Data and Knowledge Bases
Cross Validation Method in Frequent Itemset Mining | |
Savo Tomović, Predrag Stanišić |
The Modeling and Complexity of Dynamical Systems by Means of Computation and Information Theories | |
Robert Logozar, Alen Lovrencic |
Insights from Web 3.0: Is it Time for a New Scientific Publishing Methodology? | |
Markus Schatten, Mirko Maleković |
Supervised Discretization for Rough Sets – a Neighborhood Graph Approach | |
Visnja Ognjenovic, Vladimir Brtka, Martin Jovanovic, Ivana Berkovic |
An Analysis of the Social and Conceptual Networks of CECIIS 2005 - 2010 | |
Markus Schatten, Frane Jakelić |
Calculation of Total Costs of Reciprocally Conditioned Service Departments – Allocation Methods | |
Slavko Matanović, Josip Mesaric |
Education for Information Society
An Overview of Computer Programming Teaching Methods in Higher Education | |
Sanja Mohorovičić, Vedran Strčić |
Flexible Learning Approach and Curricula Education towards the Labour Market in Secondary Technical Education: A Case Study | |
Petar Jandrić, Mario Božurić, Mia Carapina |
Evaluation of similarity metrics for programming code plagiarism detection method | |
Vedran Juricic |
Evaluation of Student Programming Assignments in Online Environments | |
Mario Đanić, Danijel Radošević, Tihomir Orehovački |
Student modelling in blended learning environment | |
Haidi Kuvač, Slavomir Stankov |
Computer ergonomics in elementary school | |
Mario Zovkić, Tedo Vrbanec, Jasminka Dobša |
Perceptions of Multicultural College Students: Case-Studies of European, American and Australian Universities | |
Alen Delić, Violeta Vidacek-Hains, Laura Adarve |
Project Based Learning: Students' Design of Interactive Multimedia CD/DVD with Educative Content in secondary school | |
Krunoslav Bedi, Ana Ćorić, Damir Samardžija |
Design of Active learning Strategy through Agile Development Methodologies: a technological view | |
Alessia Fanti, Michele Angelaccio |
Web development awareness about W3C standards: Croatia survey | |
Tomislav Jakopec, Tanja Slijepčević, Eleonora Đekić |
Teaching digital security | |
Marjan Krasna, Tomaz Bratina |
A new approach to regional digital divides | |
Blaz Rodic |
Information and Communications Technologies
Comparison of a bank's financial ratios using the Analytic Hierarchy Process | |
Dejan Cehulic, Tihomir Hunjak, Nina Begicevic |
Research Challenges for Cloud Computing Economics | |
Darko Androcec |
Competitiveness based on IT for Small and Medium Enterprises | |
Neven Pintaric |
Journal publishing in digital era: STM scientific journals in Croatia | |
Radovan Vrana |
Model for business and IT allignment | |
Silvana Tomić Rotim, Višnja Komnenić |
RAY TRACING ALGORITHM RENDERING | |
Zvonimir Sabati, Andrija Bernik, Adela Ratković, Stjepan Dolenec |
Competitiveness model designing: Internal approach from resourced-based toward knowledge-based | |
Robert Fabac |
Word-of-Mouth Marketing within Social Networking Sites | |
Iva Gregurec, Ana Ćorić, Boris Tomaš |
Sources for Scientific Frustrations: Productivity and Citation Data | |
Krešimir Zauder, Đilda Pečarić, Miroslav Tuđman |
Error Messaging in Generative Programming | |
Danijel Radošević, Ivan Magdalenić, Tihomir Orehovački |
Implementation of Textures Inside of the Laser engraving Environment | |
Zvonimir Sabati, Andrija Bernik |
Information Systems Security
(Il)Legal Aspects of Digital Antiforensic | |
Jasmin Cosic, Zoran Ćosić, Miroslav Baca |
Selection of Information Security Risk Management Method Using Analytic Hierarchy Process (AHP) | |
Slaven Smojver |
On-line Handwritten Signature Identification: The Basics | |
Tomislav Fotak, Petra Koruga, Miroslav Bača |
Information Security Risk Assessment in Financial Institutions Using VECTOR Matrix and OCTAVE Methods | |
Ivan Magdalenić, Davor Maček, Nikola Ivković |
An Outlook to Security and Trust in Internet Communications | |
Robert Logozar, Petra Koruga |
A review of face recognition algorithms and their application in age estimation | |
Petra Koruga, Jurica Ševa, Miroslav Bača |
Intelligent Information Systems
Causal models | |
Marcel Maretić |
Mobile Gaming Communities: State of the Art Analysis and Business Implications | |
Martin Schumann, Sandra Schön |
Opportunities of automated motive-based user review analysis in the context of mobile app acceptance | |
Elisabeth Platzer |
Fuzzy controller for the control of nuclear reactor's power-control rods | |
Peter Mydlo, Peter Schreiber |
Approach to establishing ChiPSoNet - Children Protection Social Network | |
Miroslav Madjaric, Anko Antabak |
Methodology for risk assessment and corresponding costs in e-government projects | |
Petra Peharda, Dušan Munđar, Neven Vrček |
Intelligent Transport Systems
Some traffic control proposals by means of fuzzy sets theory | |
Jan Piecha, Pawel Gnyla, Miroslav Baca |
Software Engineering
Software Product Lines: Source Code Organization for 3-tier OLTP Architecture Systems | |
Zdravko Rosko |
The Impact of Application Non-Functional Requirements on Enterprise Architecture | |
Darko Galinec, Ljerka Luić |
Optimal parameter choice in modeling of ERP system reliability | |
Frane Urem, Krešimir Fertalj, Želimir Mikulić |
How to apply linear logic in coalgebraical approach of computing | |
Viliam Slodičák, Pavol Macko |
This work is licensed under a Creative Commons Attribution 3.0 License.
Copyright (©) 2007 - 2015. Faculty of Organization and Informatics. All Rights Reserved.