Cover pages |
PDF |
|
Invited Lectures
|
Mechanism design and incentives’ engineering |
PDF |
Demetri Kantarelis |
|
Automated Reasoning: Some Successes and New Challenges |
PDF |
Predrag Janičić |
|
Major Trends for E-Government in Europe |
PDF |
Georg E. Schäfer |
|
|
Education for Information Society
|
Student modelling in blended learning environment |
PDF |
Haidi Kuvač, Slavomir Stankov |
|
Computer ergonomics in elementary school |
PDF |
Mario Zovkić, Tedo Vrbanec, Jasminka Dobša |
|
An Overview of Computer Programming Teaching Methods in Higher Education |
PDF |
Sanja Mohorovičić, Vedran Strčić |
|
Web development awareness about W3C standards: Croatia survey |
PDF |
Tomislav Jakopec, Tanja Slijepčević, Eleonora Đekić |
|
Teaching digital security |
PDF |
Marjan Krasna, Tomaz Bratina |
|
Flexible Learning Approach and Curricula Education towards the Labour Market in Secondary Technical Education: A Case Study |
PDF |
Petar Jandrić, Mario Božurić, Mia Carapina |
|
A new approach to regional digital divides |
PDF |
Blaz Rodic |
|
Evaluation of similarity metrics for programming code plagiarism detection method |
PDF |
Vedran Juricic |
|
Perceptions of Multicultural College Students: Case-Studies of European, American and Australian Universities |
PDF |
Alen Delić, Violeta Vidacek-Hains, Laura Adarve |
|
Project Based Learning: Students' Design of Interactive Multimedia CD/DVD with Educative Content in secondary school |
PDF |
Krunoslav Bedi, Ana Ćorić, Damir Samardžija |
|
Design of Active learning Strategy through Agile Development Methodologies: a technological view |
PDF |
Alessia Fanti, Michele Angelaccio |
|
Evaluation of Student Programming Assignments in Online Environments |
PDF |
Mario Đanić, Danijel Radošević, Tihomir Orehovački |
|
|
Information Systems Security
|
Selection of Information Security Risk Management Method Using Analytic Hierarchy Process (AHP) |
PDF |
Slaven Smojver |
|
A review of face recognition algorithms and their application in age estimation |
PDF |
Petra Koruga, Jurica Ševa, Miroslav Bača |
|
Information Security Risk Assessment in Financial Institutions Using VECTOR Matrix and OCTAVE Methods |
PDF |
Ivan Magdalenić, Davor Maček, Nikola Ivković |
|
On-line Handwritten Signature Identification: The Basics |
PDF |
Tomislav Fotak, Petra Koruga, Miroslav Bača |
|
(Il)Legal Aspects of Digital Antiforensic |
PDF |
Jasmin Ćosic, Zoran Ćosić, Miroslav Baca |
|
An Outlook to Security and Trust in Internet Communications |
PDF |
Robert Logozar, Petra Koruga |
|
|
Information and Communications Technologies
|
Journal publishing in digital era: STM scientific journals in Croatia |
PDF |
Radovan Vrana |
|
Research Challenges for Cloud Computing Economics |
PDF |
Darko Androcec |
|
Error Messaging in Generative Programming |
PDF |
Danijel Radošević, Ivan Magdalenić, Tihomir Orehovački |
|
Comparison of a bank's financial ratios using the Analytic Hierarchy Process |
PDF |
Dejan Cehulic, Tihomir Hunjak, Nina Begicevic |
|
Model for business and IT allignment |
PDF |
Silvana Tomić Rotim, Višnja Komnenić |
|
Competitiveness model designing: Internal approach from resourced-based toward knowledge-based |
PDF |
Robert Fabac |
|
Implementation of Textures Inside of the Laser engraving Environment |
PDF |
Zvonimir Sabati, Andrija Bernik |
|
RAY TRACING ALGORITHM RENDERING |
PDF |
Zvonimir Sabati, Andrija Bernik, Adela Ratković, Stjepan Dolenec |
|
Word-of-Mouth Marketing within Social Networking Sites |
PDF |
Iva Gregurec, Ana Ćorić, Boris Tomaš |
|
Sources for Scientific Frustrations: Productivity and Citation Data |
PDF |
Krešimir Zauder, Đilda Pečarić, Miroslav Tuđman |
|
Competitiveness based on IT for Small and Medium Enterprises |
PDF |
Neven Pintaric |
|
|
Data and Knowledge Bases
|
Insights from Web 3.0: Is it Time for a New Scientific Publishing Methodology? |
PDF |
Markus Schatten, Mirko Maleković |
|
An Analysis of the Social and Conceptual Networks of CECIIS 2005 - 2010 |
PDF |
Markus Schatten, Juraj Rasonja, Petar Halusek, Frane Jakelić |
|
Supervised Discretization for Rough Sets – a Neighborhood Graph Approach |
PDF |
Visnja Ognjenovic, Vladimir Brtka, Martin Jovanovic, Ivana Berkovic |
|
Calculation of Total Costs of Reciprocally Conditioned Service Departments – Allocation Methods |
PDF |
Slavko Matanović, Josip Mesaric |
|
The Modeling and Complexity of Dynamical Systems by Means of Computation and Information Theories |
PDF |
Robert Logozar, Alen Lovrencic |
|
Cross Validation Method in Frequent Itemset Mining |
PDF |
Savo Tomović, Predrag Stanišić |
|
|
Intelligent Information Systems
|
Opportunities of automated motive-based user review analysis in the context of mobile app acceptance |
PDF |
Elisabeth Platzer |
|
Fuzzy controller for the control of nuclear reactor's power-control rods |
PDF |
Peter Mydlo, Peter Schreiber |
|
Mobile Gaming Communities: State of the Art Analysis and Business Implications |
PDF |
Martin Schumann, Sandra Schön |
|
Approach to establishing ChiPSoNet - Children Protection Social Network |
PDF |
Miroslav Madjaric, Anko Antabak |
|
Methodology for risk assessment and corresponding costs in e-government projects |
PDF |
Petra Peharda, Dušan Munđar, Neven Vrček |
|
Causal models |
PDF |
Marcel Maretić |
|
|
Intelligent Transport Systems
|
Some traffic control proposals by means of fuzzy sets theory |
PDF |
Jan Piecha, Pawel Gnyla, Miroslav Baca |
|
|
Software Engineering
|
The Impact of Application Non-Functional Requirements on Enterprise Architecture |
PDF |
Darko Galinec, Ljerka Luić |
|
Optimal parameter choice in modeling of ERP system reliability |
PDF |
Frane Urem, Krešimir Fertalj, Želimir Mikulić |
|
How to apply linear logic in coalgebraical approach of computing |
PDF |
Viliam Slodičák, Pavol Macko |
Software Product Lines: Source Code Organization for 3-tier OLTP Architecture Systems |
PDF |
Zdravko Rosko |
|