default search action
Hrvoje Belani
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c15]Hrvoje Belani, Petar Solic, Toni Perkovic, Kristina Zovko:
Ontology-Based Cybersecurity for Well-Being, Aging and Health: A Scoping Review. MeditCom 2023: 50-55 - 2022
- [c14]Hrvoje Belani, Petar Solic, Toni Perkovic:
An Industrial IoT-Based Ontology Development for Well-Being, Aging and Health: A Scoping Review. HealthCom 2022: 179-185 - [c13]Hrvoje Belani, Petar Solic, Toni Perkovic:
Towards Ontology-Based Requirements Engineering for IoT-Supported Well-Being, Aging and Health. RE Workshops 2022: 65-74 - [i2]Hrvoje Belani, Petar Solic, Toni Perkovic:
Towards Ontology-Based Requirements Engineering for IoT-Supported Well-Being, Aging and Health. CoRR abs/2211.10735 (2022)
2010 – 2019
- 2019
- [c12]Kristina Fister, Hrvoje Belani, Danko Relic, Marijan Erceg:
Biomedical Informatics Workforce in Croatia: Qualitative Analysis of Teachers' Opinions on Needs and Employment Opportunities. MedInfo 2019: 1921-1922 - [c11]Hrvoje Belani, Marin Vukovic, Zeljka Car:
Requirements Engineering Challenges in Building AI-Based Complex Systems. RE Workshops 2019: 252-255 - [i1]Hrvoje Belani, Marin Vukovic, Zeljka Car:
Requirements Engineering Challenges in Building AI-Based Complex Systems. CoRR abs/1908.11791 (2019) - 2017
- [c10]Kristina Drusany Staric, Petra Bukovec, Brian Caulfield, Ana Madevska Bogdanova, Hrvoje Belani:
ICT-assisted personalized therapy and rehabilitation in urinary incontinence. ConTEL 2017: 69-74 - 2016
- [p1]Hrvoje Belani, Igor Ljubi, Bruno Blaskovic:
A Security Assessment Framework for e-Health: A Croatian Perspective. Meeting Security Challenges Through Data Analytics and Decision Support 2016: 293-300 - 2014
- [c9]Hrvoje Belani, Zeljka Car, Marin Vukovic:
Augmentative Requirements Engineering - Getting Closer to Sensitive User's Needs. UsARE (Revised Selected Papers) 2014: 97-116 - 2013
- [c8]Hrvoje Belani:
Augmentative Requirements Engineering for Trustworthy and Usable ICT-Based Services. SouthCHI 2013: 815-818 - 2012
- [c7]Hrvoje Belani:
Towards a usability requirements taxonomy for mobile AAC services. UsARE@ICSE 2012: 36-39 - [c6]Ivan Vucak, Hrvoje Belani, Marin Vukovic:
AAC Services Development: From Usability Requirements to the Reusable Components. KES-AMSTA 2012: 231-240 - 2011
- [j1]Hrvoje Belani:
Barcodes for mobile devices by Hiroko Kato, Keng T. Tan and Douglas Chai. ACM SIGSOFT Softw. Eng. Notes 36(3): 32-33 (2011) - [c5]Hrvoje Belani, Dalibor Karlovic, Sandro Novosel:
An ICT-driven local NGO: digital ecosystems perspective. MEDES 2011: 184-188
2000 – 2009
- 2009
- [c4]Hrvoje Belani, Zeljka Car, Antun Caric:
RUP-based process model for security requirements engineering in value-added service development. SESS@ICSE 2009: 54-60 - [c3]Marin Vukovic, Kresimir Pripuzic, Hrvoje Belani:
An Intelligent Automatic Hoax Detection System. KES (1) 2009: 318-325 - 2008
- [c2]Kresimir Pripuzic, Hrvoje Belani, Marin Vukovic:
Early Forest Fire Detection with Sensor Networks: Sliding Window Skylines Approach. KES (1) 2008: 725-732 - 2006
- [c1]Zeljka Car, Hrvoje Belani, Antun Caric:
A Conceptual Framework for Business Process Engineering: A Case Study. ICSEA 2006: 29
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint