Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic H. - Information Systems
Topic H.3 - INFORMATION STORAGE AND RETRIEVAL
Topic H.3.7 - Digital Libraries

Z.A. Al-Sharif, M.I. Al-Saleh, Y. Jararweh, L. Alawneh, A.S. Shatnawi:
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach
/jucs_25_9/the_effects_of_platforms
page 1174 - 1198
Vol.25 / Issue 9
A. Ali, I.S. Bajwa, R. Kazmi:
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform
/jucs_25_10/high_performance_simulation_of
page 1261 - 1278
Vol.25 / Issue 10
S. Arroyo:
Ontology and Grammar of the SOPHIE Choreography Conceptual Framework - An Ontological Model for Knowledge Management
/jucs_13_9/ontology_and_grammar_of
page 1157 - 1183
Vol.13 / Issue 9
N. Avouris, N. Yiannoutsou:
A Review of Mobile Location-based Games for Learning across Physical and Virtual Spaces
/jucs_18_15/a_review_of_mobile
page 2120 - 2142
Vol.18 / Issue 15
T. Baars, M. Spruit:
Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study
/jucs_18_12/analysing_the_security_risks
page 1662 - 1678
Vol.18 / Issue 12
N. Baloian, D. Aguirre, G. Zurita:
Developing Distributed Collaborative Applications with HTML5 under the Coupled Objects Paradigm
/jucs_20_13/developing_distributed_collaborative_applications
page 1712 - 1737
Vol.20 / Issue 13
C. Becker, A. Rauber, V. Heydegger, J. Schnasse, M. Thaller:
Systematic Characterisation of Objects in Digital Preservation: The eXtensible Characterisation Languages
/jucs_14_18/systematic_characterisation_of_objects
page 2936 - 2952
Vol.14 / Issue 18
J. Blythe, D. Kapoor, C.A. Knoblock, K. Lerman, S. Minton:
Information Integration for the Masses
/jucs_14_11/information_integration_for_the
page 1811 - 1837
Vol.14 / Issue 11
O. Bordies, Y. Dimitriadis:
Exploring Teachers' Perceptions on Modeling Effort Demanded by CSCL Designs with Explicit Artifact Flow Support
/jucs_22_10/exploring_teachers_perceptions_on
page 1398 - 1417
Vol.22 / Issue 10
B. Burkard, G. Vogeler, S. Gruner:
Informatics for Historians: Tools for Medieval Document XML Markup, and their Impact on the History-Sciences
/jucs_14_2/informatics_for_historians_tools
page 193 - 210
Vol.14 / Issue 2
D. G. Camhy, R. Stubenrauch:
A Cross-Disciplinary Bibliography on Visual Languages for Information Sharing and Archiving
/jucs_9_4/a_cross_disciplinary_bibliography
page 369 - 396
Vol.9 / Issue 4
C.-M. Chen, T.-Y. Wu, R. Tso, M. Mambo, M.-E. Wu:
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks
/jucs_21_3/on_the_security_of
page 406 - 418
Vol.21 / Issue 3
B. Chidlovskii, L. Lecerf:
Stacked Dependency Networks for Layout Document Structuring
/jucs_14_18/stacked_dependency_networks_for
page 2998 - 3010
Vol.14 / Issue 18
D. Choi, J. Kim, X. Piao, P. Kim:
Text Analysis for Monitoring Personal Information Leakage on Twitter
/jucs_19_16/text_analysis_for_monitoring
page 2472 - 2485
Vol.19 / Issue 16
K.E. Daouadi, R.Z. Rebaï, I. Amous:
Real-Time Bot Detection from Twitter Using the Twitterbot+ Framework
/jucs_26_4/real_time_bot_detection
page 496 - 507
Vol.26 / Issue 4
A. Dickinger, S. Zorn:
Compensation Models for Interactive Advertising
/jucs_14_4/compensation_models_for_interactive
page 557 - 565
Vol.14 / Issue 4
F. Einsele, R. Ingold, J. Hennebert:
A Language-Independent, Open-Vocabulary System Based on HMMs for Recognition of Ultra Low Resolution Words
/jucs_14_18/a_language_independent_open
page 2982 - 2997
Vol.14 / Issue 18
