Masaryk University

Publication Records

česky | in English

Filter publications

    2023

    1. DAUBNER, Lukáš, Matulevičius RAIMUNDAS and Barbora BÜHNOVÁ. A Model of Qualitative Factors in Forensic-Ready Software Systems. Online. In Research Challenges in Information Science: Information Science and the Connected World. Cham: Springer Nature Switzerland, 2023, p. 308-324. ISBN 978-3-031-33079-7. Available from: https://dx.doi.org/10.1007/978-3-031-33080-3_19.
    2. SOULA, Meriem, Bacem MBAREK, Aref MEDDEB and Tomáš PITNER. A Survey of Intrusion Detection-based Trust Management Approaches in IoT Networks. Online. In Leonard Barolli. International Conference on Advanced Information Networking and Applications (AINA-2023). 37th ed. Brazil: Springer, 2023, p. 504-517. ISBN 978-3-031-28693-3. Available from: https://dx.doi.org/10.1007/978-3-031-28694-0_48.
    3. MBAREK, Bacem, Meriem SOULA, Tomáš PITNER and Aref MEDDEB. An Effective Replica Node Detection Scheme in Internet of Things Networks. Online. In International Wireless Communications & Mobile Computing Conference (IWCMC 2023). 19th. Marrakech,Grand Mogador Menara Hotel: IEEE Xplore, 2023, p. 608-613. ISBN 979-8-3503-3339-8. Available from: https://dx.doi.org/10.1109/IWCMC58020.2023.10182793.
    4. TUŠIL, Jan, Traian SERBANUTA and Jan OBDRŽÁLEK. Cartesian Reachability Logic: A Language-parametric Logic for Verifying k-Safety Properties. Online. In Ruzica Piskac and Andrei Voronkov. Proceedings of 24th International Conference on Logic for Programming, Artificial Intelligence and Reasoning. Manchester: EasyChair, 2023, p. 405-456. ISSN 2398-7340. Available from: https://dx.doi.org/10.29007/1874.
    5. IQBAL, Danish, Barbora BÜHNOVÁ and Emilia CIOROAICA. Digital Twins for Trust Building in Autonomous Drones through Dynamic Safety Evaluation. Online. In 18th International Conference on Evaluation of Novel Approaches to Software Engineering - ENASE. Neuveden: SciTePress, 2023, p. 629-639. ISBN 978-989-758-647-7. Available from: https://dx.doi.org/10.5220/0011986900003464.
    6. DUFKA, Antonín and Petr ŠVENDA. Enabling Efficient Threshold Signature Computation via Java Card API. Online. In Proceedings of the 18th International Conference on Availability, Reliability and Security. Benevento, Italy: Association for Computing Machinery, 2023, p. 1-10. ISBN 979-8-4007-0772-8. Available from: https://dx.doi.org/10.1145/3600160.3600180.
    7. TIMILSINA, Mohan, Samuele BUOSI, Adrianna JANIK, Pasquale MINERVINI, Luca COSTABELLO, Maria TORRENTE, Mariano PROVENCIO, Virginia CALVO, Carlos CAMPS, Ana L ORTEGA, Bartomeu MASSUTI, Rosario Garcia M. CAMPELO, del Barco EDEL, Joaquim BOSCH-BARRERA and Vít NOVÁČEK. Machine Learning Survival Models for Relapse Prediction in a Early Stage Lung Cancer Patient. Online. In 2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN. Broadbeach, Australia: IEEE, 2023, p. 1-8. ISBN 978-1-6654-8867-9. Available from: https://dx.doi.org/10.1109/IJCNN54540.2023.10191078.
    8. BLANCO SÁNCHEZ, José Miguel and Bruno ROSSI. Multi-Step Reasoning for IoT Devices. In Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2023). Not specified: SciTePress, 2023, p. 330-337. ISBN 978-989-758-647-7. Available from: https://dx.doi.org/10.5220/0011772700003464.
    9. KUHEJDA, Ondřej and Bruno ROSSI. Pull Requests Acceptance: A Study Across Programming Languages. Online. In 49th Euromicro Conference Series on Software Engineering and Advanced Applications (SEAA2023). Not specified: IEEE, 2023, p. 378-385. ISBN 979-8-3503-4235-2. Available from: https://dx.doi.org/10.1109/SEAA60479.2023.00064.
    10. SOBOTKA, Václav and Hana RUDOVÁ. Real-world Pickup and Delivery Problem with Transfers. Online. In Roman Barták, Wheeler Ruml, Oren Salzman. Sixteenth International Symposium on Combinatorial Search. Washington DC, USA: The AAAI Press, Washington, DC, USA, 2023, p. 83-91. ISBN 978-1-57735-882-4. Available from: https://dx.doi.org/10.1609/socs.v16i1.27286.
    11. SASSMANN, Vojtěch, Hana RUDOVÁ, Michal GABONAY and Václav SOBOTKA. Real-World Vehicle Routing using Adaptive Large Neighborhood Search. In Leslie Pérez Cáceres, Thomas Stützle. Evolutionary Computation in Combinatorial Optimization. New York City, USA: Springer, Cham, 2023, p. 34-49. ISBN 978-3-031-30034-9. Available from: https://dx.doi.org/10.1007/978-3-031-30035-6_3.
    12. BOUČEK, Vladimír and Martin HUSÁK. Recommending Similar Devices in Close Proximity for Network Security Management. Online. In 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). Montreal: IEEE, 2023, p. 481-484. ISBN 979-8-3503-3667-2. Available from: https://dx.doi.org/10.1109/WiMob58348.2023.10187729.
    13. KUŠNIRÁKOVÁ, Daša and Barbora BÜHNOVÁ. Rethinking Certification for Higher Trust and Ethical Safeguarding of Autonomous Systems. Online. In Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering. Setubal, Portugal: Scitepress, 2023, p. 158-169. ISBN 978-989-758-647-7. Available from: https://dx.doi.org/10.5220/0011971500003464.
    14. CHAU, Calvin, Jan KŘETÍNSKÝ and Stefanie MOHR. Syntactic vs Semantic Linear Abstraction and Refinement of Neural Networks. Online. In Automated Technology for Verification and Analysis. ATVA 2023. Singapore: Springer, 2023, p. 401-421. ISBN 978-3-031-45328-1. Available from: https://dx.doi.org/10.1007/978-3-031-45329-8_19.
    15. ŠUFLIARSKY, Adam, Günter WALLLNER and Simone KRIGLSTEIN. Through Space and Time: Spatio-Temporal Visualization of MOBA Matches. Online. In Abdelnour Nocera, J., Kristín Lárusdóttir, M., Petrie, H., Piccinno, A., Winckler, M. IFIP Conference on Human-Computer Interaction (INTERACT 2023). York, UK: Springer, 2023, p. 167-189. ISBN 978-3-031-42282-9. Available from: https://dx.doi.org/10.1007/978-3-031-42283-6_9.
    16. KRAUS, Lydia, Valdemar ŠVÁBENSKÝ, Martin HORÁK, Václav MATYÁŠ, Jan VYKOPAL and Pavel ČELEDA. Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. Online. In Proceedings of the 28th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'23). New York, NY, USA: ACM, 2023, p. 236-242. ISBN 979-8-4007-0138-2. Available from: https://dx.doi.org/10.1145/3587102.3588862.

