F. Raschetti, C. Fontán 16
Pinhão: An Auto-tunning System for Compiler Optimizations Guided by Hot Functions M.Y. Siraichi, C.H. Segawa Tonetti, A.F. da Silva 42
Content of Issue 2
DOI: 10.3217/jucs-025-02
Managing Editor's Column C. Gütl 73
Methods for Information Hiding in Open Social Networks J. Bieniasz, K. Szczypiorski 74
Sorting Permutations by λ-Operations G.H. Santos Miranda, C. Negri Lintzmayer, Z. Dias 98
Designing a Human Computation Framework to Enhance Citizen-Government Interaction K. Zabaleta, U. Lopez-Novoa, I. Pretel, D. López-de-Ipiña, V. Cartelli, G. Di Modica, O. Tomarchio 122
Content of Issue 3
DOI: 10.3217/jucs-025-03
Advances of Provable Security Techniques Y. Yu, Y. Mu 154
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms Y. Chen, Q. Dong, Y. Li, Q. Lai, Z. Wang 158
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption Y.-F. Tseng, C.-I. Fan, C.-W. Lin 182
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method X. Tao, L. Liu, F. Zhao, Y. Huang, S. Zhu, Y. Liang 203
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption Y. Wang, J. Wang, S.-F. Sun, J.K. Liu, W. Susilo, J. Baek, I. You, X. Chen 222
CCA-Secure Deterministic Identity-Based Encryption Scheme M. Huang, B. Yang, Y. Zhao, K. Liang, L. Xue, X. Yang 245
Combination Model of Heterogeneous Data for Security Measurement X. Dong, Y. Guo, F. Li, L. Dong, A. Khan 270
An Identity-Based Signcryption on Lattice without Trapdoor X. Wang, Y. Zhang, B.B. Gupta, H. Zhu, D. Liu 282
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries B. Santoso, C. Su 294
Content of Issue 4
DOI: 10.3217/jucs-025-04
Managing Editor's Column C. Gütl 309
Cost Estimation of Blended Learning Course Delivery Through Public Cloud V.M. Ciric, I.Z. Milentijevic, O.M. Vojinovic, N.S. Manic 310
Data-driven Feature Selection Methods for Text Classification: an Empirical Evaluation R.C.P. Fragoso, R.H.W. Pinheiro, G.D.C. Cavalcanti 334
Survey on Ranking Functions in Keyword Search over Graph-Structured Data A. Ghanbarpour, H. Naderi 361
Scheduling Mandatory-Optional Real-Time Tasks in Homogeneous Multi-Core Systems with Energy Constraints Using Bio-Inspired Meta-Heuristics M. Micheletto, R. Santos, J. Orozco 390
A Probabilistic Multi-Objective Artificial Bee Colony Algorithm for Gene Selection Z.B. Ozger, B. Bolat, B. Diri 418
Content of Issue 5
DOI: 10.3217/jucs-025-05
Immersive Learning Technologies: Research and Future Directions A. Peña-Rios, F. Khosmood 444
An Educational Glance into the Future: Holodeck as a Future Enacted Narrative Learning Technology T. Kymäläinen 446
Efficient Peer-to-Peer Content Sharing for Learning in Virtual Worlds B. Shen, J. Guo 465
Developing and Assessing Augmented Reality Applications for Mathematics with Trainee Instructional Media Designers: An Exploratory Study on User Experience I. Kazanidis, N. Pellas 489
Students' Perception of a Blended Learning Approach in an African Higher Institution A.I. Safana, M. Nat 515
A Learning Ecosystem for Linemen Training based on Big Data Components and Learning Analytics G. Santamaría-Bonfil, G. Escobedo-Briones, M. Perez-Ramírez, G. Arroyo-Figueroa 541
Content of Issue 6
DOI: 10.3217/jucs-025-06
Recent Advances, Emerging Methods and Applications of Pattern Recognition J. Keller, M. Grana, R. Kozik, T. Andrysiak, M. Choraś 569
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study Ł. Apiecionek, M. Großmann, U.R. Krieger 571
Impact of Resource Control in Irregular Networks on their Transmission Properties S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski 591
Improving Person Re-identification by Segmentation-Based Detection Bounding Box Filtering D. Pieczyński, M. Kraft, M. Fularz 611
