Masaryk University

Publication Records

česky | in English

Filter publications

    2024

    1. ŠIKL, Radovan, Karla BRÜCKNEROVÁ, Hana ŠVEDOVÁ, Filip DĚCHTĚRENKO, Pavel UGWITZ, Jiří CHMELÍK, Hana POKORNÁ and Vojtěch JUŘÍK. Who benefits and who doesn't in virtual reality learning: An experimental study comparing two types of school. Journal of Computer Assisted Learning. Hoboken: Wiley, 2024, vol. 40, No 4, p. 1591-1604. ISSN 0266-4909. Available from: https://dx.doi.org/10.1111/jcal.12973.

    2023

    1. DAUBNER, Lukáš, Martin MACÁK, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ, Sofija MAKSOVIĆ and Tomáš PITNER. Addressing insider attacks via forensic-ready risk management. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. ENGLAND: ELSEVIER, 2023, vol. 73, March 2023, p. 103433-103449. ISSN 2214-2126. Available from: https://dx.doi.org/10.1016/j.jisa.2023.103433.

    2022

    1. ZELINA, Petr, Jana HALÁMKOVÁ and Vít NOVÁČEK. Unsupervised extraction, labelling and clustering of segments from clinical notes. Online. In Proceedings of IEEE International Conference on Bioinformatics and Biomedicine (BIBM). USA: IEEE, 2022, p. 1362-1368. ISBN 978-1-6654-6820-6. Available from: https://dx.doi.org/10.1109/BIBM55620.2022.9995229.

    2021

    1. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína DOČKALOVÁ BURSKÁ, Valdemar ŠVÁBENSKÝ, Jan VYKOPAL and Jakub ČEGAN. Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training. IEEE Transactions on Visualization and Computer Graphics. 2021, vol. 27, No 8, p. 3425-3437. ISSN 1077-2626. Available from: https://dx.doi.org/10.1109/TVCG.2020.2977336.
    2. RIESE, Emma, Madeleine LORÅS, Martin UKROP and Tomáš EFFENBERGER. Challenges Faced by Teaching Assistants in Computer Science Education Across Europe. Online. In Proceedings of the 2021 ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE ’21). Paderborn, Germany: ACM, 2021, p. 547-553. ISBN 978-1-4503-8214-4. Available from: https://dx.doi.org/10.1145/3430665.3456304.

    2020

    1. JANČÁR, Ján, Vladimír SEDLÁČEK, Petr ŠVENDA and Marek SÝS. Minerva: The curse of ECDSA nonces. Online. In Amir Moradi, Mehdi Tibouchi. IACR Transactions on Cryptographic Hardware and Embedded Systems. Německo: Ruhr-University of Bochum, 2020, p. 281-308. ISSN 2569-2925. Available from: https://dx.doi.org/10.13154/tches.v2020.i4.281-308.
    2. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL and Pavel ČELEDA. What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM, 2020, p. 2-8. ISBN 978-1-4503-6793-6. Available from: https://dx.doi.org/10.1145/3328778.3366816.
    3. UKROP, Martin, Lydia KRAUS and Václav MATYÁŠ. Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version). Digital Threats: Research and Practice. New York, NY, USA: Association for Computing Machinery, 2020, vol. 1, No 4, p. 1-29. ISSN 2692-1626. Available from: https://dx.doi.org/10.1145/3419472.

    2019

    1. ELAVSKY, Steriani, Lenka KNAPOVÁ, Adam KLOCEK and David ŠMAHEL. Mobile Health Interventions for Physical Activity, Sedentary Behavior, and Sleep in Adults Aged 50+ : A Systematic Literature Review. Journal of Aging and Physical Activity. Champaign, IL: Human Kinetics Publication, 2019, vol. 27, No 4, p. 565-593. ISSN 1063-8652. Available from: https://dx.doi.org/10.1123/japa.2017-0410.