    2022

    1. JANOVSKÝ, Adam, Davide MAIORCA, Dominik MACKO, Václav MATYÁŠ and Giorgio GIACINTO. A Longitudinal Study of Cryptographic API: a Decade of Android Malware. In Sabrina De Capitani di Vimercati and Pierangela Samarati. Proceedings of the 19th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2022, p. 121-133. ISBN 978-989-758-590-6. Available from: https://dx.doi.org/10.5220/0011265300003283.
    2. PESCHEL, Jakub, Michal BATKO and Pavel ZEZULA. Analytical Algebra: Extension of Relational Algebra. Online. In Strauss, C., Cuzzocrea, A., Kotsis, G., Tjoa, A.M., Khalil, I. 33rd International Conference on Database and Expert Systems Applications (DEXA). Cham: Springer International Publishing, 2022, p. 284-290. ISBN 978-3-031-12425-9. Available from: https://dx.doi.org/10.1007/978-3-031-12426-6_25.
    3. MIČKO, Radoslav, Stanislav CHREN and Bruno ROSSI. Applicability of Software Reliability Growth Models to Open Source Software. Online. In 48th Euromicro Conference Series on Software Engineering and Advanced Applications (SEAA2022). Not specified: IEEE, 2022, p. 255-262. ISBN 978-1-6654-6152-8. Available from: https://dx.doi.org/10.1109/SEAA56994.2022.00047.
    4. BANGUI, Hind and Barbora BÜHNOVÁ. Blockchain Patterns in Critical Infrastructures: Limitations and Recommendations. Online. In The 17th International Conference on Software and Data Technologies (ICSOFT). Lisbon, Portugal: Scitepress, 2022, p. 457-468. ISBN 978-989-758-588-3. Available from: https://dx.doi.org/10.5220/0011278500003266.
    5. DAUBNER, Lukáš, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš PITNER. Business Process Model and Notation for Forensic-Ready Software Systems. Online. In Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering. Setúbal, Portugal: SciTePress, 2022, p. 95-106. ISBN 978-989-758-568-5. Available from: https://dx.doi.org/10.5220/0011041000003176.
    6. BEYER, Dirk and Jan STREJČEK. Case Study on Verification-Witness Validators: Where We Are and Where We Go. Online. In Gagandeep Singh, Caterina Urban. Static Analysis - 29th International Symposium, SAS 2022, Auckland, New Zealand, December 5–7, 2022, Proceedings. Cham (Switzerland): Springer, 2022, p. 160-174. ISBN 978-3-031-22307-5. Available from: https://dx.doi.org/10.1007/978-3-031-22308-2_8.
    7. MEDVEĎ, Marek, Aleš HORÁK and Radoslav SABOL. Comparing RNN and Transformer Context Representations in the Czech Answer Selection Task. Online. In Ana Paula Rocha, Luc Steels, Jaap van den Herik. Proceedings of the 14th International Conference on Agents and Artificial Intelligence (ICAART). Portugal: SCITEPRESS, 2022, p. 388-394. ISBN 978-989-758-547-0. Available from: https://dx.doi.org/10.5220/0010827000003116.
    8. MÍČ, Vladimír and Pavel ZEZULA. Concept of Relational Similarity Search. In Tomáš Skopal, Fabrizio Falchi, Jakub Lokoč, Maria Luisa Sapino, Ilaria Bartolini, Marco Patella. Similarity Search and Applications: 15th International Conference, SISAP 2022, Bologna, Italy, October 5 - October 7, 2022, Proceedings. Cham: Springer, 2022, p. 89-103. ISBN 978-3-031-17848-1. Available from: https://dx.doi.org/10.1007/978-3-031-17849-8_8.
    9. MACÁK, Martin, Lukáš DAUBNER, Mohammadreza FANI SANI and Barbora BÜHNOVÁ. Cybersecurity Analysis via Process Mining: A Systematic Literature Review. Online. In Advanced Data Mining and Applications. Cham, Switzerland: Springer, 2022, p. 393-407. ISBN 978-3-030-95404-8. Available from: https://dx.doi.org/10.1007/978-3-030-95405-5_28.
    10. MALINKA, Kamil, Libuše VODOVÁ, Martina JANČOVÁ, Lenka SOBKOVÁ and Vladimír SCHINDLER. Effective Teaching through Multidisciplinary Lessons Adopting 3D Print – Preliminary Study. Online. In Theo Bastiaens. Proceedings of EdMedia + Innovate Learning. United States: Association for the Advancement of Computing in Education (AACE), 2022, p. 286-291. ISBN 978-1-939797-62-9.
    11. MACÁK, Martin, Lukáš DAUBNER, Júlia JAMNICKÁ and Barbora BÜHNOVÁ. Game Achievement Analysis: Process Mining Approach. Online. In Advanced Data Mining and Applications. Cham: Springer International Publishing, 2022, p. 68-82. ISBN 978-3-030-95407-9. Available from: https://dx.doi.org/10.1007/978-3-030-95408-6_6.
    12. ŠPAČEK, Stanislav, Petr VELAN, Pavel ČELEDA and Daniel TOVARŇÁK. HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. Online. In 2022 IEEE/IFIP Network Operations and Management Symposium (NOMS 2022). Budapešť, Maďarsko: IEEE Xplore Digital Library, 2022, p. 1-6. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789877.
    13. BLANCO SÁNCHEZ, José Miguel, Mouzhi GE and Tomáš PITNER. Human-Generated Web Data Disentanglement for Complex Event Processing. In 26th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2022. Verona, Italy: Elsevier, 2022, p. 1341-1349. ISSN 1877-0509. Available from: https://dx.doi.org/10.1016/j.procs.2022.09.190.
    14. RUSŇÁK, Vít, Lenka JANEČKOVÁ, Filip DRGOŇ, Anna-Marie DOMBAJOVÁ and Veronika KUDĚLKOVÁ. Improving Cybersecurity Incident Analysis Workflow with Analytical Provenance. Online. In Ebad Banissi, Anna Ursyn, Mark W. McK. Bannatyne, et al. 2022 26th International Conference Information Visualisation (IV). Vienna, Austria: IEEE, 2022, p. 300-306. ISBN 978-1-6654-9007-8. Available from: https://dx.doi.org/10.1109/IV56949.2022.00058.
    15. NĚMCOVÁ, Petra, Jana HOZZOVÁ and Jiří FILIPOVIČ. Improving ligand transport trajectory within flexible receptor in CaverDock. Online. In SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. USA: Association for Computing Machinery, 2022, p. 619-626. ISBN 978-1-4503-8713-2. Available from: https://dx.doi.org/10.1145/3477314.3506988.
    16. BALÁŽIA, Michal, Kateřina HLAVÁČKOVÁ-SCHINDLER, Petr SOJKA and Claudia PLANT. Interpretable Gait Recognition by Granger Causality. In Proceedings of 26th International Conference on Pattern Recognition, ICPR 2022. Los Alamitos, CA, USA: IEEE, 2022, p. 1069-1075. ISBN 978-1-6654-9062-7. Available from: https://dx.doi.org/10.1109/ICPR56361.2022.9956624.
    17. AGAOGLU CAGIRICI, Deniz and Petr HLINĚNÝ. Isomorphism Testing for T-graphs in FPT. In Mutzel, P., Rahman, M.S., Slamin. WALCOM: Algorithms and Computation. LNCS 13174. Cham: Springer, Cham, 2022, p. 239-250. ISBN 978-3-030-96730-7. Available from: https://dx.doi.org/10.1007/978-3-030-96731-4_20.
    18. ŠVENDA, Petr, Rudolf KVAŠŇOVSKÝ, Imrich NAGY and Antonín DUFKA. JCAlgTest: Robust identification metadata for certified smartcards. Online. In Sabrina De Capitani di Vimercati. Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022). Portugal: INSTICC, 2022, p. 597-604. ISBN 978-989-758-590-6. Available from: https://dx.doi.org/10.5220/0011294000003283.
    19. KLINEC, Dušan, Marek SÝS, Karel KUBÍČEK, Petr ŠVENDA and Václav MATYÁŠ. Large-scale randomness study of security margins for 100+ cryptographic functions. In Sabrina De Capitani di Vimercati, Pierangela Samarati. Proceedings of the 19th International Conference on Security and Cryptography. Lisbon, Portugal: Scitepress, 2022, p. 134-146. ISBN 978-989-758-590-6. Available from: https://dx.doi.org/10.5220/0011267600003283.
    20. OĽHA, Jaroslav, Terézia SLANINÁKOVÁ, Martin GENDIAR, Matej ANTOL and Vlastislav DOHNAL. Learned Indexing in Proteins: Substituting Complex Distance Calculations with Embedding and Clustering Techniques. In Tomáš Skopal, Fabrizio Falchi, Jakub Lokoč, Maria Luisa Sapino, Ilaria Bartolini, Marco Patella. Similarity Search and Applications, 15th International Conference, SISAP 2022, Bologna, Italy, October 5–7, 2022, Proceedings. 1st ed. Cham: Springer Cham, 2022, p. 274-282. ISBN 978-3-031-17848-1. Available from: https://dx.doi.org/10.1007/978-3-031-17849-8_22.
    21. ŠUĽAN, Samuel and Martin HUSÁK. Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, p. "22:1"-"22:6", 6 pp. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3539007.
    22. IQBAL, Danish and Barbora BÜHNOVÁ. Model-based Approach for Building Trust in Autonomous Drones through Digital Twins. Online. In 2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC). USA: IEEE, 2022, p. 656-662. ISBN 978-1-6654-5258-8. Available from: https://dx.doi.org/10.1109/SMC53654.2022.9945227.
    23. KOSTKA, Petr, Bruno ROSSI and Mouzhi GE. Monte Carlo Methods for Industry 4.0 Applications. Online. In International Conference on Systems, Man, and Cybernetics (SMC'22). Not specified: IEEE, 2022, p. 242-247. ISBN 978-1-6654-5258-8. Available from: https://dx.doi.org/10.1109/SMC53654.2022.9945553.
    24. HETLEROVIĆ, Dušan, Lubomír POPELÍNSKÝ, P. BRAZDIL, C. SOARES and F. FREAITAS. On Usefulness of Outlier Elimination in Classification Tasks. Online. In Tassadit Bouadi, Élisa Fromont, Eyke Hüllermeier. International Symposium on Intelligent Data Analysis 2022. Rennes: Springer, 2022, p. 143-156. ISBN 978-3-031-01332-4. Available from: https://dx.doi.org/10.1007/978-3-031-01333-1_12.
    25. DOSTÁL, Pavel, Hana RUDOVÁ and Vilém PAŘIL. Planning for high-speed railways in the Czech Republic. Online. In Patrick De Causmaecker, Ender Özcan, Greet Vanden Bergh. Proceedings of the 13th International Conference on the Practice and Theory of Automated Timetabling - PATAT 2022, Volume III. Leuven, Belgium: PATAT, 2022, p. 182-187. ISBN 978-0-9929984-5-5.
    26. MBAREK, Bacem, Mouzhi GE and Tomáš PITNER. Precisional Detection Strategy for 6LoWPAN Networks in IoT. Online. In Vladimír Mařík; Dimitar Filev; Mengchu Zhou; Edward Tunsel; Edward Tunsel. International Conference on Systems, Man, and Cybernetics (SMC. Prague: IEEE, 2022, p. 1006-1011. ISBN 978-1-6654-5258-8. Available from: https://dx.doi.org/10.1109/SMC53654.2022.9945346.
    27. RUDOVÁ, Hana, Tomáš MÜLLER and Zuzana MÜLLEROVÁ. Real-world university course timetabling at the International Timetabling Competition 2019. Online. In Patrick De Causmaecker, Ender Özcan, Greet Vanden Bergh. Proceedings of the 13th International Conference on the Practice and Theory of Automated Timetabling - PATAT 2022, Volume III. Leuven, Belgium: PATAT, 2022, p. 234-238. ISBN 978-0-9929984-5-5.
    28. DUFKA, Antonín, Vladimír SEDLÁČEK and Petr ŠVENDA. SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes. Online. In Proceedings of the 19th International Conference on Security and Cryptography. Lisbon, Portugal: SCITEPRESS, 2022, p. 305-316. ISBN 978-989-758-590-6. Available from: https://dx.doi.org/10.5220/0011145600003283.
    29. KŘENKOVÁ, Markéta, Vladimír MÍČ and Pavel ZEZULA. Similarity Search with the Distance Density Model. In Tomáš Skopal, Fabrizio Falchi, Jakub Lokoč, Maria Luisa Sapino, Ilaria Bartolini, Marco Patella. Similarity Search and Applications: 15th International Conference, SISAP 2022, Bologna, Italy, October 5 - October 7, 2020, Proceedings. Cham: Springer, 2022, p. 118-132. ISBN 978-3-031-17848-1. Available from: https://dx.doi.org/10.1007/978-3-031-17849-8_10.
    30. HUSÁK, Martin and Milan ČERMÁK. SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, p. "25:1"-"25:10", 10 pp. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3538981.
    31. CIOROAICA, Emilia, José Miguel BLANCO SÁNCHEZ and Bruno ROSSI. Timing Model for Predictive Simulation of Safety-Critical Systems. Online. In 17th International Conference on Software Technologies (ICSOFT 2022). Not specified: SciTePress, 2022, p. 331-339. ISBN 978-989-758-588-3. Available from: https://dx.doi.org/10.5220/0011317000003266.
    32. BLANCO SÁNCHEZ, José Miguel, Bruno ROSSI and Tomáš PITNER. Tools for the Confluence of Semantic Web and IoT: A Survey. Online. In Hermann Kaindl, Mike Mannion and Leszek Maciaszek. Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2022). Not specified: SciTePress, 2022, p. 150-161. ISBN 978-989-758-568-5. Available from: https://dx.doi.org/10.5220/0011064100003176.
    33. KICO, Iris, Jan SEDMIDUBSKÝ and Pavel ZEZULA. Towards Efficient Human Action Retrieval based on Triplet-Loss Metric Learning. Online. In Strauss, C., Cuzzocrea, A., Kotsis, G., Tjoa, A.M., Khalil, I. 33rd International Conference on Database and Expert Systems Applications (DEXA). Berlin, Heidelberg: Springer-Verlag, 2022, p. 234-247. ISBN 978-3-031-12422-8. Available from: https://dx.doi.org/10.1007/978-3-031-12423-5_18.
    34. KRAUS, Lydia, Matěj GRABOVSKÝ, Martin UKROP, Katarína GALANSKÁ and Václav MATYÁŠ. Usability Insights from Establishing TLS Connections. In IFIP International Conference on ICT Systems Security and Privacy Protection. Cham, Germany: Springer Verlag, 2022, p. 289-305. ISBN 978-3-031-06974-1. Available from: https://dx.doi.org/10.1007/978-3-031-06975-8_17.
    35. BUDÍKOVÁ, Petra, Daniel KLEPÁČ, Dávid RUSNÁK and Milan SLOVÁK. Visual Exploration of Human Motion Data. Online. In Skopal, T., Falchi, F., Lokoč, J., Sapino, M.L., Bartolini, I., Patella, M. 15th International Conference on Similarity Search and Applications (SISAP 2022). Neuveden: Springer, Cham, 2022, p. 64-71. ISBN 978-3-031-17848-1. Available from: https://dx.doi.org/10.1007/978-3-031-17849-8_6.