D. Ewald, H. Zarzycki, Ł. Apiecionek, a.M. Czerniak:
Ordered Fuzzy Numbers Applied in Bee Swarm Optimization Systems
/jucs_26_11/ordered_fuzzy_numbers_applied
page 1475 - 1494
Vol.26 / Issue 11
M. Fahad, N. Moalla, A. Bouras, M. Abdul Qadir, M. Farukh:
Towards Classification of Web Ontologies for the Emerging Semantic Web
/jucs_17_7/towards_classification_of_web
page 1021 - 1042
Vol.17 / Issue 7
J. Fan, Y. Zheng, X. Tang:
Key-Insulated Signcryption
/jucs_19_10/key_insulated_signcryption
page 1351 - 1374
Vol.19 / Issue 10
A. Fedorchenko, E. Doynikova, I. Kotenko:
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
/jucs_25_9/determination_of_system_weaknesses
page 1043 - 1065
Vol.25 / Issue 9
D. W. Fellner:
Graphics Content in Digital Libraries: Old Problems, Recent Solutions, Future Demands
/jucs_7_5/graphics_content_in_digital
page 400 - 409
Vol.7 / Issue 5
X. Fu, W. Li, G. Fortino, P. Pace, G. Aloi, W. Russo:
A Utility-Oriented Routing Scheme for Interest-Driven Community-Based Opportunistic Networks
/jucs_20_13/a_utility_oriented_routing
page 1829 - 1854
Vol.20 / Issue 13
M.P. González, T. Granollers, A. Pascual:
Testing Website Usability in Spanish-Speaking Academia through Heuristic Evaluation and Cognitive Walkthroughs
/jucs_14_9/testing_website_usability_in
page 1513 - 1527
Vol.14 / Issue 9
P. Han, G. Kortemeyer, B.J. Krämer, C. von Prümmer:
Exposure and Support of Latent Social Networks among Learning Object Repository Users
/jucs_14_10/exposure_and_support_of
page 1717 - 1738
Vol.14 / Issue 10
P.A. Haya, G. Montoro, A. Esquivel, M. García-Herranz, X. Alamán:
A Mechanism for Solving Conflicts in Ambient Intelligent Environments
/jucs_12_3/a_mechanism_for_solving
page 284 - 296
Vol.12 / Issue 3
A.M.N.B. Husamelddin, G.S. Chen, W. Jing:
Cloud Biometric Authentication: An Integrated Reliability and Security Method Using the Reinforcement Learning Algorithm and Queue Theory
/jucs_24_4/cloud_biometric_authentication_an
page 372 - 391
Vol.24 / Issue 4
F. Jaddi, B. Paillassa:
An Adaptive Hierarchical Extension of DSR: The Cluster Source Routing
/jucs_13_1/an_adaptive_hierarchical_extension
page 32 - 55
Vol.13 / Issue 1
J. Kang, J. Choi:
Recognising Informative Web Page Blocks Using Visual Segmentation for Efficient Information Extraction
/jucs_14_11/recognising_informative_web_page
page 1893 - 1910
Vol.14 / Issue 11
M.S. Khan, N. Kulathuramaiyer, H. Maurer:
Applications of Mash-ups for a Digital Journal
/jucs_14_10/applications_of_mash_ups
page 1695 - 1716
Vol.14 / Issue 10
J. Kolbitsch, H. Maurer:
The Transformation of the Web: How Emerging Communities Shape the Information we Consume
/jucs_12_2/the_transformation_of_the
page 187 - 213
Vol.12 / Issue 2
H. Kubota, S. Nomura, Y. Sumi, T. Nishida:
Sustainable Memory System Using Global and Conical Spaces
/jucs_13_2/sustainable_memory_system_using
page 135 - 148
Vol.13 / Issue 2
N. Kulathuramaiyer:
Mashups: Emerging Application Development Paradigm for a Digital Journal
/jucs_13_4/mashups_emerging_application_development
page 531 - 542
Vol.13 / Issue 4
V. Kutálek, V. Dvořák:
On Complexity of Collective Communications on a Fat Cube Topology
/jucs_11_6/on_complexity_of_collective
page 944 - 961
Vol.11 / Issue 6
G.C. Lapasini Leal, A.P. Chaves, E.H.M. Huzita, M.E. Delamaro:
An Integrated Approach of Software Development and Test Processes to Distributed Teams
/jucs_18_19/an_integrated_approach_of
page 2686 - 2705
Vol.18 / Issue 19