Fast Binarization of Unevenly Illuminated Document Images Based on Background Estimation for Optical Character Recognition Purposes H. Michalak, K. Okarma 627
Hybrid Stochastic GA-Bayesian Search for Deep Convolutional Neural Network Model Selection W. Rawat, Z. Wang 647
A Hybrid Neural System to Study the Interplay between Economic Crisis and Workplace Accidents in Spain S. Contreras, M.Á. Manzanedo, Á. Herrero 667
Synthetic Image Translation for Football Players Pose Estimation M. Sypetkowski, G. Sarwas, T. Trzciński 683
Quality Assessment of Photographed 3D Printed Flat Surfaces Using Hough Transform and Histogram Equalization J. Fastowicz, K. Okarma 701
Integration and Selection of Linear SVM Classifiers in Geometric Space R. Burduk, J. Biedrzycki 718
Content of Issue 7
DOI: 10.3217/jucs-025-07
Managing Editor's Column C. Gütl 731
A Note Concerning Feedback and Queries for Web Pages N. Delilovic, H. Maurer 733
Mobile Applications for People with Parkinson's Disease: A Systematic Search in App Stores and Content Review S. Estévez, M.E. Cambronero, Y. García-Ruiz, L. Llana 740
Micro-business Requirements Patterns in Practice: Remote Communities in Developing Nations R. Macasaet, M. Noguera, M.L. Rodríguez, J.L. Garrido, S. Supakkul, L. Chung 764
On the Automated and Reactive Optimization of Highly-Dynamic Communication Network Infrastructures R. Mueller-Bady, M. Kappes, I. Medina-Bulo, F. Palomo-Lozano 788
Improving Ontology Matching Using Application Requirements for Segmenting Ontologies D. Pessoa, A.C. Salgado, B. Farias Lóscio 816
Effectiveness of Games in Software Project Management Education: An Experimental Study G. Petri, C. Gresse von Wangenheim, J.C. Rossa Hauck, A. Ferreti Borgatto 840
Content of Issue 8
DOI: 10.3217/jucs-025-08
Collaborative Technologies and Data Science in Smart City Applications N. Baloian, Y. Chen, A. Harutyunyan 865
Towards Secure and Efficient "white-box" Encryption G. Khachatrian, S. Abrahamyan 868
A New Information-Theoretical Distance Measure for Evaluating Community Detection Algorithms M. Haroutunian, K. Mkhitaryan, J. Mothe 887
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation Y. Chen, O.O. Koyluoglu, A.J.H. Vinck 904
On Machine Learning Approaches for Automated Log Management A.N. Harutyunyan, A.V. Poghosyan, N.M. Grigoryan, N.A. Hovhannisyan, N. Kushmerick 925
Planning of Urban Public Transportation Networks in a Smart City J. Frez, N. Baloian, J.A. Pino, G. Zurita, F. Basso 946
The Role of Verification and Validation Techniques within Visual Analytics B. Weyers, E. Auer, W. Luther 967
Identifying Groupware Requirements in People-Driven Mobile Collaborative Processes V. Herskovic, S.F. Ochoa, J.A. Pino 988
A Model for Resource Management in Smart Cities Based on Crowdsourcing and Gamification R. Barbosa Sousa Orrego, J.L.V. Barbosa 1018
Content of Issue 9
DOI: 10.3217/jucs-025-09
Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes A. Janicki, W. Mazurczyk, X. Luo, D. Ye 1039
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits A. Fedorchenko, E. Doynikova, I. Kotenko 1043
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios Y. Lakhdhar, S. Rekhis, N. Boudriga 1066
Precise Performance Characterization of Antivirus on the File System Operations M.I. Al-Saleh, H.M. Hamdan 1089
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels J. Bieniasz, M. Stępkowska, A. Janicki, K. Szczypiorski 1109
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay H. Tian, M. Huang, C.-C. Chang, Y. Huang, J. Lu, Y. Du 1131
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images M. Huang, M. Xu, T. Qiao, T. Wu, N. Zheng 1151
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach Z.A. Al-Sharif, M.I. Al-Saleh, Y. Jararweh, L. Alawneh, A.S. Shatnawi 1174