    2021

    1. BLANCO SÁNCHEZ, José Miguel, Bruno ROSSI and Tomáš PITNER. A Time-Sensitive Model for Data Tampering Detection for the Advanced Metering Infrastructure. Online. In Proceedings of the 16th Conference on Computer Science and Intelligence Systems (FedCSIS). New York, USA: IEEE, 2021, p. 511-519. ISBN 978-1-6654-2942-9. Available from: https://dx.doi.org/10.15439/2021F106.
    2. CHALUPA, Marek and Jan STREJČEK. Backward Symbolic Execution with Loop Folding. Online. In Cezara Dragoi, Suvam Mukherjee, and Kedar S. Namjoshi. Static Analysis - 28th International Symposium, SAS 2021, Chicago, IL, USA, October 17-19, 2021, Proceedings. Cham (Switzerland): Springer, 2021, p. 49-76. ISBN 978-3-030-88805-3. Available from: https://dx.doi.org/10.1007/978-3-030-88806-0_3.
    3. HA, Hien Thi, Aleš HORÁK and BUi MINH TUAN. Contract Metadata Identification in Czech Scanned Documents. Online. In Ana Paula Rocha ; Luc Steels and Jaap van den Herik. Proceedings of the 13th International Conference on Agents and Artificial Intelligence - Volume 2: ICAART. Portugal: The SciTePress Digital Library, 2021, p. 795-802. ISBN 978-989-758-484-8. Available from: https://dx.doi.org/10.5220/0010243807950802.
    4. MALINKA, Kamil and Vladimír SCHINDLER. Current Challenges in the Educational Usage of 3D Printing in Primary and Secondary Schools. Online. In Theo Bastiaens. Proceedings of EdMedia + Innovate Learning. United States: Association for the Advancement of Computing in Education (AACE), 2021, p. 88-96. ISBN 978-1-939797-56-8.
    5. SLANINÁKOVÁ, Terézia, Matej ANTOL, Jaroslav OĽHA and Vlastislav DOHNAL. Data-driven Learned Metric Index: an Unsupervised Approach. In 14th International Conference on Similarity Search and Applications (SISAP 2021). Cham: Springer, 2021, p. 81-94. ISBN 978-3-030-89656-0. Available from: https://dx.doi.org/10.1007/978-3-030-89657-7_7.
    6. BUDÍKOVÁ, Petra, Jan SEDMIDUBSKÝ and Pavel ZEZULA. Efficient Indexing of 3D Human Motions. Online. In ACM International Conference on Multimedia Retrieval (ICMR). Neuveden: ACM, 2021, p. 10-18. ISBN 978-1-4503-8463-6. Available from: https://dx.doi.org/10.1145/3460426.3463646.
    7. DOČKALOVÁ BURSKÁ, Karolína, Vít RUSŇÁK and Radek OŠLEJŠEK. Enhancing Situational Awareness for Tutors of Cybersecurity Capture the Flag Games. Online. In Ebad Banissi, Anna Ursyn, et al. 2021 25th International Conference Information Visualisation (IV). United States of America: IEEE, 2021, p. 235-242. ISBN 978-1-6654-3827-8. Available from: https://dx.doi.org/10.1109/IV53921.2021.00045.
    8. ŠPAČEK, Stanislav, Daniel TOVARŇÁK and Pavel ČELEDA. Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption. In Audun Jøsang, Lynn Futcher, Janne Hagen. ICT Systems Security and Privacy Protection. 1st ed. Oslo: Springer, 2021, p. 302-316. ISBN 978-3-030-78119-4. Available from: https://dx.doi.org/10.1007/978-3-030-78120-0_20.
    9. ČECHÁK, Jaroslav and Radek PELÁNEK. Experimental Evaluation of Similarity Measures for Educational Items. Online. In I-Han Hsiao, Shaghayegh Sahebi, François Bouchet, Jill-Jênn Vie. Proceedings of the 14th International Conference on Educational Data Mining. Neuveden: Neuveden, 2021, p. 553-558. ISBN 978-1-7336736-2-4.
    10. MADARAS, Martin, Martin STUCHLIK and Matúš TALČÍK. Fast Bridgeless Pyramid Segmentation for Organized Point Clouds. Online. In Farinella, GM Radeva, P Braz, J Bouatouch, K. VISAPP: PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS - VOL. 4: VISAPP. SETUBAL: SCITEPRESS, 2021, p. 205-210. ISBN 978-989-758-488-6. Available from: https://dx.doi.org/10.5220/0010163802050210.
    11. PESCHEL, Jakub, Michal BATKO, Jakub VALČÍK, Jan SEDMIDUBSKÝ and Pavel ZEZULA. FIMSIM: Discovering Communities By Frequent Item-Set Mining and Similarity Search. In 14th International Conference on Similarity Search and Applications (SISAP). Cham: Springer International Publishing, 2021, p. 372-383. ISBN 978-3-030-89656-0. Available from: https://dx.doi.org/10.1007/978-3-030-89657-7_28.
    12. HYNEK, Jiří, Jakub KACHLÍK and Vít RUSŇÁK. Geovisto: A Toolkit for Generic Geospatial Data Visualization. Online. In Christophe Hurter, Helen Purchase, Jose Braz, Kadi Bouatouch. Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Volume 3 IVAPP: IVAPP. Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2021, p. 101-111. ISBN 978-989-758-488-6. Available from: https://dx.doi.org/10.5220/0010260401010111.
    13. ČERMÁK, Milan and Denisa ŠRÁMKOVÁ. GRANEF: Utilization of a Graph Database for Network Forensics. Online. In Sabrina De Capitani di Vimercati, Pierangela Samarati. Proceedings of the 18th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2021, p. 785-790. ISBN 978-989-758-524-1. Available from: https://dx.doi.org/10.5220/0010581807850790.
    14. KRAUS, Lydia, Mária ŠVIDROŇOVÁ and Elizabeth STOBERT. How Do Users Chain Email Accounts Together? In Jøsang A., Futcher L., Hagen J. IFIP International Conference on ICT Systems Security and Privacy Protection. Switzerland: Springer International Publishing, 2021, p. 416-429. ISBN 978-3-030-78119-4. Available from: https://dx.doi.org/10.1007/978-3-030-78120-0_27.
    15. MACÁK, Martin, Štefan BOJNÁK and Barbora BÜHNOVÁ. Identification of Unintentional Perpetrator Attack Vectors using Simulation Game: A Case Study. Online. In Proceedings of the 16th Conference on Computer Science and Intelligence Systems. New York: IEEE, 2021, p. 349-356. ISBN 978-83-959183-8-4. Available from: https://dx.doi.org/10.15439/2021F85.
    16. BLANCO SÁNCHEZ, José Miguel, Mouzhi GE and Tomáš PITNER. Modeling Inconsistent Data for Reasoners in Web of Things. Online. In Procedia Computer Science, Volume 192, 25th KES International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2021. Szczecin: Elsevier, 2021, p. 1265-1273. ISSN 1877-0509. Available from: https://dx.doi.org/10.1016/j.procs.2021.08.130.
    17. JÁNOŠOVÁ, Miriama, David PROCHÁZKA and Vlastislav DOHNAL. Organizing Similarity Spaces using Metric Hulls. In 14th International Conference on Similarity Search and Applications (SISAP 2021). Cham: Springer, 2021, p. 3-16. ISBN 978-3-030-89656-0. Available from: https://dx.doi.org/10.1007/978-3-030-89657-7_1.
    18. UHLÁR, Juraj, Martin HOLKOVIČ and Vít RUSŇÁK. PCAPFunnel: A Tool for Rapid Exploration of Packet Capture Files. Online. In Ebad Banissi, Anna Ursyn, et al. 2021 25th International Conference Information Visualisation (IV). United States of America: The Institute of Electrical and Electronics Engineers, Inc., 2021, p. 69-76. ISBN 978-1-6654-3827-8. Available from: https://dx.doi.org/10.1109/IV53921.2021.00021.
    19. MÍČ, Vladimír, Tomáš RAČEK, Aleš KŘENEK and Pavel ZEZULA. Similarity Search for an Extreme Application: Experience and Implementation. In Nora Reyes, Richard Connor, Nils Kriege, Daniyal Kazempour, Ilaria Bartolini, Erich Schubert, Jian-Jia Chen. Similarity Search and Applications: 14th International Conference, SISAP 2021, Dortmund, Germany, September 29 - October 1, 2021, Proceedings. Cham: Springer, 2021, p. 265-279. ISBN 978-3-030-89656-0. Available from: https://dx.doi.org/10.1007/978-3-030-89657-7_20.
    20. CHODIL, Miroslav and Antonín KUČERA. The Satisfiability Problem for a Quantitative Fragment of PCTL. In Evripidis Bampis and Aris Pagourtzis. Fundamentals of Computation Theory. 23rd International Symposium, FCT 2021. Německo: Springer, 2021, p. 149-161. ISBN 978-3-030-86592-4. Available from: https://dx.doi.org/10.1007/978-3-030-86593-1_10.
    21. MBAREK, Bacem, Mouzhi GE and Tomáš PITNER. Trust-based Detection Strategy against Replication Attacks in IoT. Online. In Makoto Takizawa, Leonard Barolli, Donald Elmazi. The 35th International Conference on Advanced Information Networking and Applications (AINA-2021). Springer International Publi. Toronto, Canada: Springer, 2021, p. 646-656. ISBN 978-3-030-75074-9. Available from: https://dx.doi.org/10.1007/978-3-030-75075-6_53.
    22. BALABÁN, Jakub and Petr HLINĚNÝ. Twin-Width is Linear in the Poset Width. Online. In Golovach, Petr A. and Zehavi, Meirav. International Symposium on Parameterized and Exact Computation (IPEC). 214th ed. Dagstuhl: Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik, 2021, p. "6:1"-"6:13", 13 pp. ISBN 978-3-95977-216-7. Available from: https://dx.doi.org/10.4230/LIPIcs.IPEC.2021.6.

    2020

    1. PESCHEL, Jakub, Michal BATKO and Pavel ZEZULA. Algebra for Complex Analysis of Data. Online. In Hartmann S., Küng J., Kotsis G., Tjoa A.M., Khalil I. International Conference on Database and Expert Systems Applications. Cham: Springer International Publishing, 2020, p. 177-187. ISBN 978-3-030-59002-4. Available from: https://dx.doi.org/10.1007/978-3-030-59003-1_12.
    2. KICO, Iris, David ZELNÍČEK and Fotios LIAROKAPIS. Assessing the Learning of Folk Dance Movements Using Immersive Virtual Reality. Online. In Juan Guerrero. 2020 24th International Conference on Information Visualisation (IV). Melbourne: IEEE, 2020, p. 587-592. ISBN 978-1-7281-9134-8. Available from: https://dx.doi.org/10.1109/IV51561.2020.00100.
    3. MBAREK, Bacem, Mouzhi GE and Tomáš PITNER. Blockchain-based Access Control for IoT in Smart Home Systems. Online. In Proceedings of the 31st International Conference on Database and Expert Systems Applications - DEXA 2020. Bratislava, Slovakia: Springer, 2020, p. 17-32. ISBN 978-3-030-59050-5. Available from: https://dx.doi.org/10.1007/978-3-030-59051-2_2.
    4. STREČANSKÝ, Peter, Stanislav CHREN and Bruno ROSSI. Comparing Maintainability Index, SIG Method, and SQALE for Technical Debt Identification. In 35th ACM/SIGAPP Symposium On Applied Computing. Brno, Czech Republic: ACM, 2020, p. 121-124. ISBN 978-1-4503-6866-7. Available from: https://dx.doi.org/10.1145/3341105.3374079.
    5. VISHWAKARMA, Deepak Kumar, Ashutosh BHATIA and Zdeněk ŘÍHA. Detection of Algorithmically Generated Domain Names in Botnets. In Leonard Barolli, Makoto Takizawa, Fatos Xhafa, Tomoya Enokido. Advanced Information Networking and Applications, AINA 2019. Cham, Switzerland: Springer Nature Switzerland, 2020, p. 1279-1290. ISBN 978-3-030-15031-0. Available from: https://dx.doi.org/10.1007/978-3-030-15032-7_107.
    6. GE, Mouzhi and Wlodzimierz LEWONIEWSKI. Developing the Quality Model for Collaborative Open Data. Online. In Proceedings of the 24th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems - KES 2020. 176th ed. Verona, Italy: Elsevier Procedia Computer Science, 2020, p. 1883-1892. ISSN 1877-0509. Available from: https://dx.doi.org/10.1016/j.procs.2020.09.228.
    7. MBAREK, Bacem, Mouzhi GE and Tomáš PITNER. Enhanced Network Intrusion Detection System Protocol for Internet of Things. Online. In Proceedings of the 35th ACM/SIGAPP Symposium On Applied Computing. Brno, Czech Republic: ACM Publishing, 2020, p. 1156-1163. ISBN 978-1-4503-6866-7. Available from: https://dx.doi.org/10.1145/3341105.3373867.
    8. MOTSCHNIG, Renate, Michael SILBER and Valdemar ŠVÁBENSKÝ. How Does a Student-Centered Course on Communication and Professional Skills Impact Students in the Long Run?. Online. In 2020 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2020, p. 1-9. ISBN 978-1-7281-8961-1. Available from: https://dx.doi.org/10.1109/FIE44824.2020.9273962.
    9. BANGUI, Hind, Mouzhi GE and Barbora BÜHNOVÁ. Improving Big Data Clustering for Jamming Detection in Smart Mobility. Online. In Proceedings of the 35th International Conference on ICT Systems Security and Privacy Protection - IFIP SEC. Maribor, Slovenia: Springer IFIP AICT series, 2020, p. 78-91. ISBN 978-3-030-58200-5. Available from: https://dx.doi.org/10.1007/978-3-030-58201-2_6.
    10. KORENČIK, Lukáš, Petr ROČKAI, Henrich LAUKO and Jiří BARNAT. On Symbolic Execution of Decompiled Programs. In Proceedings - 2020 IEEE 20th International Conference on Software Quality, Reliability, and Security, QRS 2020. Neuveden: IEEE Computer Society, 2020, p. 265-272. ISBN 978-1-7281-8914-7. Available from: https://dx.doi.org/10.1109/QRS51102.2020.00044.
    11. VELAN, Petr and Tomáš JIRSÍK. On the Impact of Flow Monitoring Configuration. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Budapešť: IEEE Xplore Digital Library, 2020, p. 1-7. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110361.
    12. ORÉMUŠ, Zoltán, Kahin AKRAM HASSAN, Jiří CHMELÍK, Michaela KŇAŽKOVÁ, Jan BYŠKA, Renata Georgia RAIDOU and Barbora KOZLÍKOVÁ. PINGU: Principles of Interactive Navigation for Geospatial Understanding. Online. In IEEE. 2020 IEEE Pacific Visualization Symposium (PacificVis). Tianjin, China: IEEE PacificVis 2020, 2020, p. 216-225. ISBN 978-1-7281-5697-2. Available from: https://dx.doi.org/10.1109/PacificVis48177.2020.7567.
    13. KLINEC, Dušan and Václav MATYÁŠ. Privacy-Friendly Monero Transaction Signing on a Hardware Wallet. In Assist. Prof. Marko Hölbl, Prof. Dr. Kai Rannenberg, Tatjana Welzer. ICT Systems Security and Privacy Protection. 35th. Cham: Springer International Publishing, 2020, p. 338-351. ISBN 978-3-030-58200-5. Available from: https://dx.doi.org/10.1007/978-3-030-58201-2_23.
    14. MBAREK, Bacem, Mouzhi GE and Tomáš PITNER. Self-adaptive RFID Authentication for Internet of Things. In Proceedings of the 33rd International Conference on Advanced Information Networking and Applications (AINA-2019). Matsue, Japan: Springer, Advances in Intelligent Systems and Computing, 2020, p. 1094-1105. ISBN 978-3-030-15031-0. Available from: https://dx.doi.org/10.1007/978-3-030-15032-7_92.
    15. DRAŠAR, Martin, Stephen MOSKAL, Shanchieh Jay YANG and Pavol ZAŤKO. Session-level Adversary Intent-Driven Cyberattack Simulator. Online. In Dusan Maga, Jiri Haek. DS-RT '20: Proceedings of the IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications. Praha: IEEE, 2020, p. 7-15. ISBN 978-1-7281-7343-6.
    16. HUSÁK, Martin, Tomáš JIRSÍK and Shanchieh Jay YANG. SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security. Online. In Proceedings of the 15th International Conference on Availability, Reliability and Security. New York, NY, United States: Association for Computing Machinery, 2020, p. 1-10. ISBN 978-1-4503-8833-7. Available from: https://dx.doi.org/10.1145/3407023.3407062.
    17. DAUBNER, Lukáš, Martin MACÁK, Barbora BÜHNOVÁ and Tomáš PITNER. Verification of Forensic Readiness in Software Development: A Roadmap. Online. In Proceedings of the 35th Annual ACM Symposium on Applied Computing. New York, NY, USA: Association for Computing Machinery, 2020, p. 1658-1661. ISBN 978-1-4503-6866-7. Available from: https://dx.doi.org/10.1145/3341105.3374094.

