Go home now Header Background Image
Submission Procedure
share: |
Follow us
Articles by Topics
Topic H. - Information Systems
Topic H.3.7 - Digital Libraries

Z.A. Al-Sharif, M.I. Al-Saleh, Y. Jararweh, L. Alawneh, A.S. Shatnawi:
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach
page 1174 - 1198
Vol.25 / Issue 9
A. Ali, I.S. Bajwa, R. Kazmi:
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform
page 1261 - 1278
Vol.25 / Issue 10
S. Arroyo:
Ontology and Grammar of the SOPHIE Choreography Conceptual Framework - An Ontological Model for Knowledge Management
page 1157 - 1183
Vol.13 / Issue 9
N. Avouris, N. Yiannoutsou:
A Review of Mobile Location-based Games for Learning across Physical and Virtual Spaces
page 2120 - 2142
Vol.18 / Issue 15
T. Baars, M. Spruit:
Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study
page 1662 - 1678
Vol.18 / Issue 12
N. Baloian, D. Aguirre, G. Zurita:
Developing Distributed Collaborative Applications with HTML5 under the Coupled Objects Paradigm
page 1712 - 1737
Vol.20 / Issue 13
C. Becker, A. Rauber, V. Heydegger, J. Schnasse, M. Thaller:
Systematic Characterisation of Objects in Digital Preservation: The eXtensible Characterisation Languages
page 2936 - 2952
Vol.14 / Issue 18
J. Blythe, D. Kapoor, C.A. Knoblock, K. Lerman, S. Minton:
Information Integration for the Masses
page 1811 - 1837
Vol.14 / Issue 11
O. Bordies, Y. Dimitriadis:
Exploring Teachers' Perceptions on Modeling Effort Demanded by CSCL Designs with Explicit Artifact Flow Support
page 1398 - 1417
Vol.22 / Issue 10
B. Burkard, G. Vogeler, S. Gruner:
Informatics for Historians: Tools for Medieval Document XML Markup, and their Impact on the History-Sciences
page 193 - 210
Vol.14 / Issue 2
D. G. Camhy, R. Stubenrauch:
A Cross-Disciplinary Bibliography on Visual Languages for Information Sharing and Archiving
page 369 - 396
Vol.9 / Issue 4
C.-M. Chen, T.-Y. Wu, R. Tso, M. Mambo, M.-E. Wu:
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks
page 406 - 418
Vol.21 / Issue 3
B. Chidlovskii, L. Lecerf:
Stacked Dependency Networks for Layout Document Structuring
page 2998 - 3010
Vol.14 / Issue 18
D. Choi, J. Kim, X. Piao, P. Kim:
Text Analysis for Monitoring Personal Information Leakage on Twitter
page 2472 - 2485
Vol.19 / Issue 16
K.E. Daouadi, R.Z. Rebaï, I. Amous:
Real-Time Bot Detection from Twitter Using the Twitterbot+ Framework
page 496 - 507
Vol.26 / Issue 4
A. Dickinger, S. Zorn:
Compensation Models for Interactive Advertising
page 557 - 565
Vol.14 / Issue 4
F. Einsele, R. Ingold, J. Hennebert:
A Language-Independent, Open-Vocabulary System Based on HMMs for Recognition of Ultra Low Resolution Words
page 2982 - 2997
Vol.14 / Issue 18
D. Ewald, H. Zarzycki, Ł. Apiecionek, a.M. Czerniak:
Ordered Fuzzy Numbers Applied in Bee Swarm Optimization Systems
page 1475 - 1494
Vol.26 / Issue 11
M. Fahad, N. Moalla, A. Bouras, M. Abdul Qadir, M. Farukh:
Towards Classification of Web Ontologies for the Emerging Semantic Web
page 1021 - 1042
Vol.17 / Issue 7
J. Fan, Y. Zheng, X. Tang:
Key-Insulated Signcryption
page 1351 - 1374
Vol.19 / Issue 10
A. Fedorchenko, E. Doynikova, I. Kotenko:
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
page 1043 - 1065
Vol.25 / Issue 9
D. W. Fellner:
Graphics Content in Digital Libraries: Old Problems, Recent Solutions, Future Demands
page 400 - 409
Vol.7 / Issue 5
X. Fu, W. Li, G. Fortino, P. Pace, G. Aloi, W. Russo:
A Utility-Oriented Routing Scheme for Interest-Driven Community-Based Opportunistic Networks
page 1829 - 1854
Vol.20 / Issue 13
M.P. González, T. Granollers, A. Pascual:
Testing Website Usability in Spanish-Speaking Academia through Heuristic Evaluation and Cognitive Walkthroughs
page 1513 - 1527
Vol.14 / Issue 9
P. Han, G. Kortemeyer, B.J. Krämer, C. von Prümmer:
Exposure and Support of Latent Social Networks among Learning Object Repository Users
page 1717 - 1738
Vol.14 / Issue 10
P.A. Haya, G. Montoro, A. Esquivel, M. García-Herranz, X. Alamán:
A Mechanism for Solving Conflicts in Ambient Intelligent Environments
page 284 - 296
Vol.12 / Issue 3
A.M.N.B. Husamelddin, G.S. Chen, W. Jing:
Cloud Biometric Authentication: An Integrated Reliability and Security Method Using the Reinforcement Learning Algorithm and Queue Theory
page 372 - 391
Vol.24 / Issue 4
F. Jaddi, B. Paillassa:
An Adaptive Hierarchical Extension of DSR: The Cluster Source Routing
page 32 - 55
Vol.13 / Issue 1
J. Kang, J. Choi:
Recognising Informative Web Page Blocks Using Visual Segmentation for Efficient Information Extraction
page 1893 - 1910
Vol.14 / Issue 11
M.S. Khan, N. Kulathuramaiyer, H. Maurer:
Applications of Mash-ups for a Digital Journal
page 1695 - 1716
Vol.14 / Issue 10
J. Kolbitsch, H. Maurer:
The Transformation of the Web: How Emerging Communities Shape the Information we Consume
page 187 - 213
Vol.12 / Issue 2
H. Kubota, S. Nomura, Y. Sumi, T. Nishida:
Sustainable Memory System Using Global and Conical Spaces
page 135 - 148
Vol.13 / Issue 2
N. Kulathuramaiyer:
Mashups: Emerging Application Development Paradigm for a Digital Journal
page 531 - 542
Vol.13 / Issue 4
V. Kutálek, V. Dvořák:
On Complexity of Collective Communications on a Fat Cube Topology
page 944 - 961
Vol.11 / Issue 6
G.C. Lapasini Leal, A.P. Chaves, E.H.M. Huzita, M.E. Delamaro:
An Integrated Approach of Software Development and Test Processes to Distributed Teams
page 2686 - 2705
Vol.18 / Issue 19
J.Y. Lee, Y. Duan, J.C. Oh, W. Du, H. Blair, L. Wang, X. Jin:
Social Network Based Reputation Computation and Document Classification
page 532 - 553
Vol.18 / Issue 4
T. Ley, D. Albert:
Identifying Employee Competencies in Dynamic Work Domains: Methodological Considerations and a Case Study
page 1500 - 1518
Vol.9 / Issue 12
S. Lian, Y. Zhang:
Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks
page 1023 - 1041
Vol.15 / Issue 5
H. Liu, L. Chen, Z. Davar, M.R. Pour:
Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
page 473 - 482
Vol.21 / Issue 3
Z. Liu, H. Yan, Z. Lin, L. Xu:
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure
page 454 - 472
Vol.21 / Issue 3
J. Lladós, D. Karatzas, J. Mas, G. Sánchez:
A Generic Architecture for the Conversion of Document Collections into Semantically Annotated Digital Archives
page 2912 - 2935
Vol.14 / Issue 18
M. Lux, W. Klieber, J. Becker, K. Tochtermann, H. Mayer, H. Neuschmied, W. Haas:
XML and MPEG-7 for Interactive Annotation and Retrieval using Semantic Meta-data
page 965 - 984
Vol.8 / Issue 10
J. Maniamma, H. Wagatsuma:
A Semantic Web-based Representation of Human-logical Inference for Solving Bongard Problems
page 1343 - 1363
Vol.26 / Issue 10
H. Maurer, R. Stubenrauch, D. G. Camhy:
Foundations of MIRACLE: Multimedia Information Repository, A Computer-supported Language Effort
page 309 - 348
Vol.9 / Issue 4
Z. Mingyi, L. Danning, Z. Ying:
An Approach to Generation of Decision Rules
page 140 - 158
Vol.16 / Issue 1
F. Mödritscher, Z. Petrushyna, E.L.-C. Law:
The Application of Pattern Repositories for Sharing PLE Practices in Networked Communities
page 1492 - 1510
Vol.17 / Issue 10
N. Nedjah, L.d.M. Mourelle:
Software/Hardware Co-Design of Efficient and Secure Cryptographic Hardware
page 66 - 82
Vol.11 / Issue 1