Digital Investigation of IoT Devices in the Criminal Scene F. Bouchaud, G. Grimaud, T. Vantroys, P. Buret 1199
Content of Issue 10
DOI: 10.3217/jucs-025-10
Intelligent Computing for Society I.S. Bajwa, F.D. Kamareddine, P. Thangarajah 1219
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES K. Shankar, M. Elhoseny 1221
Research on Fair Trading Mechanism of Surplus Power Based on Blockchain Z. Xia, J. Tan, J. Wang, R. Zhu, H. Xiao, A.K. Sangaiah 1240
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform A. Ali, I.S. Bajwa, R. Kazmi 1261
A Smart Hydroponics-Based System for Child Education S. Dinçer, Y. Bitirim 1279
Decision-making Model at Higher Educational Institutions based on Machine Learning Y.V. Nieto, V. García-Díaz, C.E. Montenegro 1301
SENTIPEDE: A Smart System for Sentiment-based Personality Detection from Short Texts A. Darliansyah, M.A. Naeem, F. Mirza, R. Pears 1323
An Intelligent Data Analytics based Model Driven Recommendation System B. Ramzan, I. Sarwar Bajwa, R. Kazmi, S. Ramzan 1353
A Web3.0-based Intelligent Learning System Supporting Education in the 21st Century K. Halimi, H. Seridi-Bouchelaghem 1373
Content of Issue 11
DOI: 10.3217/jucs-025-11
Cyberattack Detection and Response J. Keller, W. Mazurczyk, B. Genge, L. Fritsch, S. Vrhovec 1394
Detection of Size Modulation Covert Channels Using Countermeasure Variation S. Wendzel, F. Link, D. Eller, W. Mazurczyk 1396
Analysis of the Infection and the Injection Phases of the Telnet Botnets T. Bajtoš, P. Sokol, A. Gajdoš, K. Lučivjanská, T. Mézešová 1417
Cyberattack Response Model for the Nuclear Regulator in Slovenia S. Tomažič, I. Bernik 1437
Testing the Human Backdoor: Organizational Response to a Phishing Campaign A. Mihelič, M. Jevšček, S. Vrhovec, I. Bernik 1458
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure H.I. Kure, S. Islam 1478
Content of Issue 12
DOI: 10.3217/jucs-025-12
Advances in Web-Based Learning R. Klamma, M. Spaniol, S. Unankard 1503
Improving Teacher Game Learning Analytics Dashboards through ad-hoc Development A. Calvo-Morata, C. Alonso-Fernández, I.J. Pérez-Colado, M. Freire, I. Martínez-Ortiz, B. Fernández-Manjón 1507
Implementing Flipped Classroom that Used a Context Aware Mobile Learning System into Learning Process M. Lamia, M. Hafidi, A. Tricot, O. Benmesbah 1531
STEM Oriented Online Platforms Embracing the Community of Practice Model: A Comparative Study and Design Guidelines O. Fragou, C. Goumopoulos, C. Tsompanos 1554
Badges for Peer Assessment of Teamwork in Organized Education Z. Kubincová, D. Šuníková, M. Homola 1589
Integrating 3D Objects in Collaborative Non-Linear Storytelling on the Web P. de Lange, P. Nicolaescu, J. Benscheid, R. Klamma 1608
Overcoming the Silver Generation Digital Gap C. Vaz de Carvalho, P. Cano, J.M. Roa, A. Wanka, F. Kolland 1625
Gamification Support for Learning in Spatial Computing Environments B. Hensen, I. Koren, R. Klamma 1644
Content of Issue 13
DOI: 10.3217/jucs-025-13
Managing Editor's Column C. Gütl 1666
Adopting Trust in Learning Analytics Infrastructure: A Structured Literature Review G.-P. Ciordas-Hertel, J. Schneider, S. Ternier, H. Drachsler 1668
Improving Multi-Label Classification for Learning Objects Categorization by Taking into Consideration Usage Information P.G. Espejo, E. Gibaja, V.H. Menéndez, A. Zapata, C. Romero 1687
Applicability of User Experience and Usability Questionnaires A. Hinderks, D. Winter, M. Schrepp, J. Thomaschewski 1717
A Revised Framework for the Governance and Management of Green IT J.D. Patón-Romero, M.T. Baldassarre, M. Rodríguez, M. Piattini 1736
MulseOnto: a Reference Ontology to Support the Design of Mulsemedia Systems E.B. Saleme, C.A.S. Santos, R.A. Falbo, G. Ghinea, F. Andres 1761