    2019

    1. BENEŠ, Nikola, Luboš BRIM, Martin GELETKA, Samuel PASTVA and David ŠAFRÁNEK. Accelerating Parameter Synthesis Using Semi-algebraic Constraints. Online. In Ahrendt, Wolfgang and Tapia Tarifa, Silvia Lizeth. Integrated Formal Methods. LNCS 11918. Cham: Springer International Publishing, 2019, p. 27-45. ISBN 978-3-030-34967-7. Available from: https://dx.doi.org/10.1007/978-3-030-34968-4_2.
    2. TOVARŇÁK, Daniel. An Algorithm for Message Type Discovery in Unstructured Log Data. Online. In Proceedings of the 14th International Conference on Software Technologies - Volume 1: ICSOFT. Prague: SciTePress, 2019, p. 665-676. ISBN 978-989-758-379-7. Available from: https://dx.doi.org/10.5220/0007919806650676.
    3. SMERIGA, Juraj and Tomáš JIRSÍK. Behavior-Aware Network Segmentation using IP Flows. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2019, p. 1-9. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3339265.
    4. SEDMIDUBSKÝ, Jan, Petr ELIÁŠ and Pavel ZEZULA. Benchmarking Search and Annotation in Continuous Human Skeleton Sequences. Online. In International Conference on Multimedia Retrieval (ICMR). New York, NY, USA: ACM, 2019, p. 38-42. ISBN 978-1-4503-6765-3. Available from: https://dx.doi.org/10.1145/3323873.3325013.
    5. ANTOL, Matej and Vlastislav DOHNAL. BM-index: Balanced Metric Space Index based on Weighted Voronoi Partitioning. In Lecture Notes in Computer Science. Advances in Databases and Information Systems, 23th East European Conference, ADBIS 2019. LNCS 11695. Cham: Springer International Publishing, 2019, p. 337-353. ISBN 978-3-030-28729-0. Available from: https://dx.doi.org/10.1007/978-3-030-28730-6_21.
    6. ARCERI, Vincenzo, Martina OLLIARO, Agostino CORTESI and Isabella MASTROENI. Completeness of Abstract Domains for String Analysis of JavaScript Programs. In Robert M. Hierons, Mohamed Mosbah. CORTESI, Agostino and Isabella MASTROENI. Theoretical Aspects of Computing – ICTAC 2019. Hammamet, Tunisia: Springer, 2019, p. 255-272. ISBN 978-3-030-32504-6. Available from: https://dx.doi.org/10.1007/978-3-030-32505-3_15.
    7. GE, Mouzhi, Stanislav CHREN, Bruno ROSSI and Tomáš PITNER. Data Quality Management Framework for Smart Grid Systems. Online. In Abramowicz W., Corchuelo R. Proceedings of the 22nd International Conference on Business Information Systems. Switzerland: Springer, 2019, p. 299-310. ISBN 978-3-030-20481-5. Available from: https://dx.doi.org/10.1007/978-3-030-20482-2_24.
    8. GEŠVINDR, David, Barbora BÜHNOVÁ and Jaroslav DAVÍDEK. Design of Scalable and Resilient Applications using Microservice Architecture in PaaS Cloud. Online. In Proceedings of the 14th International Conference on Software Technologies - Volume 1: ICSOFT. Neuveden: SciTePress, 2019, p. 619-630. ISBN 978-989-758-379-7. Available from: https://dx.doi.org/10.5220/0007842906190630.
    9. CHALUPA, Marek and Jan STREJČEK. Evaluation of Program Slicing in Software Verification. In Wolfgang Ahrendt, Silvia Lizeth Tapia Tarifa. Integrated Formal Methods - 15th International Conference, IFM 2019, Bergen, Norway, December 2-6, 2019, Proceedings. Cham (Switzerland): Springer, 2019, p. 101-119. ISBN 978-3-030-34967-7. Available from: https://dx.doi.org/10.1007/978-3-030-34968-4_6.
    10. BENEŠ, Nikola, Luboš BRIM, Samuel PASTVA, Jakub POLÁČEK and David ŠAFRÁNEK. Formal Analysis of Qualitative Long-Term Behaviour in Parametrised Boolean Networks. In Ait Ameur et al. Formal Methods and Software Engineering - 21st International Conference on Formal Engineering Methods, ICFEM 2019, Shenzhen, China, November 5-9, 2019, Proceedings. Heidelberg: Springer, 2019, p. 353-369. ISBN 978-3-030-32408-7. Available from: https://dx.doi.org/10.1007/978-3-030-32409-4_22.
    11. SEDLÁČEK, Vladimír, Dušan KLINEC, Marek SÝS, Petr ŠVENDA and Václav MATYÁŠ. I want to break square-free: The 4p - 1 factorization method and its RSA backdoor viability. Online. In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications (ICETE 2019) - Volume 2: SECRYPT. Prague, Czech Republic: SCITEPRESS, 2019, p. 25-36. ISBN 978-989-758-378-0. Available from: https://dx.doi.org/10.5220/0007786600250036.
    12. ŠTILL, Vladimír and Jiří BARNAT. Local Nontermination Detection for Parallel C++ Programs. In Ölveczky P., Salaün G. International Conference on Software Engineering and Formal Methods. Cham: Springer, 2019, p. 373-390. ISBN 978-3-030-30445-4. Available from: https://dx.doi.org/10.1007/978-3-030-30446-1_20.
    13. BLAHOUDEK, František, Juraj MAJOR and Jan STREJČEK. LTL to Smaller Self-Loop Alternating Automata and Back. Online. In Robert Mark Hierons, Mohamed Mosbah. Theoretical Aspects of Computing - ICTAC 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31 - November 4, 2019, Proceedings. Cham (Switzerland): Springer, 2019, p. 152-171. ISBN 978-3-030-32504-6. Available from: https://dx.doi.org/10.1007/978-3-030-32505-3_10.
    14. FERKOVÁ, Zuzana and Petr MATULA. Multimodal Point Distribution Model for Anthropological Landmark Detection. Online. In 26th IEEE International Conference on Image Processing (ICIP2019). Taipei, Taiwan: Springer, 2019, p. 2986-2990. ISBN 978-1-5386-6249-6. Available from: https://dx.doi.org/10.1109/ICIP.2019.8803252.
    15. CAGIRICI, Onur, Subir GHOSH, Petr HLINĚNÝ and Bodhayan ROY. On conflict-free chromatic guarding of simple polygons. Online. In 13th Annual International Conference on Combinatorial Optimization and Applications (COCOA'19). Cham: Springer, Lecture Notes in Computer Science, volume 11949, 2019, p. 601-612. ISBN 978-3-030-36411-3. Available from: https://dx.doi.org/10.1007/978-3-030-36412-0_49.
    16. FOUCAUD, Florent, Hervé HOCQUARD, Dimitry LAJOU, Valia MITSOU and Théo PIERRON. Parameterized complexity of edge-coloured and signed graph homomorphism problems. Online. In 14th International Symposium on Parameterized and Exact Computation (IPEC 2019). Munich: Dagstuhl, 2019, p. "15:1"-"15:16", 16 pp. ISBN 978-3-95977-129-0. Available from: https://dx.doi.org/10.4230/LIPIcs.IPEC.2019.15.
    17. ROČKAI, Petr, Zuzana BARANOVÁ, Jan MRÁZEK, Katarína KEJSTOVÁ and Jiří BARNAT. Reproducible Execution of POSIX Programs with DiOS. In Peter Csaba Ölveczky and Gwen Salaün. Software Engineering and Formal Methods. 17th ed. Cham: Springer International Publishing, 2019, p. 333-349. ISBN 978-3-030-30445-4. Available from: https://dx.doi.org/10.1007/978-3-030-30446-1_18.
    18. MBAREK, Bacem, Barbora BÜHNOVÁ and Tomáš PITNER. SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems. Online. In The 15th International Wireless Communications & Mobile Computing Conference (IWCMC 2019). Tangier, Morocco: IEEE, 2019, p. 1373-1378. ISBN 978-1-5386-7747-6. Available from: https://dx.doi.org/10.1109/IWCMC.2019.8766442.
    19. ŠTEFANKO, Martin, Ondřej CHALOUPKA and Bruno ROSSI. The Saga Pattern in a Reactive Microservices Environment. Online. In Marten van Sinderen and Leszek Maciaszek. 14th International Conference on Software Technologies (ICSOFT 2019). Prague: SciTePress, 2019, p. 483-490. ISBN 978-989-758-379-7. Available from: https://dx.doi.org/10.5220/0007918704830490.
    20. KAROLYI, Matěj, Jan KREJČÍ, Jakub ŠČAVNICKÝ, Roman VYŠKOVSKÝ and Martin KOMENDA. Tools for development of interactive web-based maps: application in healthcare. In Václav Skála. WSCG'2019 - 27. International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision'2019. Plzeň: Vaclav Skala - UNION Agency, 2019, p. 1-8. ISBN 978-80-86943-38-1. Available from: https://dx.doi.org/10.24132/CSRN.2019.2902.2.1.
    21. MAŠKA, Martin, Tereza NEČASOVÁ, David WIESNER, Dmitry SOROKIN, Igor PETERLÍK, Vladimír ULMAN and David SVOBODA. Toward Robust Fully 3D Filopodium Segmentation and Tracking in Time-Lapse Fluorescence Microscopy. Online. In 26th IEEE International Conference on Image Processing. Taipei: IEEE, 2019, p. 819-823. ISBN 978-1-5386-6249-6. Available from: https://dx.doi.org/10.1109/ICIP.2019.8803721.
    22. JURČÍK, Adam, Katarína FURMANOVÁ, Jan BYŠKA, Vojtěch VONÁSEK, Ondřej VÁVRA, Pavol ULBRICH, Helwig HAUSER and Barbora KOZLÍKOVÁ. Visual Analysis of Ligand Trajectories in Molecular Dynamics. Online. In IEEE Pacific Visualization Symposium 2019. Bangkok, Thailand: IEEE, 2019, p. 212-221. ISBN 978-1-5386-9226-4. Available from: https://dx.doi.org/10.1109/PacificVis.2019.00032.