J.Y. Lee, Y. Duan, J.C. Oh, W. Du, H. Blair, L. Wang, X. Jin:
Social Network Based Reputation Computation and Document Classification
/jucs_18_4/social_network_based_reputation
page 532 - 553
Vol.18 / Issue 4
T. Ley, D. Albert:
Identifying Employee Competencies in Dynamic Work Domains: Methodological Considerations and a Case Study
/jucs_9_12/identifying_employee_competencies_in
page 1500 - 1518
Vol.9 / Issue 12
S. Lian, Y. Zhang:
Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks
/jucs_15_5/protecting_mobile_tv_multimedia
page 1023 - 1041
Vol.15 / Issue 5
H. Liu, L. Chen, Z. Davar, M.R. Pour:
Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
/jucs_21_3/insecurity_of_an_efficient
page 473 - 482
Vol.21 / Issue 3
Z. Liu, H. Yan, Z. Lin, L. Xu:
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure
/jucs_21_3/an_improved_cloud_data
page 454 - 472
Vol.21 / Issue 3
J. Lladós, D. Karatzas, J. Mas, G. Sánchez:
A Generic Architecture for the Conversion of Document Collections into Semantically Annotated Digital Archives
/jucs_14_18/a_generic_architecture_for
page 2912 - 2935
Vol.14 / Issue 18
M. Lux, W. Klieber, J. Becker, K. Tochtermann, H. Mayer, H. Neuschmied, W. Haas:
XML and MPEG-7 for Interactive Annotation and Retrieval using Semantic Meta-data
/jucs_8_10/xml_and_mpeg_7
page 965 - 984
Vol.8 / Issue 10
J. Maniamma, H. Wagatsuma:
A Semantic Web-based Representation of Human-logical Inference for Solving Bongard Problems
/jucs_26_10/a_semantic_web_based
page 1343 - 1363
Vol.26 / Issue 10
H. Maurer, R. Stubenrauch, D. G. Camhy:
Foundations of MIRACLE: Multimedia Information Repository, A Computer-supported Language Effort
/jucs_9_4/foundations_of_miracle_multimedia
page 309 - 348
Vol.9 / Issue 4
Z. Mingyi, L. Danning, Z. Ying:
An Approach to Generation of Decision Rules
/jucs_16_1/an_approach_to_generation
page 140 - 158
Vol.16 / Issue 1
F. Mödritscher, Z. Petrushyna, E.L.-C. Law:
The Application of Pattern Repositories for Sharing PLE Practices in Networked Communities
/jucs_17_10/the_application_of_pattern
page 1492 - 1510
Vol.17 / Issue 10
N. Nedjah, L.d.M. Mourelle:
Software/Hardware Co-Design of Efficient and Secure Cryptographic Hardware
/jucs_11_1/software_hardware_co_design
page 66 - 82
Vol.11 / Issue 1
S. Ngobeni, H. Venter, I. Burke:
The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks
/jucs_18_12/the_modelling_of_a
page 1721 - 1740
Vol.18 / Issue 12
K. Oliveira, K. Breitman, T. Oliveira:
A Flexible Strategy-Based Model Comparison Approach: Bridging the Syntactic and Semantic Gap
/jucs_15_11/a_flexible_strategy_based
page 2225 - 2253
Vol.15 / Issue 11
L.S. Oliveira, E. Justino, R. Sabourin, F. Bortolozzi:
Combining Classifiers in the ROC-space for Off-line Signature Verification
/jucs_14_2/combining_classifiers_in_the
page 237 - 251
Vol.14 / Issue 2
D. Pavelec, L.S. Oliveira, E. Justino, L.V. Batista:
Using Conjunctions and Adverbs for Author Verification
/jucs_14_18/using_conjunctions_and_adverbs
page 2967 - 2981
Vol.14 / Issue 18
M.C. Pham, Y. Cao, R. Klamma, M. Jarke:
A Clustering Approach for Collaborative Filtering Recommendation Using Social Network Analysis
/jucs_17_4/a_clustering_approach_for
page 583 - 604
Vol.17 / Issue 4
R. Rastogi, R. von Solms:
Information Security Service Culture - Information Security for End-users
/jucs_18_12/information_security_service_culture
page 1628 - 1642
Vol.18 / Issue 12
P. Sancho, I. Martínez, B. Fernández-Manjón:
Semantic Web Technologies Applied to e-learning Personalization in <e-aula>
/jucs_11_9/semantic_web_technologies_applied
page 1470 - 1481
Vol.11 / Issue 9
D.-W. Seo, H.-U. Chae, B.-W. Kim, W.-H. Choi, K.-H. Jo:
Human Tracking based on Multiple View Homography
/jucs_15_13/human_tracking_based_on
page 2463 - 2484
Vol.15 / Issue 13
M. Shahriari, S. Haefele, R. Klamma:
Using Content to Identify Overlapping Communities in Question Answer Forums
/jucs_23_9/using_content_to_identify
page 907 - 931
Vol.23 / Issue 9
G. Pereira e Silva, M. Thielo, R. Dueire Lins, B. Miro, S.J. Simske:
Automatically Deciding if a Document was Scanned or Photographed
/jucs_15_18/automatically_deciding_if_a
page 3364 - 3375
Vol.15 / Issue 18
R. Stubenrauch, D. G. Camhy, J. Lennon, H. Maurer:
Applications of MIRACLE: Working With Dynamic Visual Information
/jucs_9_4/applications_of_miracle_working
page 349 - 365
Vol.9 / Issue 4
M.G. Suryanarayanan, D.S. Sam, S. Selvaraju:
Establishing Knowledge Networks via Analysis of Research Abstracts
/jucs_18_8/establishing_knowledge_networks_via
page 993 - 1021
Vol.18 / Issue 8
J. Sánchez, M. de Borba Campos:
Development of Navigation Skills through Audio Haptic Videogaming in Learners who are Blind
/jucs_19_18/development_of_navigation_skills
page 2677 - 2697
Vol.19 / Issue 18
S. Tomažič, I. Bernik:
Cyberattack Response Model for the Nuclear Regulator in Slovenia
/jucs_25_11/cyberattack_response_model_for
page 1437 - 1457
Vol.25 / Issue 11
M. Topolski:
The Modified Principal Component Analysis Feature Extraction Method for the Task of Diagnosing Chronic Lymphocytic Leukemia Type B-CLL
/jucs_26_6/the_modified_principal_component
page 734 - 746
Vol.26 / Issue 6
R. S. Veerubhotla, A. Saxena, V. P. Gulati, A. K. Pujari:
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing
/jucs_11_1/gossip_codes_for_fingerprinting
page 122 - 149
Vol.11 / Issue 1
M. Vidal, A.S. da Silva, E.S. de Moura, J.M. Cavalcanti:
Structure-Based Crawling in the Hidden Web
/jucs_14_11/structure_based_crawling_in
page 1857 - 1876
Vol.14 / Issue 11
M. Vincini, D. Beneventano, S. Bergamaschi:
Semantic Integration of Heterogeneous Data Sources in the MOMIS Data Transformation System
/jucs_19_13/semantic_integration_of_heterogeneous
page 1986 - 2012
Vol.19 / Issue 13
R. Volz, R. Studer, A. Maedche, B. Lauser:
Pruning-based Identification of Domain Ontologies
/jucs_9_6/pruning_based_identification_of
page 520 - 529
Vol.9 / Issue 6
H. D. Wactlar:
Extracting and Visualizing Knowledge from Film and Video Archives
/jucs_8_6/extracting_and_visualizing_knowledge
page 602 - 612
Vol.8 / Issue 6
C. Wang, Y. Sun, Y. Liang:
An Improved SVM Based on Similarity Metric
/jucs_13_10/an_improved_svm_based
page 1462 - 1470
Vol.13 / Issue 10
C. Wu, M. Marchese, J. Jiang, A. Ivanyukovich, Y. Liang:
Machine Learning-Based Keywords Extraction for Scientific Literature
/jucs_13_10/machine_learning_based_keywords
page 1471 - 1483
Vol.13 / Issue 10
G. Wurzinger:
Information Consolidation in Large Bodies of Information
/jucs_16_21/information_consolidation_in_large
page 3314 - 3323
Vol.16 / Issue 21
J. Yang, T. Li, S. Liu, T. Wang, D. Wang, G. Liang:
Computer Forensics System Based on Artificial Immune Systems
/jucs_13_9/computer_forensics_system_based
page 1354 - 1365
Vol.13 / Issue 9
E. Zenou, M. Samuelides:
Galois Lattice Theory for Probabilistic Visual Landmarks
/jucs_10_8/galois_lattice_theory_for
page 1014 - 1033
Vol.10 / Issue 8