20 articles in this issue
Morteza Analoui,Mohsen Sharifi,Mohammad Hossein Rezvani
Nowadays, content distribution has received remarkable attention in distributed computing researches and its applications typically allow personal computers, called peers, to cooperate with each other in order to accomplish distributed operations such as ... see more
Razvan Andonie,Ioan Dzitac
The academic world has come to place enormous weight on bibliometric measures to assess the value of scientific publications. Our paper has two major goals. First, we discuss the limits of numerical assessment tools as applied to computer science publicat... see more
Aydin Aybar
A decentralized controller design approach is developed for the timed discrete event systems which are modelled by timed automata in this work. An approach, called augmentation, is presented to obtain the new modelling method such that each unit delay of ... see more
Mahua Bhattacharya,Arpita Das
The problem of feature selection consists of finding a significant feature subset of input training as well as test patterns that enable to describe all information required to classify a particular pattern. In present paper we focus in this particular pr... see more
Zalán Bodó,Lehel Csató
Recently semi-supervised methods gained increasing attention and many novel semi-supervised learning algorithms have been proposed. These methods exploit the information contained in the usually large unlabeled data set in order to improve classification ... see more
Adrian Bra?oveanu,Mariana Nagy,Oana Mateu?-Petri?or,Ramona Urziceanu
When the first articles about the SemanticWeb (SW) appeared, there were hardly any signals that the next revolution would be related to social networking. Social networking services (SNS) have grown after MySpace, LinkedIn and Facebook were launched in 20... see more
Dominic Bucerzan,Mihaela Craciun,Violeta Chi?,Crina Ra?iu
The purpose of this paper is to present and to discuss analysis methods applied in symmetric cryptography, especially on stream ciphers. The tests were made on some algorithms and also on the personal symmetric cryptographic algorithm, HENKOS, based on a ... see more
Zhen Cheng,Zhihua Chen,Yufang Huang,Xuncai Zhang,Jin Xu
DNA self-assembly is a promising paradigm for nanotechnology. Recently, many researches demonstrate that computation by self-assembly of DNA tiles may be scalable. In this paper, we show how the tile self-assembly process can be used for implementing the ... see more
Ali Douik,Mehrez Abdellaoui
The present paper focused on the classification of cereal grains using different classifiers combined to morphological, colour and wavelet features. The grain types used in this study were Hard Wheat, Tender Wheat and Barley. Different types of features (... see more
Nikolaos D. Hasanagas,Athanasios D. Styliadis,Eleni I. Papadopoulou,Lazaros A. Sechidis
Is an effective knowledge exchange and cooperation between academic community and practitioners possible? Implementation of e-learning in specialized policy fields pertains to the most challenging priorities of ICTs and software engineering. In multidisci... see more
Ion Iancu,Nicolae Constantinescu,Mihaela Colhon
This paper presents an optimized method to reduce the points number to be used in order to identify a person using fuzzy fingerprints. Two fingerprints are similar if n out of N points from the skin are identical. We discuss the criteria used for choosing... see more
Gu-Min Jeong,Jong-Duck Lee,Sang-Il Choi,Dong-Wook Kang
This paper presents a new JPEG quantization table design method for mobile phone images. Although the screen size of mobile phones is very small, the full information of the image should nevertheless be represented. Moreover, the high frequency components... see more
Chun Lu,Xingyi Zhang
Tissue P systems is a computing model in the framework of membrane computing inspired from intercellular communication and cooperation between neurons. Many different variants of this model have been proposed. One of the most important models is known as ... see more
Horea Oros,Constantin Popescu
An electronic cash system allows the exchange of digital coins with value assured by the bank’s signature and with concealed user identity. In an electronic cash system, a user can withdraw coins from the bank and then spends each coin anonymously and unl... see more
Daniela Elena Popescu,Madalina Lonea,Doina Zmaranda,Codruta Vancea,Cristian Tiurbe
Based on the available information (eg.multiple functional faults or sensor errors give rise to similar alarm patterns or outcomes), some states in the behaviour of a network can not be distinguished from one another. So, the computer network’s fault tree... see more
Predrag Stanisic,Savo Tomovic
In this paper we suggest a new method for frequent itemsets mining, which is more efficient than well known Apriori algorithm. The method is based on special structure called Rymon tree. For its implementation, we suggest modified sort-merge-join algorith... see more
Davide Taibi,Manuel Gentile,Giovanni Fulantelli,Mario Allegra
Web 2.0 applications and the increasingly use of social networks have been creating new informal learning opportunities. Students interact and collaborate using new learning environments which are structurally different from traditional e-learning environ... see more
Futai Zhang,Sujuan Li,Songqin Miao,Yi Mu,Willy Susilo,Xinyi Huang
Certificateless cryptography has attracted a lot of attention from the research community, due to its applicability in information security. In this paper, we analyze two recently proposed certificateless signature schemes and point out their security fla... see more
Xizheng Zhang,Yaonan Wang,Xiaofang Yuan
This paper presents the fuzzy design of sliding mode control (SMC) for nonlinear systems with state delay, which can be represented by a Takagi-Sugeno (TS) model with uncertainties. There exist the parameter uncertainties in both the state and input matri... see more