    2018

    1. LIPČÁK, Jakub and Bruno ROSSI. A Large-Scale Study on Source Code Reviewer Recommendation. Online. In 44th Euromicro Conference on Software Engineering and Advanced Applications (SEAA) 2018. Not specified: IEEE, 2018, p. 378-387. ISBN 978-1-5386-7383-6. Available from: https://dx.doi.org/10.1109/SEAA.2018.00068.
    2. JONÁŠ, Martin and Jan STREJČEK. Abstraction of Bit-Vector Operations for BDD-Based SMT Solvers. In Bernd Fischer, Tarmo Uustalu. Theoretical Aspects of Computing – ICTAC 2018. Cham (Switzerland): Springer, 2018, p. 273-291. ISBN 978-3-030-02507-6. Available from: https://dx.doi.org/10.1007/978-3-030-02508-3_15.
    3. NĚMEC, Lukáš, Radim OŠŤÁDAL, Václav MATYÁŠ and Petr ŠVENDA. Adaptive Secrecy Amplification with Radio Channel Key Extraction (Adaptive secrecy amplification with radio channel key extraction). Online. In Lisa O’Conner. 2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS). New York, NY, USA: IEEE, 2018, p. 123-130. ISBN 978-1-5386-5470-5. Available from: https://dx.doi.org/10.1109/DCOSS.2018.00028.
    4. HUSÁK, Martin, Nataliia NESHENKO, Morteza SAFAEI POUR, Elias BOU-HARB and Pavel ČELEDA. Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "29:1"-"29:6", 6 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3230837.
    5. NÁLEPA, Filip, Michal BATKO and Pavel ZEZULA. Continuous Time-Dependent kNN Join by Binary Sketches. Online. In Bipin C. Desai. IDEAS 2018 : 22nd International Database Engineering & Applications Symposium, June 18-20, 2018, Villa San Giovanni, Italy. New York: ACM, 2018, p. 64-73. ISBN 978-1-4503-6527-7. Available from: https://dx.doi.org/10.1145/3216122.3216159.
    6. OŠLEJŠEK, Radek, Jan VYKOPAL, Karolína BURSKÁ and Vít RUSŇÁK. Evaluation of Cyber Defense Exercises Using Visual Analytics Process. Online. In Proceedings of the 48th IEEE Frontiers in Education Conference (FIE'18). San Jose, California, USA: IEEE, 2018, p. 1-9. ISBN 978-1-5386-1173-9. Available from: https://dx.doi.org/10.1109/FIE.2018.8659299.
    7. BENDÍK, Jaroslav, Nikola BENEŠ and Ivana ČERNÁ. Finding Regressions in Projects under Version Control Systems. In Leszek A. Maciaszek and Marten van Sinderen. 13th International Conference on Software Technologies. Porto: SciTePress, 2018, p. 152-163. ISBN 978-989-758-320-9. Available from: https://dx.doi.org/10.5220/0006864401520163.
    8. HLINĚNÝ, Petr, Filip POKRÝVKA and Bodhayan ROY. FO model checking of geometric graphs. Online. In 12th International Symposium on Parameterized and Exact Computation (IPEC 2017). LIPIcs 89. Dagstuhl: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018, p. "19:1"-"19:12", 12 pp. ISBN 978-3-95977-051-4. Available from: https://dx.doi.org/10.4230/LIPIcs.IPEC.2017.19.
    9. LAŠTOVIČKA, Martin, Antonín DUFKA and Jana KOMÁRKOVÁ. Machine Learning Fingerprinting Methods in Cyber Security Domain: Which one to Use?. Online. In IEEE. Proceedings of the 14th International Wireless Communications and Mobile Computing Conference. Limassol, Cyprus: IEEE Xplore Digital Library, 2018, p. 542-547. ISBN 978-1-5386-2070-0. Available from: https://dx.doi.org/10.1109/IWCMC.2018.8450406.
    10. ŠTILL, Vladimír and Jiří BARNAT. Model Checking of C++ Programs Under the x86-TSO Memory Model. In Jing Sun, Meng Sun. Formal Methods and Software Engineering. Cham: Springer, 2018, p. 124-140. ISBN 978-3-030-02449-9. Available from: https://dx.doi.org/10.1007/978-3-030-02450-5_8.
    11. CAGIRICI, Onur, Petr HLINĚNÝ and Bodhayan ROY. On Colourability of Polygon Visibility Graphs. Online. In 37th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2017). LIPIcs 93. Dagstuhl: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2018, p. "21:1"-"21:14", 14 pp. ISBN 978-3-95977-055-2. Available from: https://dx.doi.org/10.4230/LIPIcs.FSTTCS.2017.21.
    12. SVEC, Jan, Josef V. PSUTKA, Jan TRMAL, Lubos SMIDL, Pavel IRCING and Jan SEDMIDUBSKÝ. ON THE USE OF GRAPHEME MODELS FOR SEARCHING IN LARGE SPOKEN ARCHIVES. In 43rd IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2018). Neuveden: IEEE Computer Society, 2018, p. 6259-6263. ISBN 978-1-5386-4658-8. Available from: https://dx.doi.org/10.1109/ICASSP.2018.8461774.
    13. BENDÍK, Jaroslav, Elaheh GHASSABANI, Michael WHALEN and Ivana ČERNÁ. Online Enumeration of All Minimal Inductive Validity Cores. In Einar Broch Johnsen and Ina Schaefer. Software Engineering and Formal Methods - 16th International Conference. LNCS 10886. Neuveden: Springer International Publishing, 2018, p. 189-204. ISBN 978-3-319-92969-9. Available from: https://dx.doi.org/10.1007/978-3-319-92970-5_12.
    14. LAŠTOVIČKA, Martin, Tomáš JIRSÍK, Pavel ČELEDA, Stanislav ŠPAČEK and Daniel FILAKOVSKÝ. Passive OS Fingerprinting Methods in the Jungle of Wireless Networks. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 9 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406262.
    15. BROŽ, Milan, Mikuláš PATOČKA and Václav MATYÁŠ. Practical Cryptographic Data Integrity Protection with Full Disk Encryption. In Janczewski L., Kutyłowski M. 2018 IFIP International Conference on ICT Systems Security and Privacy Protection. Cham: Springer, 2018, p. 79-93. ISBN 978-3-319-99827-5. Available from: https://dx.doi.org/10.1007/978-3-319-99828-2_6.
    16. SEDMIDUBSKÝ, Jan and Pavel ZEZULA. Probabilistic Classification of Skeleton Sequences. In S. Hartmann et al. 29th International Conference on Database and Expert Systems Applications (DEXA 2018). Switzerland: Springer, 2018, p. 50-65. ISBN 978-3-319-98811-5. Available from: https://dx.doi.org/10.1007/978-3-319-98812-2_4.
    17. MÍČ, Vladimír, David NOVÁK, Lucia VADICAMO and Pavel ZEZULA. Selecting Sketches for Similarity Search. Online. In András Benczúr, Bernhard Thalheim, Tomáš Horváth. Advances in Databases and Information Systems : 22nd European Conference, ADBIS 2018, Budapest, Hungary, September 2-5, 2018. Cham: Springer International Publishing, 2018, p. 127-141. ISBN 978-3-319-98397-4. Available from: https://dx.doi.org/10.1007/978-3-319-98398-1_9.
    18. BOENNELAND, F.M., J. DYHR, P.G. JENSEN, M. JOHANNSEN and Jiří SRBA. Simplification of CTL Formulae for Efficient Model Checking of Petri Nets. In Proceedings of the 39th International Conference on Application and Theory of Petri Nets and Concurrency (Petri Nets'18). Holland: Springer-Verlag, 2018, p. 143-163. ISBN 978-3-319-91267-7. Available from: https://dx.doi.org/10.1007/978-3-319-91268-4_8.
    19. GANIAN, Robert, Eunjung KIM, Friedrich SLIVOVSKY and Stefan SZEIDER. Sum-of-Products with Default Values: Algorithms and Complexity Results. Online. In Lefteri H. Tsoukalas, Eric Gregoire, Miltiadis Alamaniotis. IEEE 30th International Conference on Tools with Artificial Intelligence (ICTAI). USA: IEEE, 2018, p. 733-737. ISBN 978-1-5386-7449-9. Available from: https://dx.doi.org/10.1109/ICTAI.2018.00115.
    20. LAUKO, Henrich, Petr ROČKAI and Jiří BARNAT. Symbolic Computation via Program Transformation. In Bernd Fischer, Tarmo Uustalu. Theoretical Aspects of Computing – ICTAC 2018. Cham (Switzerland): Springer, 2018, p. 313-332. ISBN 978-3-030-02507-6. Available from: https://dx.doi.org/10.1007/978-3-030-02508-3_17.
    21. JIRSÍK, Tomáš and Pavel ČELEDA. Toward Real-time Network-wide Cyber Situational Awareness. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE, 2018, p. 1-7. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406166.
    22. HUSÁK, Martin and Jaroslav KAŠPAR. Towards Predicting Cyber Attacks Using Information Exchange and Data Mining. Online. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). Limassol: IEEE, 2018, p. 536-541. ISBN 978-1-5386-2070-0. Available from: https://dx.doi.org/10.1109/IWCMC.2018.8450512.
    23. VACULÍK, Karel and Lubomír POPELÍNSKÝ. WalDis: Mining Discriminative Patterns within Dynamic Graphs. Online. In IDEAS '18 Proceedings of the 22nd International Database Engineering & Applications Symposium. NY, USA: ACM New York, 2018, p. 95-102. ISBN 978-1-4503-6527-7. Available from: https://dx.doi.org/10.1145/3216122.3216172.

    2017

    1. GE, Mouzhi and Theodoros CHONDROGIANNIS. Assessing the Quality of Spatio-textual Datasets in the Absence of Ground Truth. In Proceedings of the 21st European Conference on Advances in Databases and Information Systems. Cham: Springer, 2017, p. 12-20. ISBN 978-3-319-67161-1. Available from: https://dx.doi.org/10.1007/978-3-319-67162-8_2.
    2. KONDRATĚV, Alexandr and Dmitry SOROKIN. Automatic detection of laser-induced structures in live cell fluorescent microscopy images using snakes with geometric constraints. In 23rd International Conference on Pattern Recognition, ICPR 2016. Cancun, Mexico: Institute of Electrical and Electronics Engineers Inc., 2017, p. 331-336. ISBN 978-1-5090-4847-2. Available from: https://dx.doi.org/10.1109/ICPR.2016.7899655.
    3. GANIAN, Robert, M.S. RAMANUJAN and Stefan SZEIDER. Combining Treewidth and Backdoors for CSP. Online. In Heribert Vollmer and Brigitte Vallee. 34th Symposium on Theoretical Aspects of Computer Science, STACS 2017, March 8-11, 2017, Hannover, Germany. Nemecko: Dagstuhl-LIPIcs, 2017, p. 1-17. ISBN 978-3-95977-028-6. Available from: https://dx.doi.org/10.4230/LIPIcs.STACS.2017.36.
    4. SINGHA ROY, Nivir Kanti and Bruno ROSSI. Cost-Sensitive Strategies for Data Imbalance in Bug Severity Classification: Experimental Results. Online. In 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA) 2017. Not specified: IEEE, 2017, p. 426-429. ISBN 978-1-5386-2140-0. Available from: https://dx.doi.org/10.1109/SEAA.2017.71.
    5. PELÁNEK, Radek and Jiří ŘIHÁK. Experimental Analysis of Mastery Learning Criteria. Online. In Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization. New York, NY, USA: ACM, 2017, p. 156-163. ISBN 978-1-4503-4635-1. Available from: https://dx.doi.org/10.1145/3079628.3079667.
    6. DALSGAARD, Andreas E., Søren ENEVOLDSEN, Peter FOGH, Lasse S. JENSEN, Tobias S. JEPSEN, Isabella KAUFMANN, Kim G. LARSEN, Søren M. NIELSEN, Mads Chr. OLESEN, Samuel PASTVA and Jiří SRBA. Extended Dependency Graphs and Efficient Distributed Fixed-Point Computation. In van der Aalst, Wil and Best, Eike. Petri Nets 2017. Holandsko: Springer International Publishing, 2017, p. 139-158. ISBN 978-3-319-57860-6. Available from: https://dx.doi.org/10.1007/978-3-319-57861-3_10.
    7. SEDMIDUBSKÝ, Jan, Pavel ZEZULA and Jan ŠVEC. Fast Subsequence Matching in Motion Capture Data. In 21st European Conference on Advances in Databases and Information Systems. Cham: Springer, 2017, p. 59-72. ISBN 978-3-319-66916-8. Available from: https://dx.doi.org/10.1007/978-3-319-66917-5_5.
    8. ŠTĚPÁNEK, Petr, Mouzhi GE and Leonard WALLETZKÝ. IT-enabled Digital Service Design Principles - Lessons Learned from Digital Cities. Online. In Themistocleous, Marinos, Morabito, Vincenzo. Proceedings of the 14th European Mediterranean & Middle Eastern Conference on Information Systems. Coimbra, Portugal: Springer, 2017, p. 186-196. ISBN 978-3-319-65929-9. Available from: https://dx.doi.org/10.1007/978-3-319-65930-5_15.
    9. VYKOPAL, Jan, Radek OŠLEJŠEK, Pavel ČELEDA, Martin VIZVÁRY and Daniel TOVARŇÁK. KYPO Cyber Range: Design and Use Cases. Online. In Cardoso J.,Cardoso J.,Maciaszek L.,Maciaszek L.,van Sinderen M.,Cabello E. Proceedings of the 12th International Conference on Software Technologies - Volume 1: ICSOFT. Madrid, Spain: SciTePress, 2017, p. 310-321. ISBN 978-989-758-262-2. Available from: https://dx.doi.org/10.5220/0006428203100321.
    10. VYKOPAL, Jan, Martin VIZVÁRY, Radek OŠLEJŠEK, Pavel ČELEDA and Daniel TOVARŇÁK. Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range. Online. In 2017 IEEE Frontiers in Education Conference. Indianapolis, IN, USA: IEEE, 2017, p. 1-8. ISBN 978-1-5090-5919-5. Available from: https://dx.doi.org/10.1109/FIE.2017.8190713.
    11. ŘIHÁK, Jiří and Radek PELÁNEK. Measuring Similarity of Educational Items Using Data on Learners’ Performance. Online. In Proceedings of the 10th International Conference on Educational Data Mining. Wuhan, China.: International Educational Data Mining Society, 2017, p. 16-23.
    12. HUSÁK, Martin, Jaroslav KAŠPAR, Elias BOU-HARB and Pavel ČELEDA. On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "22:1"-"22:10", 10 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3098981.
    13. JENSEN, Peter G., Kim G. LARSEN and Jiří SRBA. PTrie: Data Structure for Compressing and Storing Sets via Prefix Sharing. In Proceedings of the 14th International Colloquium on Theoretical Aspects of Computing (ICTAC'17). Holland: Springer, 2017, p. 248-265. ISBN 978-3-319-67728-6. Available from: https://dx.doi.org/10.1007/978-3-319-67729-3_15.
    14. SEDLÁK, Jan and Lubomír POPELÍNSKÝ. Rapid automatic vehicle manufacturer recognition using Random forest. Online. In Bipin C. Desai and Jun Hong and Richard McClatchey. Proceedings of the 21st International Database Engineering Applications Symposium, IDEAS. Bristol: ACM, 2017, p. 161-168. ISBN 978-1-4503-5220-8. Available from: https://dx.doi.org/10.1145/3105831.3105869.
    15. KLUSÁČEK, Dalibor, Šimon TÓTH and Gabriela PODOLNÍKOVÁ. Real-life Experience with Major Reconfiguration of Job Scheduling System. In Walfredo Cirne and Narayan Desai. 20th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2016. Cham, Switzerland: Springer, 2017, p. 83-101. ISBN 978-3-319-61755-8. Available from: https://dx.doi.org/10.1007/978-3-319-61756-5_5.
    16. SCHVARCBACHER, Martin and Bruno ROSSI. Smart Grids Co-Simulations with Low-Cost Hardware. Online. In 43rd Euromicro Conference on Software Engineering and Advanced Applications (SEAA) 2017. Not specified: IEEE, 2017, p. 252-255. ISBN 978-1-5386-2140-0. Available from: https://dx.doi.org/10.1109/SEAA.2017.43.
    17. SÝS, Marek, Dušan KLINEC and Petr ŠVENDA. The Efficient Randomness Testing using Boolean Functions. In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017. Madrid, Spain: SCITEPRESS, 2017, p. 92-103. ISBN 978-989-758-259-2. Available from: https://dx.doi.org/10.5220/0006425100920103.
    18. VÝTVAROVÁ, Eva, Jan FOUSEK, Marek BARTOŇ, Radek MAREČEK, Martin GAJDOŠ, Martin LAMOŠ, Marie NOVÁKOVÁ, Tomáš SLAVÍČEK, Igor PETERLÍK and Michal MIKL. The Impact of Diverse Preprocessing Pipelines on Brain Functional Connectivity. Online. In 25th European Signal Processing Conference (EUSIPCO), Kos, Greece. Kos, Greece: IEEE, 2017, p. 2644-2648. ISBN 978-0-9928626-7-1. Available from: https://dx.doi.org/10.23919/EUSIPCO.2017.8081690.
    19. NÁLEPA, Filip, Michal BATKO and Pavel ZEZULA. Towards High Similarity Search Throughput by Dynamic Query Reordering and Parallel Processing. In Mārīte Kirikova, Kjetil Nørvåg, George Angelos Papadopoulos. Advances in Databases and Information Systems : 21st European Conference, ADBIS 2017, Nicosia, Cyprus, September 24-27, 2017, Proceedings. Cham: Springer International Publishing, 2017, p. 262-277. ISBN 978-3-319-66916-8. Available from: https://dx.doi.org/10.1007/978-3-319-66917-5_18.
    20. ŠTILL, Vladimír, Petr ROČKAI and Jiří BARNAT. Using Off-the-Shelf Exception Support Components in C++ Verification. Online. In IEEE International Conference on Software Quality, Reliability and Security - QRS 2017. Neuveden: IEEE, 2017, p. 54-64. ISBN 978-1-5386-0592-9. Available from: https://dx.doi.org/10.1109/QRS.2017.15.
    21. GALUŠČÁKOVÁ, Petra, Michal BATKO, Jan ČECH, Jiří MATAS, David NOVÁK and Pavel PECINA. Visual Descriptors in Methods for Video Hyperlinking. In Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval. New York, NY, USA: ACM, 2017, p. 294-300. ISBN 978-1-4503-4701-3. Available from: https://dx.doi.org/10.1145/3078971.3079026.

