 | Zs. Marian, I.-G. Czibula, I.-G. Mircea, V.-S. Ionescu | A Study on Software Defect Prediction Using Fuzzy Decision Trees | 5 | 20 |
 | G.I. Vac, B. Parv, V. Lupse | A Computational Perspective of the Organizational Culture | 21 | 35 |
 | E. Bucur, M. Cremene, D. Dumitrescu | Asynchronous Activation in Spatial Evolutionary Games | 36 | 53 |
 | D. Bufnea, V. Niculescu, Gh. Silaghi, A. Sterca | Babes-Bolyai University's High Performance Computing Center | 54 | 69 |
 | R. Mocan, L. Diosan | Support Vector Machine and Boosting based Multiclass Classification for Traffic Scene Obstacles | 70 | 81 |
 | J. Perhac, D. Mihalyi | Coalgebraic Specification of Network Intrusion Signatures | 82 | 93 |
 | C. Craciun, S. Salomie | Gaussian-Type Resource Allocation Policies for Virtualized Data Centers | 94 | 109 |
 | D.F. Sotropa | A FCA Strategy for Improving Web-Based Learning Sites | 110 | 123 |
 | A.I. Marinescu | A Genetic Algorithm Approach for Evolving Neural Networks | 124 | 132 |