    2017

    1. CHALÁS, Igor, Petra URBANOVÁ, Vojtěch JUŘÍK, Zuzana FERKOVÁ, Marie JANDOVÁ, Jiří SOCHOR and Barbora KOZLÍKOVÁ. Generating various composite human faces from real 3D facial images. The Visual Computer. Springer-Verlag, 2017, vol. 33, No 4, p. 443-458. ISSN 0178-2789. Available from: https://dx.doi.org/10.1007/s00371-016-1277-1.
    2. NEMEC, Matúš, Marek SÝS, Petr ŠVENDA, Dušan KLINEC and Václav MATYÁŠ. The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli. Online. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017, p. 1631-1648. ISBN 978-1-4503-4946-8. Available from: https://dx.doi.org/10.1145/3133956.3133969.
    3. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK and Pavel ČELEDA. Toward Stream-Based IP Flow Analysis. IEEE Communications Magazine. IEEE, 2017, vol. 55, No 7, p. 70-76. ISSN 0163-6804. Available from: https://dx.doi.org/10.1109/MCOM.2017.1600972.
    4. BALÁŽIA, Michal and Petr SOJKA. You Are How You Walk: Uncooperative MoCap Gait Identification for Video Surveillance with Incomplete and Noisy Data. Online. In Ross Beveridge, Liang Wang, Mark Nixon. Proceedings of the 3rd IEEE/IAPR International Joint Conference on Biometrics (IJCB 2017). USA: IEEE, 2017, p. 208-215. ISBN 978-1-5386-1124-1. Available from: https://dx.doi.org/10.1109/BTAS.2017.8272700.

    2016

    1. BYDŽOVSKÁ, Hana. A Comparative Analysis of Techniques for Predicting Student Performance. Online. In Tiffany Barnes, Min Chi, Mingyu Feng. Proceedings of the 9th International Conference on Educational Data Mining. Raleigh, NC, USA: International Educational Data Mining Society, 2016, p. 306-311.
    2. VINKLER, Marek, Vlastimil HAVRAN, Jiří BITTNER and Jiří SOCHOR. Parallel On-Demand Hierarchy Construction on Contemporary GPUs. IEEE Transactions on Visualization and Computer Graphics. USA: IEEE, 2016, vol. 22, No 7, p. 1886-1898. ISSN 1077-2626. Available from: https://dx.doi.org/10.1109/TVCG.2015.2465898.

    2015

    1. PARÁK, Boris, David WALLOM, Slávek LICEHAMMER and Zdeněk ŠUSTR. Public-Private Cloud Federation Challenges. Online. 8th edition. Limassol: IEEE/ACM, 2015, p. 512 - 515. Available from: https://dx.doi.org/10.1109/UCC.2015.91.
    2. TÓTH, Šimon and Dalibor KLUSÁČEK. User-Aware Metrics for Measuring Quality of Parallel Job Schedules. In Walfredo Cirne and Narayan Desai. Job Scheduling Strategies for Parallel Processing. 1st ed. Switzerland: Springer, Lecture Notes in Computer Science 8828, 2015, p. 90-107. ISBN 978-3-319-15788-7. Available from: https://dx.doi.org/10.1007/978-3-319-15789-4_6.