    2016

    1. BYDŽOVSKÁ, Hana. A Comparative Analysis of Techniques for Predicting Student Performance. Online. In Tiffany Barnes, Min Chi, Mingyu Feng. Proceedings of the 9th International Conference on Educational Data Mining. Raleigh, NC, USA: International Educational Data Mining Society, 2016, p. 306-311.
    2. ROSSI, Bruno, Stanislav CHREN, Barbora BÜHNOVÁ and Tomáš PITNER. Anomaly Detection in Smart Grid Data: An Experience Report. Online. In The 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2016). Budapest: IEEE, 2016, p. 2313-2318. ISBN 978-1-5090-1897-0. Available from: https://dx.doi.org/10.1109/SMC.2016.7844583.
    3. OŠŤÁDAL, Radim, Petr ŠVENDA and Václav MATYÁŠ. Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping – Secrecy Amplification Case. In International Conference on Cryptology and Network Security. Německo: Springer International Publishing, 2016, p. 552-561. ISBN 978-3-319-48964-3. Available from: https://dx.doi.org/10.1007/978-3-319-48965-0_34.
    4. KONDRAT'EV, Alexandr and Dmitry SOROKIN. Automatic Detection of Laser-Induced Structures in Live Cell Fluorescent Microscopy Images Using Snakes with Geometric Constraints. Online. In IEEE 23rd International Conference on Pattern Recognition (ICPR). Not specified: IEEE, 2016, p. 326-331. ISBN 978-1-5090-4846-5. Available from: https://dx.doi.org/10.1109/ICPR.2016.7899655.
    5. BYDŽOVSKÁ, Hana. Course Enrollment Recommender System. Online. In Tiffany Barnes, Min Chi, Mingyu Feng. Proceedings of the 9th International Conference on Educational Data Mining. Raleigh, NC, USA: International Educational Data Mining Society, 2016, p. 312-317.
    6. ZIMA, Michal and Eva HLADKÁ. Cryptography Enhanced Ad-Hoc Approach to P2P Overlays. In Waleed W. Smari. Proceedings of the 2016 International Conference on High Performance Computing & Simulation. Neuveden: IEEE, 2016, p. 517-522. ISBN 978-1-5090-2088-1. Available from: https://dx.doi.org/10.1109/HPCSim.2016.7568378.
    7. KOTRBČÍK, Michal, Rastislav KRÁLOVIČ and Sebastian ORDYNIAK. Edge-Editing to a Dense and a Sparse Graph Class. In Kranakis E., Navarro G., Chávez E. LATIN 2016: Latin American Symposium on Theoretical Informatics. Berlin: Springer, 2016, p. 562-575. ISBN 978-3-662-49528-5. Available from: https://dx.doi.org/10.1007/978-3-662-49529-2_42.
    8. BÄCKSTRÖM, Ola, Yuliya BUTKOVA, Holger HERMANNS, Jan KRČÁL and Pavel KRČÁL. Effective static and dynamic fault tree analysis. In In International Conference on Computer Safety, Reliability, and Security. Berlin: Springer, 2016, p. 266-280. ISBN 978-3-319-45476-4. Available from: https://dx.doi.org/10.1007/978-3-319-45477-1_21.
    9. NÁLEPA, Filip, Michal BATKO and Pavel ZEZULA. Enhancing Similarity Search Throughput by Dynamic Query Reordering. In Hartmann, Sven and Ma, Hui. Database and Expert Systems Applications: 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II. Cham: Springer International Publishing, 2016, p. 185-200. ISBN 978-3-319-44405-5. Available from: https://dx.doi.org/10.1007/978-3-319-44406-2_14.
    10. KORENČIAK, Ľuboš, Vojtěch ŘEHÁK and Adrian FARMADIN. Extension of PRISM by Synthesis of Optimal Timeouts in Fixed-Delay CTMC. In Erika Ábrahám, Marieke Huisman. Integrated Formal Methods. Switzerland: Springer International Publishing, 2016, p. 130-138. ISBN 978-3-319-33692-3. Available from: https://dx.doi.org/10.1007/978-3-319-33693-0_9.
    11. BENDÍK, Jaroslav, Nikola BENEŠ, Jiří BARNAT and Ivana ČERNÁ. Finding Boundary Elements in Ordered Sets with Application to Safety and Requirements Analysis (Finding Boundary Elements in Ordered Sets with Application to Safety and Requirements Analysis). In Rocco De Nicola, Eva K{\"{u}}hn. Software Engineering and Formal Methods - 14th International Conference, SEFM 2016. Berlin: Lecture Notes in Computer Sciences in Computer Science, 9763, 2016, p. 121-136. ISBN 978-3-319-41590-1. Available from: https://dx.doi.org/10.1007/978-3-319-41591-8_9.
    12. DUDKA, Kamil, Lukáš HOLÍK, Petr PERINGER, Marek TRTÍK and Tomáš VOJNAR. From Low-Level Pointers to High-Level Containers. In B. Jobstmann, K. Rustan, M. Leino. Verification, Model Checking, and Abstract Interpretation. LNCS, VMCAI 2016. St. Petersburg, Florida, United States: Springer, Switzerland, 2016, p. 431-452. ISBN 978-3-662-49121-8. Available from: https://dx.doi.org/10.1007/978-3-662-49122-5_21.
    13. BALÁŽIA, Michal and Petr SOJKA. Learning Robust Features for Gait Recognition by Maximum Margin Criterion. Online. In Eduardo Bayro-Corrochano, Gabrielle Sanniti di Baja, Gérard Medioni. Proceedings of the 23rd IEEE/IAPR International Conference on Pattern Recognition (ICPR 2016). USA: IEEE, 2016, p. 901-906. ISBN 978-1-5090-4847-2. Available from: https://dx.doi.org/10.1109/ICPR.2016.7899750.
    14. CHREN, Stanislav and Barbora BÜHNOVÁ. Local Load Optimization in Smart Grids with Bayesian Networks. Online. In The 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2016). Neuveden: IEEE, 2016, p. 4021-4027. ISBN 978-1-5090-1897-0. Available from: https://dx.doi.org/10.1109/SMC.2016.7844862.
    15. BEZDĚK, Peter, Nikola BENEŠ, Jiří BARNAT and Ivana ČERNÁ. LTL Parameter Synthesis of Parametric Timed Automata. In Rocco De Nicola, Eva K{\"{u}}hn. Software Engineering and Formal Methods - 14th International Conference, SEFM 2016. Berlin: Lecture Notes in Computer Sciences in Computer Science, 9763, 2016, p. 172-187. ISBN 978-3-319-41590-1. Available from: https://dx.doi.org/10.1007/978-3-319-41591-8_12.
    16. BLUMENSATH, Achim, Thomas COLCOMBET and Pawel PARYS. On a Fragment of AMSO and Tiling Systems. Online. In Nicolas Ollinger, Heribert Vollmer. 33rd Symposium on Theoretical Aspects of Computer Science, STACS 2016, February 17-20, 2016, Orleans, France. Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2016, p. 1-14. ISBN 978-3-95977-001-9. Available from: https://dx.doi.org/10.4230/LIPIcs.STACS.2016.19.
    17. BARNAT, Jiří, Ivana ČERNÁ, Petr ROČKAI, Vladimír ŠTILL and Kristína ZÁKOPČANOVÁ. On verifying C++ programs with probabilities (On verifying {C++} programs with probabilities). In Sascha Ossowski. Proceedings of the 31st Annual ACM Symposium on Applied Computing. Pisa: ACM New York, NY, USA, 2016, p. 1238-1243. ISBN 978-1-4503-3739-7. Available from: https://dx.doi.org/10.1145/2851613.2851721.
    18. COGILL, Randall, Jakub MAREČEK, Martin MEVISSEN and Hana RUDOVÁ. Online Problems in Timetabling: Bus Priority at Signalised Junctions. In Edmund K. Burke, Luca Di Gaspero, Ender Özcan, Barry McCollum, Andrea Schaerf. Proceedings of the 11th International Conference on the Practice and Theory of Automated Timetabling (PATAT-2016). Italy: PATAT, 2016, p. 81-94. ISBN 978-0-9929984-1-7.
    19. ANTOL, Matej and Vlastislav DOHNAL. Optimizing Query Performance with Inverted Cache in Metric Spaces. In Lecture Notes in Computer Science. Advances in Databases and Information Systems, 20th East European Conference, ADBIS 2016. Cham: Springer, 2016, p. 60-73. ISBN 978-3-319-44038-5. Available from: https://dx.doi.org/10.1007/978-3-319-44039-2_5.
    20. TOVARŇÁK, Daniel. Practical Multi-pattern Matching Approach for Fast and Scalable Log Abstraction. In ICSOFT-EA 2016 - Proceedings of the 11th International Joint Conference on Software Technologies. Lisbon, Portugal: SCITEPRESS, 2016, p. 319-329. ISBN 978-989-758-194-6. Available from: https://dx.doi.org/10.5220/0006006603190329.
    21. PELÁNEK, Radek and Jiří ŘIHÁK. Properties and Applications of Wrong Answers in Online Educational Systems. Online. In Proceedings of the 9th International Conference on Educational Data Mining. Raleigh (USA, NC): International Educational Data Mining Society, 2016, p. 466-471.
    22. BURGET, Rostislav and Hana RUDOVÁ. Teacher-oriented Fairness in Course Timetabling. In Edmund K. Burke, Luca Di Gaspero, Ender Özcan, Barry McCollum, Andrea Schaerf. Proceedings of the 11th International Conference on the Practice and Theory of Automated Timetabling (PATAT-2016). Udine, Italy: PATAT, 2016, p. 33-44. ISBN 978-0-9929984-1-7.
    23. BENDÍK, Jaroslav, Nikola BENEŠ, Ivana ČERNÁ and Jiří BARNAT. Tunable Online MUS/MSS Enumeration. In Akash Lal, S. Akshay, Saket Saurabh, Sandeep Sen. Foundations of Software Technology and Theoretical Computer Science - 36th International Conference, FSTTCS 2016. 65th ed. Dagstuhl, Germany: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2016, p. 661-673. ISBN 978-3-95977-027-9. Available from: https://dx.doi.org/10.4230/LIPIcs.FSTTCS.2016.50.
    24. SVOBODA, David, Vladimír ULMAN, Peter KOVÁČ, Barbara ŠALINGOVÁ, Lenka TESAŘOVÁ, Irena KRONTORÁD KOUTNÁ and Petr MATULA. Vascular Network Formation in Silico Using the Extended Cellular Potts Model. In 2016 IEEE International Conference on Image Processing. Piscataway, NJ, USA: IEEE Signal Processing Society, 2016, p. 3180-3183. ISBN 978-1-4673-9961-6. Available from: https://dx.doi.org/10.1109/ICIP.2016.7532946.