S. Ngobeni, H. Venter, I. Burke:
The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks
page 1721 - 1740
Vol.18 / Issue 12
K. Oliveira, K. Breitman, T. Oliveira:
A Flexible Strategy-Based Model Comparison Approach: Bridging the Syntactic and Semantic Gap
page 2225 - 2253
Vol.15 / Issue 11
L.S. Oliveira, E. Justino, R. Sabourin, F. Bortolozzi:
Combining Classifiers in the ROC-space for Off-line Signature Verification
page 237 - 251
Vol.14 / Issue 2
D. Pavelec, L.S. Oliveira, E. Justino, L.V. Batista:
Using Conjunctions and Adverbs for Author Verification
page 2967 - 2981
Vol.14 / Issue 18
M.C. Pham, Y. Cao, R. Klamma, M. Jarke:
A Clustering Approach for Collaborative Filtering Recommendation Using Social Network Analysis
page 583 - 604
Vol.17 / Issue 4
R. Rastogi, R. von Solms:
Information Security Service Culture - Information Security for End-users
page 1628 - 1642
Vol.18 / Issue 12
P. Sancho, I. Martínez, B. Fernández-Manjón:
Semantic Web Technologies Applied to e-learning Personalization in <e-aula>
page 1470 - 1481
Vol.11 / Issue 9
D.-W. Seo, H.-U. Chae, B.-W. Kim, W.-H. Choi, K.-H. Jo:
Human Tracking based on Multiple View Homography
page 2463 - 2484
Vol.15 / Issue 13
M. Shahriari, S. Haefele, R. Klamma:
Using Content to Identify Overlapping Communities in Question Answer Forums
page 907 - 931
Vol.23 / Issue 9
G. Pereira e Silva, M. Thielo, R. Dueire Lins, B. Miro, S.J. Simske:
Automatically Deciding if a Document was Scanned or Photographed
page 3364 - 3375
Vol.15 / Issue 18
R. Stubenrauch, D. G. Camhy, J. Lennon, H. Maurer:
Applications of MIRACLE: Working With Dynamic Visual Information
page 349 - 365
Vol.9 / Issue 4
M.G. Suryanarayanan, D.S. Sam, S. Selvaraju:
Establishing Knowledge Networks via Analysis of Research Abstracts
page 993 - 1021
Vol.18 / Issue 8
J. Sánchez, M. de Borba Campos:
Development of Navigation Skills through Audio Haptic Videogaming in Learners who are Blind
page 2677 - 2697
Vol.19 / Issue 18
S. Tomažič, I. Bernik:
Cyberattack Response Model for the Nuclear Regulator in Slovenia
page 1437 - 1457
Vol.25 / Issue 11
M. Topolski:
The Modified Principal Component Analysis Feature Extraction Method for the Task of Diagnosing Chronic Lymphocytic Leukemia Type B-CLL
page 734 - 746
Vol.26 / Issue 6
R. S. Veerubhotla, A. Saxena, V. P. Gulati, A. K. Pujari:
Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing
page 122 - 149
Vol.11 / Issue 1
M. Vidal, A.S. da Silva, E.S. de Moura, J.M. Cavalcanti:
Structure-Based Crawling in the Hidden Web
page 1857 - 1876
Vol.14 / Issue 11
M. Vincini, D. Beneventano, S. Bergamaschi:
Semantic Integration of Heterogeneous Data Sources in the MOMIS Data Transformation System
page 1986 - 2012
Vol.19 / Issue 13
R. Volz, R. Studer, A. Maedche, B. Lauser:
Pruning-based Identification of Domain Ontologies
page 520 - 529
Vol.9 / Issue 6
H. D. Wactlar:
Extracting and Visualizing Knowledge from Film and Video Archives
page 602 - 612
Vol.8 / Issue 6
C. Wang, Y. Sun, Y. Liang:
An Improved SVM Based on Similarity Metric
page 1462 - 1470
Vol.13 / Issue 10
C. Wu, M. Marchese, J. Jiang, A. Ivanyukovich, Y. Liang:
Machine Learning-Based Keywords Extraction for Scientific Literature
page 1471 - 1483
Vol.13 / Issue 10
G. Wurzinger:
Information Consolidation in Large Bodies of Information
page 3314 - 3323
Vol.16 / Issue 21
J. Yang, T. Li, S. Liu, T. Wang, D. Wang, G. Liang:
Computer Forensics System Based on Artificial Immune Systems
page 1354 - 1365
Vol.13 / Issue 9
E. Zenou, M. Samuelides:
Galois Lattice Theory for Probabilistic Visual Landmarks
page 1014 - 1033
Vol.10 / Issue 8