    2014

    1. NEVĚŘILOVÁ, Zuzana. Annotation Game for Textual Entailment Evaluation. In Alexander F. Gelbukh. 15th International Conference, CICLing 2014, Kathmandu, Nepal, April 6-12, 2014, Proceedings, Part I. Heidelberg: Springer, 2014, p. 340-350. ISBN 978-3-642-54905-2. Available from: https://dx.doi.org/10.1007/978-3-642-54906-9_28.
    2. TOVARŇÁK, Daniel and Tomáš PITNER. Continuous Queries over Distributed Streams of Heterogeneous Monitoring Data in Cloud Datacenters. In Andreas Holzinger, Therese Libourel, Leszek Maciaszek and Stephen Mellor. ICSOFT-EA 2014 - Proceedings of the 9th International Conference on Software Engineering and Applications. Portugalsko: SCITEPRESS, 2014, p. 470-481. ISBN 978-989-758-036-9. Available from: https://dx.doi.org/10.5220/0005095504700481.
    3. STOKLASA, Roman, Tomáš MAJTNER and David SVOBODA. Efficient k-NN based HEp-2 cells classifier. PATTERN RECOGNITION. OXFORD: PERGAMON-ELSEVIER SCIENCE LTD, 2014, vol. 47, No 7, p. 2409-2418. ISSN 0031-3203. Available from: https://dx.doi.org/10.1016/j.patcog.2013.09.021.
    4. BUKAČ, Vít and Václav MATYÁŠ. Host–Based Intrusion Detection Systems: Architectures, Solutions, and Challenges. In Antonio Ruiz-Martinez, Rafael Marin-Lopez, Fernando Pereniguez-Garcia. Architectures and Protocols for Secure Information Technology Infrastructures. Hershey, PA, United States: IGI Global, 2014, p. 184-214. Advances in Information Security, Privacy, and Ethics (AISPE). ISBN 978-1-4666-4514-1. Available from: https://dx.doi.org/10.4018/978-1-4666-4514-1.ch007.
    5. RŮŽIČKA, Michal, Petr SOJKA and Martin LÍŠKA. Math Indexer and Searcher under the Hood: History and Development of a Winning Strategy. In Noriko Kando, Hideo Joho, Kazuaki Kishida. Proceedings of the 11th NTCIR Conference on Evaluation of Information Access Technologies. Tokyo: National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430 Japan, 2014, p. 127-134. ISBN 978-4-86049-065-2.
    6. TROUBIL, Pavel, Hana RUDOVÁ and Petr HOLUB. Media Streams Planning with Uncertain Link Capacities. Online. In IEEE 13th International Symposium on Network Computing and Applications NCA 2014. USA: IEEE, 2014, p. 197-204. ISBN 978-1-4799-5393-6. Available from: https://dx.doi.org/10.1109/NCA.2014.37.
    7. BRÁZDIL, Tomáš, Stefan KIEFER, Antonín KUČERA, Petr NOVOTNÝ and Joost-Pieter KATOEN. Zero-reachability in probabilistic multi-counter automata. Online. In Thomas Henzinger and Dale Miller. Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). New York: ACM, 2014, p. nestránkováno, 10 pp. ISBN 978-1-4503-2886-9. Available from: https://dx.doi.org/10.1145/2603088.2603161.

    2013

    1. PAŘILOVÁ, Tereza and Tomáš SEZIMA. An Approach to Users with Dyslexia. In 6th Thailand-Japan International Academic Conference. 2013.
    2. MATYÁŠ, Václav and Jiří KŮR. Conflicts between Intrusion Detection and Privacy Mechanisms for Wireless Sensor Networks. IEEE Security & Privacy. New York: IEEE Computer Society, 2013, vol. 11, No 5, p. 73-76. ISSN 1540-7993. Available from: https://dx.doi.org/10.1109/MSP.2013.111.
    3. VYKOPAL, Jan, Martin DRAŠAR and Philipp WINTER. Flow-based Brute-force Attack Detection. In Markus Zeilinger, Peter Schoo, Eckehard Hermann. Advances in IT Early Warning. Stuttgart: Fraunhofer Verlag, 2013, p. 41-51. ISBN 978-3-8396-0474-8.
    4. LUNTER, Ľuboš, Daniel JAKUBÍK, Šimon SUCHOMEL and Michal BRANDEJS. Inter-university Cooperation on Plagiarism Detection Systems in Czech Republic. In Jiří Rybička. Plagiarism Across Europe and Beyond. 1st. Brno: Mendel University in Brno, 2013, p. 216-224. ISBN 978-80-7375-765-6.
    5. VINKLER, Marek, Jiří BITTNER, Vlastimil HAVRAN and Michal HAPALA. Massively Parallel Hierarchical Scene Processing with Applications in Rendering. Computer Graphics Forum. Wiley, 2013, vol. 32, No 8, p. 13-25. ISSN 0167-7055. Available from: https://dx.doi.org/10.1111/cgf.12140.
    6. STEHLÍK, Martin, Adam SALEH, Andriy STETSKO and Václav MATYÁŠ. Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks. Online. In Pietro Liò, Orazio Miglino, Giuseppe Nicosia, Stefano Nolfi and Mario Pavone. Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems. Cambridge, MA 02142-1493 USA: MIT Press, 2013, p. 569-576. ISBN 978-0-262-31709-2. Available from: https://dx.doi.org/10.7551/978-0-262-31709-2-ch082.