    2015

    1. FILIPOVIČ, Jiří, Jan PLHÁK and David STŘELÁK. Acceleration of dRMSD Calculation and Efficient Usage of GPU Caches. In Waleed Smari. Proceedings of IEEE International Conference on High Performance Computing & Simulation. neuveden: IEEE, 2015, p. 47-54. ISBN 978-1-4673-7812-3. Available from: https://dx.doi.org/10.1109/HPCSim.2015.7237020.
    2. ADAMASZEK, Anna, G. BLIN and Alexandru POPA. Approximation and hardness results for the maximum edges in transitive closure problem. In 25th International Workshop on Combinatorial Algorithms, IWOCA 2014, LNCS 8986. Duluth; United States: Springer, 2015, p. 13-23. ISBN 978-3-319-19314-4. Available from: https://dx.doi.org/10.1007/978-3-319-19315-1_2.
    3. ANDERSEN, Jesper R., Nicklas ANDERSEN, Soeren ENEVOLDSEN, Mathias M. HANSEN, Kim G. LARSEN, Simon R. OLESEN, Jiří SRBA and Jacob K. WORTMANN. CAAL: Concurrency Workbench, Aalborg Edition. In Proceedings of the 12th International Colloquium on Theoretical Aspects of Computing (ICTAC'15). Netherlands: Springer, 2015, p. 573-582. ISBN 978-3-319-25149-3. Available from: https://dx.doi.org/10.1007/978-3-319-25150-9_33.
    4. LIAROKAPIS, Fotis, Athanasios VOURVOPOULOS and Alina ENE. Examining User Experiences Through A Multimodal BCI Puzzle Game. In Proc. of the 19th International Conference on Information Visualisation (IV 2015). USA: IEEE Computer Society, 2015, p. 488-493. ISBN 978-1-4673-7568-9. Available from: https://dx.doi.org/10.1109/iV.2015.87.
    5. VALČÍK, Jakub, Jan SEDMIDUBSKÝ and Pavel ZEZULA. Improving Kinect-Skeleton Estimation. In S. Battiato et al. Advanced Concepts for Intelligent Vision Systems (ACIVS 2015), LNCS 9386. Switzerland: Springer, 2015, p. 575-587. ISBN 978-3-319-25902-4. Available from: https://dx.doi.org/10.1007/978-3-319-25903-1_50.
    6. NÁLEPA, Filip, Michal BATKO and Pavel ZEZULA. Model for Performance Analysis of Distributed Stream Processing Applications. In Chen, Qiming and Hameurlain, Abdelkader and Toumani, Farouk and Wagner, Roland and Decker, Hendrik. Database and Expert Systems Applications. Cham: Springer International Publishing, 2015, p. 520-533. ISBN 978-3-319-22851-8. Available from: https://dx.doi.org/10.1007/978-3-319-22852-5_42.
    7. PELÁNEK, Radek. Modeling Students' Memory for Application in Adaptive Educational Systems. Online. In Proceedings of the 8th International Conference on Educational Data Mining. Madrid: International Educational Data Mining Society, 2015, p. 480-483. ISBN 978-84-606-9425-0.
    8. KLUSÁČEK, Dalibor and Hana RUDOVÁ. Multi-Resource Aware Fairsharing for Heterogeneous Systems. In Walfredo Cirne and Narayan Desai. Job Scheduling Strategies for Parallel Processing. 1st ed. Switzerland: Springer, Lecture Notes in Computer Science 8828, 2015, p. 53-69. ISBN 978-3-319-15788-7. Available from: https://dx.doi.org/10.1007/978-3-319-15789-4_4.
    9. KROMER, Pavel, Zdeněk MATĚJ, Petr MUSÍLEK, Václav PŘENOSIL and František CVACHOVEC. Neutron-Gamma Classification by Evolutionary Fuzzy Rules and Support Vector Machines. Online. In 2015 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2015): BIG DATA ANALYTICS FOR HUMAN-CENTRIC SYSTEMS. Kowloon: IEEE, 2015, p. 2638-2642. ISBN 978-1-4799-8696-5. Available from: https://dx.doi.org/10.1109/SMC.2015.461.
    10. FILIPOVIČ, Jiří and Siegfried BENKNER. OpenCL Kernel Fusion for GPU, Xeon Phi and CPU. In Proceedings of IEEE International Symposium on Computer Architecture and High Performance Computing. Florianópolis: IEEE, 2015, p. 98-105. ISSN 1550-6533. Available from: https://dx.doi.org/10.1109/SBAC-PAD.2015.29.
    11. O'CONNOR, Stuart, Fotis LIAROKAPIS and Jayne CHRISINA. Perceived Realism of Crowd Behaviour with Social Forces. In Proc. of the 19th International Conference on Information Visualisation (IV 2015). Barcelona, Spain: IEEE Computer Society, 2015, p. 494-499. ISBN 978-1-4673-7568-9. Available from: https://dx.doi.org/10.1109/iV.2015.88.
    12. MAŠKA, Martin, Cristina EDERRA, Javier FERNÁNDEZ-MARQUÉS, Arrate MUÑOZ-BARRUTIA, Michal KOZUBEK and Carlos ORTIZ-DE-SOLÓRZANO. Quantification of the 3D Collagen Network Geometry in Confocal Reflection Microscopy. Online. In 22nd IEEE International Conference on Image Processing. Québec City: IEEE, 2015, p. 1791-1794. ISBN 978-1-4799-8339-1. Available from: https://dx.doi.org/10.1109/ICIP.2015.7351109.
    13. BUKAČ, Vít, Vlasta ŠŤAVOVÁ, Lukáš NĚMEC, Zdeněk ŘÍHA and Václav MATYÁŠ. Service in denial – clouds going with the winds. In Qiu, M., Xu, S., Yung, M., Zhang, H. Network and System Security, 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings. 1st ed. Switzerland: Springer International Publishing, 2015, p. 130-143. ISBN 978-3-319-25644-3. Available from: https://dx.doi.org/10.1007/978-3-319-25645-0_9.
    14. ŘIHÁK, Jiří, Radek PELÁNEK and Juraj NIŽNAN. Student Models for Prior Knowledge Estimation. Online. In Proceedings of the 8th International Conference on Educational Data Mining. Madrid: International Educational Data Mining Society, 2015, p. 109-116. ISBN 978-84-606-9425-0.
    15. ROČKAI, Petr, Vladimír ŠTILL and Jiří BARNAT. Techniques for Memory-Efficient Model Checking of C and C++ Code. In Radu Calinescu, Bernhard Rumpe. Software Engineering and Formal Methods. Neuveden: Springer International Publishing, 2015, p. 268-282. ISBN 978-3-319-22968-3. Available from: https://dx.doi.org/10.1007/978-3-319-22969-0_19.
    16. LARJOMAA, Tommi and Alexandru POPA. The Min-max Edge q-Coloring Problem. In 25th International Workshop, IWOCA 2014, LNCS 8986. Duluth, MN, USA: Springer, 2015, p. 226-237. ISBN 978-3-319-19314-4. Available from: https://dx.doi.org/10.1007/978-3-319-19315-1_20.
    17. ULMAN, Vladimír, Zoltán ORÉMUŠ and David SVOBODA. TRAgen: A Tool for Generation of Synthetic Time-Lapse Image Sequences of Living Cells. In Vittorio Murino, Enrico Puppo, Gianni Vernazza. Proceedings of 18th International Conference on Image Analysis and Processing. Heidelberg, Německo: Springer International Publishing, 2015, p. 623-634. ISBN 978-3-319-23230-0. Available from: https://dx.doi.org/10.1007/978-3-319-23231-7_56.
    18. TÓTH, Šimon and Dalibor KLUSÁČEK. User-Aware Metrics for Measuring Quality of Parallel Job Schedules. In Walfredo Cirne and Narayan Desai. Job Scheduling Strategies for Parallel Processing. 1st ed. Switzerland: Springer, Lecture Notes in Computer Science 8828, 2015, p. 90-107. ISBN 978-3-319-15788-7. Available from: https://dx.doi.org/10.1007/978-3-319-15789-4_6.
    19. GÉRYK, Jan. Using Visual Analytics Tool for Improving Data Comprehension. Online. In Olga C. Santos, Jesus G. Boticario, Cristobal Romero, Mykola Pechenizkiy, Agathe Merceron, Piotr Mitros, José María Luna, Cristian Mihaescu, Pablo Moreno, Arnon Hershkovitz, Sebastian Ventura, and Michel Desmarais. Proceedings for the 8th International Conference on Educational Data Mining (EDM 2015). Madrid, Spain: International Educational Data Mining Society, 2015, p. 327-334. ISBN 978-84-606-9425-0.

    2014

    1. ORDYNIAK, Sebastian and Alexandru POPA. A Parameterized Study of Maximum Generalized Pattern Matching Problems. In Marek Cygan and Pinar Heggernes. Lecture Notes in Computer Science. Wroclaw: Springer, 2014, p. 270-281. ISBN 978-3-319-13523-6. Available from: https://dx.doi.org/10.1007/978-3-319-13524-3_23.
    2. KŮR, Jiří and Václav MATYÁŠ. A protocol for intrusion detection in location privacy-aware wireless sensor networks. In Eckert, Claudia, Katsikas, Sokratis K., Pernul, Günther. Trust, Privacy, and Security in Digital Business, 11th International Conference, TrustBus 2014. Heidelberg: Springer, 2014, p. 180-190. ISBN 978-3-319-09769-5. Available from: https://dx.doi.org/10.1007/978-3-319-09770-1_16.
    3. PELÁNEK, Radek, Jan PAPOUŠEK and Vít STANISLAV. Adaptive Practice of Facts in Domains with Varied Prior Knowledge. Online. In John Stamper, Zachary Pardos, Manolis Mavrikis, Bruce M. McLaren. Proceedings of the 7th International Conference on Educational Data Mining (EDM 2014). London, United Kingdom: International Educational Data Mining Society, 2014, p. 6-13. ISBN 978-0-9839525-4-1.
    4. ADAMASZEK, Anna and Alexandru POPA. Algorithmic and Hardness Results for the Colorful Components Problems. In 11th Latin American Theoretical Informatics Symposium, LATIN 2014. Berlin: Springer, 2014, p. 683-694. ISBN 978-3-642-54422-4. Available from: https://dx.doi.org/10.1007/978-3-642-54423-1_59.
    5. NEVĚŘILOVÁ, Zuzana. Annotation Game for Textual Entailment Evaluation. In Alexander F. Gelbukh. 15th International Conference, CICLing 2014, Kathmandu, Nepal, April 6-12, 2014, Proceedings, Part I. Heidelberg: Springer, 2014, p. 340-350. ISBN 978-3-642-54905-2. Available from: https://dx.doi.org/10.1007/978-3-642-54906-9_28.
    6. PELÁNEK, Radek. Application of Time Decay Functions and the Elo System in Student Modeling. Online. In John Stamper, Zachary Pardos, Manolis Mavrikis, Bruce M. McLaren. Proceedings of the 7th International Conference on Educational Data Mining (EDM 2014). 2014th ed. London, United Kingdom: International Educational Data Mining Society, 2014, p. 21-27. ISBN 978-0-9839525-4-1.
    7. PETERLÍK, Igor, Tomáš GOLEMBIOVSKÝ, Christian DURIEZ and Stephane COTIN. Complete Real-Time Liver Model Including Glisson's Capsule, Vascularization and Parenchyma. In J.D. Westwood, S.W. Westwood, L. Felländer-Tsai. Medicine Meets Virtual Reality 21: NextMed/MMVR21. Neuveden: IOS Press, 2014, p. 312-319. ISBN 978-1-61499-374-2. Available from: https://dx.doi.org/10.3233/978-1-61499-375-9-312.
    8. COURTECUISSE, Hadrien, Igor PETERLÍK, Raffaella TRIVISONNE, Christian DURIEZ and Stephane COTIN. Constraint-based Simulation for Non-Rigid Real-time Registration. In J.D. Westwood, S.W. Westwood, L. Felländer-Tsai. Medicine Meets Virtual Reality 21: NextMed/MMVR21. Neuveden: IOS Press, 2014, p. 76-82. ISBN 978-1-61499-374-2. Available from: https://dx.doi.org/10.3233/978-1-61499-375-9-76.
    9. SÝS, Marek, Petr ŠVENDA, Martin UKROP and Václav MATYÁŠ. Constructing empirical tests of randomness. In Mohammad S. Obaidat, Andreas Holzinger and Pierangela Samarati. SECRYPT 2014 Proceedings of the 11th International Conference on Security and Cryptography. Portugal: SCITEPRESS – Science and Technology Publications, 2014, p. 229-237. ISBN 978-989-758-045-1. Available from: https://dx.doi.org/10.5220/0005023902290237.
    10. TOVARŇÁK, Daniel and Tomáš PITNER. Continuous Queries over Distributed Streams of Heterogeneous Monitoring Data in Cloud Datacenters. In Andreas Holzinger, Therese Libourel, Leszek Maciaszek and Stephen Mellor. ICSOFT-EA 2014 - Proceedings of the 9th International Conference on Software Engineering and Applications. Portugalsko: SCITEPRESS, 2014, p. 470-481. ISBN 978-989-758-036-9. Available from: https://dx.doi.org/10.5220/0005095504700481.
    11. ORDYNIAK, Sebastian, Jakub GAJARSKÝ, Felix REIDL, Peter ROSSMANITH, Jan OBDRŽÁLEK and Fernando SÁNCHEZ VILAAMIL. Finite Integer Index of Pathwidth and Treewidth. In Marek Cygan and Pinar Heggernes. IPEC 2014, LNCS 8246. Wroclaw: Springer, 2014, p. 258-269. ISBN 978-3-319-13523-6. Available from: https://dx.doi.org/10.1007/978-3-319-13524-3_22.
    12. ŽEMLIČKA, Michal and Jaroslav KRÁL. Flexible Business-Oriented Service Interfaces in Information Systems. In J. Filipe, L. Maciaszek. 9th International Conference on Evaluation of Novel Approaches to Software Engineering. 1st ed. Lisabon: SCITEPRESS -- Science and Technology Publications, 2014, p. 164-171. ISBN 978-989-758-030-7. Available from: https://dx.doi.org/10.5220/0004888901640171.
    13. STETSKO, Andriy, Tobiáš SMOLKA, Václav MATYÁŠ and Martin STEHLÍK. Improving Intrusion Detection Systems for Wireless Sensor Networks. In Ioana Boureanu, Philippe Owesarski, Serge Vaudenay. Applied Cryptography and Network Security. Heidelberg: Springer, 2014, p. 343-360. ISBN 978-3-319-07535-8. Available from: https://dx.doi.org/10.1007/978-3-319-07536-5_21.
    14. ŠEVČÍK, Jonáš. Indoor Pedestrian Localization for Mobile Devices : The model. Online. In Andreas Holzinger, Therese Libourel, Leszek Maciaszek and Stephen Mellor. Proceedings of the 9th International Conference on Software Engineering and Applications. Portugal: SCITEPRESS, 2014, p. 488-493. ISBN 978-989-758-036-9. Available from: https://dx.doi.org/10.5220/0005104604880493.
    15. FENNER, T., O. LACHISCH and Alexandru POPA. Min-sum 2-paths problems. In 11th International Workshop on Approximation and Online Algorithms, WAOA 2013, LNCS 8447. Sophia Antipolis; France: Springer, 2014, p. 1-11. ISBN 978-3-319-08000-0. Available from: https://dx.doi.org/10.1007/978-3-319-08001-7_1.
    16. KLUSÁČEK, Dalibor, Hana RUDOVÁ and Michal JAROŠ. Multi Resource Fairness: Problems and Challenges. Online. In N. Desai and W. Cirne. Job Scheduling Strategies for Parallel Processing. 1st ed. Neuveden: Springer, Lecture Notes in Computer Science 8429, 2014, p. 81-95. ISBN 978-3-662-43778-0. Available from: https://dx.doi.org/10.1007/978-3-662-43779-7_5.
    17. BEZDĚK, Peter, Nikola BENEŠ, Vojtěch HAVEL, Jiří BARNAT and Ivana ČERNÁ. On Clock-Aware LTL Properties of Timed Automata. In Gabriel Ciobanu, Dominique Méry. Theoretical Aspects of Computing – ICTAC 2014. Neuveden: Springer International Publishing, 2014, p. 43-60. ISBN 978-3-319-10881-0. Available from: https://dx.doi.org/10.1007/978-3-319-10882-7_4.
    18. SVOBODA, David, Vladimír ULMAN, Luděk MATYSKA, Martin MAŠKA, Ján BELLA and Stanislav STEJSKAL. On Proper Simulation of Phenomena Influencing Image Formation in Fluorescence Microscopy. In 2014 IEEE International Conference on Image Processing. Neuveden: IEEE Signal Processing Society, 2014, p. 3944-3948. ISBN 978-1-4799-5750-7. Available from: https://dx.doi.org/10.1109/ICIP.2014.7025801.
    19. NOVÁK, David and Pavel ZEZULA. Rank Aggregation of Candidate Sets for Efficient Similarity Search. In 25th International Conference on Database and Expert Systems Applications (DEXA 2014 ). Haidelberg: Springer International Publishing Switzerland, 2014, p. 42-58. ISBN 978-3-319-10084-5. Available from: https://dx.doi.org/10.1007/978-3-319-10085-2_4.
    20. MAJTNER, Tomáš, Roman STOKLASA and David SVOBODA. RSurf - the Efficient Texture-Based Descriptor for Fluorescence Microscopy Images of HEp-2 Cells. In 22nd International Conference on Pattern Recognition. Los Alamitos, California: IEEE Computer Society, 2014, p. 1194-1199. ISBN 978-1-4799-5208-3. Available from: https://dx.doi.org/10.1109/ICPR.2014.215.
    21. ASFAND-E-YAR, Muhammad, Adam KUČERA and Tomáš PITNER. Semantic Web Technology for Building Information Model. Online. In Andreas Holzinger, Thérèse Libourel, Leszek A. Maciaszek, Stephen J. Mellor. Proceedings of the 9th International Conference on Software Engineering and Applications, Vienna, Austria. Neuveden: SciTePress, 2014, p. 109-116. ISBN 978-989-758-036-9. Available from: https://dx.doi.org/10.5220/0004999201090116.
    22. BALÁŽIA, Michal, Jan SEDMIDUBSKÝ and Pavel ZEZULA. Semantically Consistent Human Motion Segmentation. In Hendrik Decker, Lenka Lhotská, Sebastian Link, Marcus Spies, Roland R. Wagner. Proceedings of 25th International Conference on Database and Expert Systems Applications (DEXA 2014). LNCS 8644. Switzerland: Springer, 2014, p. 423-437. ISBN 978-3-319-10072-2. Available from: https://dx.doi.org/10.1007/978-3-319-10073-9_36.
    23. PRÝMEK, Miroslav, Aleš HORÁK, Lukáš PROKOP and Stanislav MIŠÁK. Smart Home Modeling with Real Appliances. In International Conference SOCO’13. Berlin Heidelberg: Springer, 2014, p. 369-378. ISBN 978-3-319-01853-9. Available from: https://dx.doi.org/10.1007/978-3-319-01854-6_38.
    24. MATEO, Jose A., Jiří SRBA and Mathias SOERENSEN. Soundness of Timed-Arc Workflow Nets. In Proceedings of the 35th International Conference on Application and Theory of {P}etri Nets and Concurrency ({ICATPN}'14). Nizozemsko: Springer-Verlag, 2014, p. 51-70. ISBN 978-3-319-07733-8. Available from: https://dx.doi.org/10.1007/978-3-319-07734-5_4.
    25. BARNAT, Jiří, Petr BAUCH and Vojtěch HAVEL. Temporal Verification of Simulink Diagrams. Online. In P. J. Clarke et al. Proceedings of HASE 2014. Miami: IEEE Computer Society, 2014, p. 81-88. ISBN 978-1-4799-3465-2. Available from: https://dx.doi.org/10.1109/HASE.2014.20.
    26. HAOUCHINE, Nazim, Jeremie DEQUIDT, Igor PETERLÍK, Erwan KERRIEN, Marie-Odile BERGER and Stephane COTIN. Towards an Accurate Tracking of Liver Tumors for Augmented Reality in Robotic Assisted Surgery. In International Conference on Robotics and Automation (ICRA). Hong Kong, China: IEEE, 2014, p. 4121 - 4126. ISBN 978-1-4799-3686-1. Available from: https://dx.doi.org/10.1109/ICRA.2014.6907458.

