Masarykova univerzita

Výpis publikací

česky | in English

Filtrování publikací


  1. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína DOČKALOVÁ BURSKÁ, Valdemar ŠVÁBENSKÝ, Jan VYKOPAL a Jakub ČEGAN. Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training. IEEE Transactions on Visualization and Computer Graphics. 2021, roč. 27, č. 8, s. 3425-3437. ISSN 1077-2626. doi:10.1109/TVCG.2020.2977336.
  2. RIESE, Emma, Madeleine LORÅS, Martin UKROP a Tomáš EFFENBERGER. Challenges Faced by Teaching Assistants in Computer Science Education Across Europe. In Proceedings of the 2021 ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE ’21). Paderborn, Germany: ACM, 2021. s. 547-553. ISBN 978-1-4503-8214-4. doi:10.1145/3430665.3456304.
  3. 2020

  4. JANČÁR, Ján, Vladimír SEDLÁČEK, Petr ŠVENDA a Marek SÝS. Minerva: The curse of ECDSA nonces. In Amir Moradi, Mehdi Tibouchi. IACR Transactions on Cryptographic Hardware and Embedded Systems. Německo: Ruhr-University of Bochum, 2020. s. 281-308. ISSN 2569-2925. doi:10.13154/tches.v2020.i4.281-308.
  5. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL a Pavel ČELEDA. What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM, 2020. s. 2-8. ISBN 978-1-4503-6793-6. doi:10.1145/3328778.3366816.
  6. UKROP, Martin, Lydia KRAUS a Václav MATYÁŠ. Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version). Digital Threats: Research and Practice. New York, NY, USA: Association for Computing Machinery, 2020, roč. 1, č. 4, s. 1-29. ISSN 2692-1626. doi:10.1145/3419472.
  7. 2019

  8. ELAVSKY, Steriani, Lenka KNAPOVÁ, Adam KLOCEK a David ŠMAHEL. Mobile Health Interventions for Physical Activity, Sedentary Behavior, and Sleep in Adults Aged 50+ : A Systematic Literature Review. Journal of Aging and Physical Activity. Champaign, IL: Human Kinetics Publication, 2019, roč. 27, č. 4, s. 565-593. ISSN 1063-8652. doi:10.1123/japa.2017-0410.
  9. 2017

  10. CHALÁS, Igor, Petra URBANOVÁ, Vojtěch JUŘÍK, Zuzana FERKOVÁ, Marie JANDOVÁ, Jiří SOCHOR a Barbora KOZLÍKOVÁ. Generating various composite human faces from real 3D facial images. The Visual Computer. Springer-Verlag, 2017, roč. 33, č. 4, s. 443-458. ISSN 0178-2789. doi:10.1007/s00371-016-1277-1.
  11. NEMEC, Matúš, Marek SÝS, Petr ŠVENDA, Dušan KLINEC a Václav MATYÁŠ. The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. s. 1631-1648. ISBN 978-1-4503-4946-8. doi:10.1145/3133956.3133969.
  12. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK a Pavel ČELEDA. Toward Stream-Based IP Flow Analysis. IEEE Communications Magazine. IEEE, 2017, roč. 55, č. 7, s. 70-76. ISSN 0163-6804. doi:10.1109/MCOM.2017.1600972.
  13. BALÁŽIA, Michal a Petr SOJKA. You Are How You Walk: Uncooperative MoCap Gait Identification for Video Surveillance with Incomplete and Noisy Data. In Ross Beveridge, Liang Wang, Mark Nixon. Proceedings of the 3rd IEEE/IAPR International Joint Conference on Biometrics (IJCB 2017). USA: IEEE, 2017. s. 208-215. ISBN 978-1-5386-1124-1. doi:10.1109/BTAS.2017.8272700.
  14. 2016

  15. BYDŽOVSKÁ, Hana. A Comparative Analysis of Techniques for Predicting Student Performance. In Tiffany Barnes, Min Chi, Mingyu Feng. Proceedings of the 9th International Conference on Educational Data Mining. Raleigh, NC, USA: International Educational Data Mining Society, 2016. s. 306-311.
  16. VINKLER, Marek, Vlastimil HAVRAN, Jiří BITTNER a Jiří SOCHOR. Parallel On-Demand Hierarchy Construction on Contemporary GPUs. IEEE Transactions on Visualization and Computer Graphics. USA: IEEE, 2016, roč. 22, č. 7, s. 1886-1898. ISSN 1077-2626. doi:10.1109/TVCG.2015.2465898.
  17. 2015

  18. PARÁK, Boris, David WALLOM, Slávek LICEHAMMER a Zdeněk ŠUSTR. Public-Private Cloud Federation Challenges. 8th edition. Limassol: IEEE/ACM, 2015. s. 512 - 515. doi:10.1109/UCC.2015.91.
  19. TÓTH, Šimon a Dalibor KLUSÁČEK. User-Aware Metrics for Measuring Quality of Parallel Job Schedules. In Walfredo Cirne and Narayan Desai. Job Scheduling Strategies for Parallel Processing. 1. vyd. Switzerland: Springer, Lecture Notes in Computer Science 8828, 2015. s. 90-107. ISBN 978-3-319-15788-7. doi:10.1007/978-3-319-15789-4_6.
  20. 2014

  21. NEVĚŘILOVÁ, Zuzana. Annotation Game for Textual Entailment Evaluation. In Alexander F. Gelbukh. 15th International Conference, CICLing 2014, Kathmandu, Nepal, April 6-12, 2014, Proceedings, Part I. Heidelberg: Springer, 2014. s. 340-350. ISBN 978-3-642-54905-2. doi:10.1007/978-3-642-54906-9_28.
  22. TOVARŇÁK, Daniel a Tomáš PITNER. Continuous Queries over Distributed Streams of Heterogeneous Monitoring Data in Cloud Datacenters. In Andreas Holzinger, Therese Libourel, Leszek Maciaszek and Stephen Mellor. ICSOFT-EA 2014 - Proceedings of the 9th International Conference on Software Engineering and Applications. Portugalsko: SCITEPRESS, 2014. s. 470-481. ISBN 978-989-758-036-9. doi:10.5220/0005095504700481.
  23. STOKLASA, Roman, Tomáš MAJTNER a David SVOBODA. Efficient k-NN based HEp-2 cells classifier. PATTERN RECOGNITION. OXFORD: PERGAMON-ELSEVIER SCIENCE LTD, 2014, roč. 47, č. 7, s. 2409-2418. ISSN 0031-3203. doi:10.1016/j.patcog.2013.09.021.
  24. BUKAČ, Vít a Václav MATYÁŠ. Host–Based Intrusion Detection Systems: Architectures, Solutions, and Challenges. In Antonio Ruiz-Martinez, Rafael Marin-Lopez, Fernando Pereniguez-Garcia. Architectures and Protocols for Secure Information Technology Infrastructures. Hershey, PA, United States: IGI Global, 2014. s. 184-214. Advances in Information Security, Privacy, and Ethics (AISPE). ISBN 978-1-4666-4514-1. doi:10.4018/978-1-4666-4514-1.ch007.
  25. RŮŽIČKA, Michal, Petr SOJKA a Martin LÍŠKA. Math Indexer and Searcher under the Hood: History and Development of a Winning Strategy. In Noriko Kando, Hideo Joho, Kazuaki Kishida. Proceedings of the 11th NTCIR Conference on Evaluation of Information Access Technologies. Tokyo: National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430 Japan, 2014. s. 127-134. ISBN 978-4-86049-065-2.
  26. TROUBIL, Pavel, Hana RUDOVÁ a Petr HOLUB. Media Streams Planning with Uncertain Link Capacities. In IEEE 13th International Symposium on Network Computing and Applications NCA 2014. USA: IEEE, 2014. s. 197-204. ISBN 978-1-4799-5393-6. doi:10.1109/NCA.2014.37.
  27. BRÁZDIL, Tomáš, Stefan KIEFER, Antonín KUČERA, Petr NOVOTNÝ a Joost-Pieter KATOEN. Zero-reachability in probabilistic multi-counter automata. In Thomas Henzinger and Dale Miller. Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). New York: ACM, 2014. s. nestránkováno, 10 s. ISBN 978-1-4503-2886-9. doi:10.1145/2603088.2603161.
  28. 2013

  29. PAŘILOVÁ, Tereza a Tomáš SEZIMA. An Approach to Users with Dyslexia. In 6th Thailand-Japan International Academic Conference. 2013.
  30. MATYÁŠ, Václav a Jiří KŮR. Conflicts between Intrusion Detection and Privacy Mechanisms for Wireless Sensor Networks. IEEE Security & Privacy. New York: IEEE Computer Society, 2013, roč. 11, č. 5, s. 73-76. ISSN 1540-7993. doi:10.1109/MSP.2013.111.
  31. VYKOPAL, Jan, Martin DRAŠAR a Philipp WINTER. Flow-based Brute-force Attack Detection. In Markus Zeilinger, Peter Schoo, Eckehard Hermann. Advances in IT Early Warning. Stuttgart: Fraunhofer Verlag, 2013. s. 41-51. ISBN 978-3-8396-0474-8.
  32. LUNTER, Ľuboš, Daniel JAKUBÍK, Šimon SUCHOMEL a Michal BRANDEJS. Inter-university Cooperation on Plagiarism Detection Systems in Czech Republic. In Jiří Rybička. Plagiarism Across Europe and Beyond. 1st. Brno: Mendel University in Brno, 2013. s. 216-224. ISBN 978-80-7375-765-6.
  33. VINKLER, Marek, Jiří BITTNER, Vlastimil HAVRAN a Michal HAPALA. Massively Parallel Hierarchical Scene Processing with Applications in Rendering. Computer Graphics Forum. Wiley, 2013, roč. 32, č. 8, s. 13-25. ISSN 0167-7055. doi:10.1111/cgf.12140.
  34. STEHLÍK, Martin, Adam SALEH, Andriy STETSKO a Václav MATYÁŠ. Multi-Objective Optimization of Intrusion Detection Systems for Wireless Sensor Networks. In Pietro Liò, Orazio Miglino, Giuseppe Nicosia, Stefano Nolfi and Mario Pavone. Advances in Artificial Life, ECAL 2013, Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems. Cambridge, MA 02142-1493 USA: MIT Press, 2013. s. 569-576. ISBN 978-0-262-31709-2. doi:10.7551/978-0-262-31709-2-ch082.
  35. 2012

  36. NEVĚŘILOVÁ, Zuzana a Marek GRÁC. Common Sense Inference using Verb Valency Frames. In Sojka, Petr and Horák, Aleš and Kopeček, Ivan and Pala, Karel. Proceedings of 15th International Conference on Text, Speech and Dialogue. Berlin / Heidelberg: Springer, 2012. s. 328-335. ISBN 978-3-642-32789-6. doi:10.1007/978-3-642-32790-2_40.
  37. BRÁZDIL, Tomáš, Krishnendu CHATTERJEE, Antonín KUČERA a Petr NOVOTNÝ. Efficient Controller Synthesis for Consumption Games with Multiple Resource Types. In Computer Aided Verification - 24th International Conference, CAV 2012. Berlin: Springer, 2012. s. 23-38. ISBN 978-3-642-31423-0. doi:10.1007/978-3-642-31424-7_8.
  38. MATERNA, Jiří. LDA-Frames: An Unsupervised Approach to Generating Semantic Frames. In Alexander Gelbukh. Computational Linguistics and Intelligent Text Processing, 13th International Conference, CICLing 2012, Part I. Berlin: Springer-Verlag, 2012. s. 376-387. ISBN 978-3-642-28603-2. doi:10.1007/978-3-642-28604-9_31.
  39. SEHNAL, David, Radka SVOBODOVÁ VAŘEKOVÁ, Heinrich J. HUBER, Stanislav GEIDL, Crina-Maria IONESCU, Michaela WIMMEROVÁ a Jaroslav KOČA. SiteBinder: An improved approach for comparing multiple protein structural motifs. Journal of Chemical Information and Modeling. 2012, roč. 52, č. 2, s. 343–359. ISSN 1549-9596. doi:10.1021/ci200444d.
  40. 2011

  41. GRÁC, Marek. Case study of BushBank concept. In The 25th Pacific Asia Conference on Language, Information and Computation. Singapore: Institute for Digital Enhancement of Cognitive Development, Waseda University, 2011. s. 353-361, 8 s. ISBN 978-4-905166-02-3.
  42. MATELA, Jiří, Vít RUSŇÁK a Petr HOLUB. Efficient JPEG2000 EBCOT Context Modeling for Massively Parallel Architectures. In Storer, James A. and Marcellin, Michael W. Data Compression Conference (DCC), 2011. Washington, DC, USA: IEEE Computer Society, 2011. s. 423-432. ISBN 978-0-7695-4352-9. doi:10.1109/DCC.2011.49.
  43. BRÁZDIL, Tomáš, Jan KRČÁL, Jan KŘETÍNSKÝ a Vojtěch ŘEHÁK. Fixed-delay Events in Generalized Semi-Markov Processes Revisited. In CONCUR 2011 - Concurrency Theory: 22nd International Conference. Berlin Heidelberg New York: Springer, 2011. s. 140-155. ISBN 978-3-642-23216-9.
  44. LUDÍK, Tomáš a Jaroslav RÁČEK. Process Methodology for Emergency Management. In IFIP Advances in Information and Communication Technology, Volume 359 AICT, 9th IFIP WG 5.11 International Symposium on Environmental Software Systems: Frameworks of eEnvironment, ISESS 2011. Heidelberg: Springer, 2011. s. 302-309. ISBN 978-3-642-22284-9. doi:10.1007/978-3-642-22285-6_33.
  45. CHMELÍK, Jiří a Jiří SOCHOR. Virtual Environment Kit for Visual Arts. In Reza Sarhangi and Carlo H. Sèquin. Proceedings of Bridges 2011: Mathematics, Music, Art, Architecture, Culture. Phoenix, Arizona, USA: Tessellations Publishing, 2011. s. 131 138, 8 s. ISBN 978-0-9846042-6-5.
  46. 2010

  47. KASPRZAK, Jan, Michal BRANDEJS, Matěj ČUHEL a Tomáš OBŠÍVAČ. Access Rights in Enterprise Full-text Search. In ICEIS 2010: Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 1: Databases and Information Systems Integration. 2010. vyd. Funchal, Portugal: INSTICC – Institute for Systems and Technologies of Information, Control and Communication, 2010. s. 32-39. ISBN 978-989-8425-04-1.
Zobrazit podrobně
Zobrazeno: 7. 6. 2023 02:41