    2012

    1. NEVĚŘILOVÁ, Zuzana and Marek GRÁC. Common Sense Inference using Verb Valency Frames. In Sojka, Petr and Horák, Aleš and Kopeček, Ivan and Pala, Karel. Proceedings of 15th International Conference on Text, Speech and Dialogue. Berlin / Heidelberg: Springer, 2012, p. 328-335. ISBN 978-3-642-32789-6. Available from: https://dx.doi.org/10.1007/978-3-642-32790-2_40.
    2. BRÁZDIL, Tomáš, Krishnendu CHATTERJEE, Antonín KUČERA and Petr NOVOTNÝ. Efficient Controller Synthesis for Consumption Games with Multiple Resource Types. In Computer Aided Verification - 24th International Conference, CAV 2012. Berlin: Springer, 2012, p. 23-38. ISBN 978-3-642-31423-0. Available from: https://dx.doi.org/10.1007/978-3-642-31424-7_8.
    3. MATERNA, Jiří. LDA-Frames: An Unsupervised Approach to Generating Semantic Frames. In Alexander Gelbukh. Computational Linguistics and Intelligent Text Processing, 13th International Conference, CICLing 2012, Part I. Berlin: Springer-Verlag, 2012, p. 376-387. ISBN 978-3-642-28603-2. Available from: https://dx.doi.org/10.1007/978-3-642-28604-9_31.
    4. SEHNAL, David, Radka SVOBODOVÁ VAŘEKOVÁ, Heinrich J. HUBER, Stanislav GEIDL, Crina-Maria IONESCU, Michaela WIMMEROVÁ and Jaroslav KOČA. SiteBinder: An improved approach for comparing multiple protein structural motifs. Journal of Chemical Information and Modeling. 2012, vol. 52, No 2, p. 343–359. ISSN 1549-9596. Available from: https://dx.doi.org/10.1021/ci200444d.

    2011

    1. GRÁC, Marek. Case study of BushBank concept. In The 25th Pacific Asia Conference on Language, Information and Computation. Singapore: Institute for Digital Enhancement of Cognitive Development, Waseda University, 2011, p. 353-361, 8 pp. ISBN 978-4-905166-02-3.
    2. MATELA, Jiří, Vít RUSŇÁK and Petr HOLUB. Efficient JPEG2000 EBCOT Context Modeling for Massively Parallel Architectures. In Storer, James A. and Marcellin, Michael W. Data Compression Conference (DCC), 2011. Washington, DC, USA: IEEE Computer Society, 2011, p. 423-432. ISBN 978-0-7695-4352-9. Available from: https://dx.doi.org/10.1109/DCC.2011.49.
    3. BRÁZDIL, Tomáš, Jan KRČÁL, Jan KŘETÍNSKÝ and Vojtěch ŘEHÁK. Fixed-delay Events in Generalized Semi-Markov Processes Revisited. In CONCUR 2011 - Concurrency Theory: 22nd International Conference. Berlin Heidelberg New York: Springer, 2011, p. 140-155. ISBN 978-3-642-23216-9.
    4. LUDÍK, Tomáš and Jaroslav RÁČEK. Process Methodology for Emergency Management. In IFIP Advances in Information and Communication Technology, Volume 359 AICT, 9th IFIP WG 5.11 International Symposium on Environmental Software Systems: Frameworks of eEnvironment, ISESS 2011. Heidelberg: Springer, 2011, p. 302-309. ISBN 978-3-642-22284-9. Available from: https://dx.doi.org/10.1007/978-3-642-22285-6_33.

    2010

    1. KASPRZAK, Jan, Michal BRANDEJS, Matěj ČUHEL and Tomáš OBŠÍVAČ. Access Rights in Enterprise Full-text Search. In ICEIS 2010: Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 1: Databases and Information Systems Integration. 2010th ed. Funchal, Portugal: INSTICC – Institute for Systems and Technologies of Information, Control and Communication, 2010, p. 32-39. ISBN 978-989-8425-04-1.
Display details
Displayed: 9/11/2024 01:28