    2013

    1. SEDMIDUBSKÝ, Jan, Jakub VALČÍK and Pavel ZEZULA. A Key-Pose Similarity Algorithm for Motion Data Retrieval. In J. Blanc-Talon et al. (Eds.). Proceedings of 12th International Conference on Advanced Concepts for Intelligent Vision Systems (ACIVS 2013), LNCS 8192. Switzerland: Springer International Publishing, 2013, p. 669-681. ISBN 978-3-319-02894-1. Available from: https://dx.doi.org/10.1007/978-3-319-02895-8_60.
    2. ORDYNIAK, Sebastian, M S RAMANUJAN, Stefan SZEIDER, Serge GASPERS and Saket SAURABH. Backdoors to q-Horn. In Natacha Portier, Thomas Wilke. LIPIcs. Germany: Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2013, p. 67-79. ISBN 978-3-939897-50-7. Available from: https://dx.doi.org/10.4230/LIPIcs.STACS.2013.67.
    3. SLABÝ, Jiří, Jan STREJČEK and Marek TRTÍK. ClabureDB: Classified Bug-Reports Database Tool for Developers of Program Analysis Tools. In Roberto Giacobazzi, Josh Berdine, Isabella Mastroeni. Verification, Model Checking, and Abstract Interpretation: 14th International Conference, VMCAI 2013. Berlin, Heidelberg: Springer, 2013, p. 268-274. ISBN 978-3-642-35872-2. Available from: https://dx.doi.org/10.1007/978-3-642-35873-9_17.
    4. BATKO, Michal, Jan BOTOREK, Petra BUDÍKOVÁ and Pavel ZEZULA. Content-based annotation and classification framework: a general multi-purpose approach. In Proceedings of the 17th International Database Engineering & Applications Symposium. New York, NY, USA: ACM, 2013, p. 58-67. ISBN 978-1-4503-2025-2. Available from: https://dx.doi.org/10.1145/2513591.2513651.
    5. KARAS, Pavel, Michal KUDERJAVÝ and David SVOBODA. Deconvolution of huge 3-D images: Parallelization strategies on a multi-GPU system. In Kołodziej, Joanna and Martino, Beniamino and Talia, Domenico and Xiong, Kaiqi. Algorithms and Architectures for Parallel Processing. Neuveden: Springer International Publishing, 2013, p. 279-290. ISBN 978-3-319-03858-2. Available from: https://dx.doi.org/10.1007/978-3-319-03859-9_24.
    6. TSIKERDEKIS, Michail. Dynamic Voting Interface in Social Media: Does it Affect Individual Votes? In P. van E. Boas, F. C. A. Groen, G. F. Italiano, J. Nawrocki, & H. Sack. SOFSEM 2013: Theory and Practice of Computer Science. SOFSEM 2013: Theory and Practice of Comp: Springer Berlin Heidelberg, 2013, p. 552-563. ISBN 978-3-642-35842-5. Available from: https://dx.doi.org/10.1007/978-3-642-35843-2_47.
    7. JAKUBÍČEK, Miloš and Vojtěch KOVÁŘ. Enhancing Czech Parsing with Verb Valency Frames. In CICLing 2013. Greece: Springer Verlag, 2013, p. 282-293. ISBN 978-3-642-37246-9. Available from: https://dx.doi.org/10.1007/978-3-642-37247-6_23.
    8. OBDRŽÁLEK, Jan and Robert GANIAN. Expanding the Expressive Power of Monadic Second-Order Logic on Restricted Graph Classes. In Thierry Lecroq, Laurent Mouchard. Combinatorial Algorithms 24th International Workshop, IWOCA 2013. Berlin Heidelberg: Springer, 2013, p. 164-177. ISBN 978-3-642-45277-2. Available from: https://dx.doi.org/10.1007/978-3-642-45278-9_15.
    9. MAREK, Jiří, Petr HOLUB and Hana RUDOVÁ. Local Search Heuristics for Media Streams Planning Problem. In Leonard Barolli, Fatos Xhafa, Makoto Takizawa, Tomoya Enokido, Hui-Huang Hsu. Proceedings of the 7th IEEE International Conference on Advanced Information Networking and Applications. Washington: IEEE Computer Society, 2013, p. 945-953. ISBN 978-0-7695-4953-8. Available from: https://dx.doi.org/10.1109/AINA.2013.132.
    10. BARNAT, Jiří, Luboš BRIM and Vojtěch HAVEL. LTL Model Checking of Parallel Programs with Under-Approximated TSO Memory Model. In Juan E. Guerrero. Proceedings of Application of Concurrency to System Design, 2013. Barcelona: IEEE Computer Society, 2013, p. 51-59. ISBN 978-0-7695-5035-0. Available from: https://dx.doi.org/10.1109/ACSD.2013.8.
    11. PELÁNEK, Radek, Petr JARUŠEK and Matěj KLUSÁČEK. Modeling Students' Learning and Variability of Performance in Problem Solving. Online. In D’Mello, S. K., Calvo, R. A., and Olney, A. Educational Data Mining. USA: International Educational Data Mining Society, 2013, p. 256-259. ISBN 978-0-9839525-2-7.
    12. STEHLÍK, Martin, Adam SALEH, Andriy STETSKO and Václav MATYÁŠ. Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks. Online. In Pietro Liò, Orazio Miglino, Giuseppe Nicosia, Stefano Nolfi and Mario Pavone. Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems. Cambridge, MA 02142-1493 USA: MIT Press, 2013, p. 569-576. ISBN 978-0-262-31709-2. Available from: https://dx.doi.org/10.7551/978-0-262-31709-2-ch082.
    13. KŘETÍNSKÝ, Jan and Salomon SICKERT. On Refinements of Boolean and Parametric Modal Transition Systems. In Z. Liu, J. Woodcock, and H. Zhu. Theoretical Aspects of Computing - ICTAC 2013 - 10th International Colloquium. Heidelberg Dordrecht London New York: Springer, 2013, p. 213-230. ISBN 978-3-642-39717-2. Available from: https://dx.doi.org/10.1007/978-3-642-39718-9_13.
    14. GAJARSKÝ, Jakub, Michael LAMPIS and Sebastian ORDYNIAK. Parameterized Algorithms for Modular-Width. In Gutin, Gregory and Szeider, Stefan. Parameterized and Exact Computation. Berlin Heidelberg: Springer International Publishing, 2013, p. 163-176. ISBN 978-3-319-03897-1. Available from: https://dx.doi.org/10.1007/978-3-319-03898-8_15.
    15. KLUSÁČEK, Dalibor and Hana RUDOVÁ. Performance and Fairness for Users in Parallel Job Scheduling. In Cirne, W.; Desai, N.; Frachtenberg, E.; Schwiegelshohn, U. Job Scheduling Strategies for Parallel Processing. Berlin: Lecture Notes in Computer Science 7698, Springer, 2013, p. 235-252. ISBN 978-3-642-35866-1. Available from: https://dx.doi.org/10.1007/978-3-642-35867-8_13.
    16. BRÁZDIL, Tomáš, Taolue CHEN, Vojtěch FOREJT, Petr NOVOTNÝ and Aistis SIMAITIS. Solvency Markov Decision Processes with Interest. Online. In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2013). Dagstuhl, Germany: IBFI Schloss Dagstuhl, 2013, p. 487-499. ISBN 978-3-939897-64-4. Available from: https://dx.doi.org/10.4230/LIPIcs.FSTTCS.2013.487.
    17. SVOBODA, David and Vladimír ULMAN. Towards a Realistic Distribution of Cells in Synthetically Generated 3D Cell Populations. In Alfredo Petrosino. 17th International Conference on Image Analysis and Processing - ICIAP 2013. LNCS 8157, Part II. Berlin, Heidelberg: Springer-Verlag, 2013, p. 429-438. ISBN 978-3-642-41183-0. Available from: https://dx.doi.org/10.1007/978-3-642-41184-7_44.
    18. ŠVENDA, Petr, Martin UKROP and Václav MATYÁŠ. Towards cryptographic function distinguishers with evolutionary circuits. In Pierangela Samarati. Proceedings of SECRYPT 2013, 10th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2013, p. 135-146. ISBN 978-989-8565-73-0.
Display details
Displayed: 6/11/2024 16:43