The SCEAS System
Navigation Menu

Search the dblp DataBase


Bostjan Brumen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bostjan Brumen, Izidor Golob, Hannu Jaakkola, Tatjana Welzer, Ivan Rozman
    Early Assessment of Classification Performance. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:91-96 [Conf]
  2. Matjaz B. Juric, Tatjana Welzer, Ivan Rozman, Marjan Hericko, Bostjan Brumen, Tomaz Domajnko, Ales Zivkovic
    Performance Assesment Framework for Distributed Object Architectures. [Citation Graph (0, 5)][DBLP]
    ADBIS, 1999, pp:349-366 [Conf]
  3. Tatjana Welzer, Ivan Rozman, Peter Kokol, J. Györös, Matjaz Colnaric, Bostjan Brumen
    Computing Science Research Activities at the Faculty of Electrical Engineering, Computer Science and Informatics. [Citation Graph (0, 0)][DBLP]
    ADBIS-DASFAA Symposium, 2000, pp:266-274 [Conf]
  4. Bostjan Brumen, Tatjana Welzer, Marjan Druzovec, Izidor Golob, Hannu Jaakkola
    Protecting Medical Data for Analyses. [Citation Graph (0, 0)][DBLP]
    CBMS, 2002, pp:102-0 [Conf]
  5. Tatjana Welzer, Bostjan Brumen, Izidor Golob, Marjan Druzovec
    Medical Diagnostic and Data Quality. [Citation Graph (0, 0)][DBLP]
    CBMS, 2002, pp:97-101 [Conf]
  6. Bostjan Brumen, Hannu Jaakkola, Tatjana Welzer
    Predicting Sample Size in Data Mining Tasks: Using Additive Incremental Approach. [Citation Graph (0, 0)][DBLP]
    EJC, 2000, pp:264-270 [Conf]
  7. Tatjana Welzer-Druzovec, Ivan Rozman, Bostjan Brumen, Marjan Druzovec
    Reuse in the Sense of the Rapid Database Prototyping for Intelligent Systems. [Citation Graph (0, 0)][DBLP]
    IC-AI, 1999, pp:294-298 [Conf]
  8. Tatjana Welzer, David Riaño, Bostjan Brumen, Marjan Druzovec
    Internationalization Content in Intelligent Systems - How to Teach it? [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:1039-1044 [Conf]
  9. Bostjan Brumen, Izidor Golob, Tatjana Welzer, Ivan Rozman, Marjan Druzovec, Hannu Jaakkola
    An Algorithm for Protecting Knowledge Discovery Data. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:3, pp:277-288 [Journal]
  10. Bostjan Brumen, Izidor Golob, Tatjana Welzer, Ivan Rozman, Marjan Druzovec, Hannu Jaakkola
    Data protection for outsourced data mining. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  11. Matjaz B. Juric, Ivan Rozman, Bostjan Brumen, Matjaz Colnaric, Marjan Hericko
    Comparison of performance of Web services, WS-Security, RMI, and RMI-SSL. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:5, pp:689-700 [Journal]
  12. Tatjana Welzer, Peter Kokol, Ana Habjanic, Bostjan Brumen, Marjan Druzovec, Aida Kamisalic
    Teaching IT in Health Care and Nursing Program--Experiences. [Citation Graph (0, 0)][DBLP]
    CBMS, 2007, pp:349-356 [Conf]
  13. Ales Zivkovic, Marjan Hericko, Bostjan Brumen, Simon Beloglavec, Ivan Rozman
    The Impact of Details in the Class Diagram on Software Size Estimation. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:2, pp:295-312 [Journal]
  14. Bostjan Brumen, Matjaz B. Juric, Tatjana Welzer, Ivan Rozman, Hannu Jaakkola, Apostolos Papadopoulos
    Assessment of Classification Models with Small Amounts of Data. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2007, v:18, n:3, pp:343-362 [Journal]

  15. Opening the Knowledge Tombs - Web Based Text Mining as Approach for Re-evaluation of Machine Learning Rules. [Citation Graph (, )][DBLP]

  16. The improvement of data quality - a conceptual model. [Citation Graph (, )][DBLP]

  17. Conceptual Model - Meeting of Cultures. [Citation Graph (, )][DBLP]

  18. Medical Personal Data in Secure Information Systems. [Citation Graph (, )][DBLP]

  19. Teaching of Information Security in the "Health Care and Nursing" Postgraduate program. [Citation Graph (, )][DBLP]

  20. Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol. [Citation Graph (, )][DBLP]

  21. Two proposed identity-based three-party authenticated key agreement protocols from pairings. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002