{"title":"Image Reconstruction with Usage of the F-Transform","authors":"Pavel Vlasánek, I. Perfilieva","doi":"10.1007/978-3-642-33018-6_52","DOIUrl":"https://doi.org/10.1007/978-3-642-33018-6_52","url":null,"abstract":"","PeriodicalId":149237,"journal":{"name":"CISIS/ICEUTE/SOCO Special Sessions","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121467406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Exchange Mechanism between Federated Domains: P2P Approach","authors":"M. Choraś, R. Kozik, R. Renk, W. Holubowicz","doi":"10.1007/978-3-642-33018-6_19","DOIUrl":"https://doi.org/10.1007/978-3-642-33018-6_19","url":null,"abstract":"","PeriodicalId":149237,"journal":{"name":"CISIS/ICEUTE/SOCO Special Sessions","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130804305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Greedy Algorithms for Network Anomaly Detection","authors":"T. Andrysiak, L. Saganowski, M. Choraś","doi":"10.1007/978-3-642-33018-6_24","DOIUrl":"https://doi.org/10.1007/978-3-642-33018-6_24","url":null,"abstract":"","PeriodicalId":149237,"journal":{"name":"CISIS/ICEUTE/SOCO Special Sessions","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126816231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pattern Recognition in EEG Cognitive Signals Accelerated by GPU","authors":"P. Dohnálek, P. Gajdoš, T. Peterek, M. Penhaker","doi":"10.1007/978-3-642-33018-6_49","DOIUrl":"https://doi.org/10.1007/978-3-642-33018-6_49","url":null,"abstract":"","PeriodicalId":149237,"journal":{"name":"CISIS/ICEUTE/SOCO Special Sessions","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114730632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural Network Ensembles Design with Self-Configuring Genetic Programming Algorithm for Solving Computer Security Problems","authors":"E. Semenkin, M. Semenkina, I. Panfilov","doi":"10.1007/978-3-642-33018-6_3","DOIUrl":"https://doi.org/10.1007/978-3-642-33018-6_3","url":null,"abstract":"","PeriodicalId":149237,"journal":{"name":"CISIS/ICEUTE/SOCO Special Sessions","volume":"47 Suppl 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123235764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Walkowiak, Wojciech Charewicz, Maciej Donajski, J. Rak
{"title":"A Tabu Search Algorithm for Optimization of Survivable Overlay Computing Systems","authors":"K. Walkowiak, Wojciech Charewicz, Maciej Donajski, J. Rak","doi":"10.1007/978-3-642-33018-6_23","DOIUrl":"https://doi.org/10.1007/978-3-642-33018-6_23","url":null,"abstract":"","PeriodicalId":149237,"journal":{"name":"CISIS/ICEUTE/SOCO Special Sessions","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129140334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pedro Antonio Gutiérrez, J. Sánchez-Monedero, C. Hervás‐Martínez, M. Cruz-Ramírez, J. C. Fernández, F. Fernández-Navarro
{"title":"Approaching System Administration as a Group Project in Computer Engineering Higher Education","authors":"Pedro Antonio Gutiérrez, J. Sánchez-Monedero, C. Hervás‐Martínez, M. Cruz-Ramírez, J. C. Fernández, F. Fernández-Navarro","doi":"10.1007/978-3-642-33018-6_34","DOIUrl":"https://doi.org/10.1007/978-3-642-33018-6_34","url":null,"abstract":"","PeriodicalId":149237,"journal":{"name":"CISIS/ICEUTE/SOCO Special Sessions","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133786814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jahangir Khan, Z. Bojkovic, S. Hayder, G. A. Mallah, A. Haseeb, F. Atta
{"title":"Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing Protocols","authors":"Jahangir Khan, Z. Bojkovic, S. Hayder, G. A. Mallah, A. Haseeb, F. Atta","doi":"10.1007/978-3-642-33018-6_13","DOIUrl":"https://doi.org/10.1007/978-3-642-33018-6_13","url":null,"abstract":"","PeriodicalId":149237,"journal":{"name":"CISIS/ICEUTE/SOCO Special Sessions","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115962194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Felix Brezo, José Gaviria de la Puerta, I. Santos, David Barroso, P. G. Bringas
{"title":"C&C Techniques in Botnet Development","authors":"Felix Brezo, José Gaviria de la Puerta, I. Santos, David Barroso, P. G. Bringas","doi":"10.1007/978-3-642-33018-6_10","DOIUrl":"https://doi.org/10.1007/978-3-642-33018-6_10","url":null,"abstract":"","PeriodicalId":149237,"journal":{"name":"CISIS/ICEUTE/SOCO Special Sessions","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125160573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path Protection","authors":"M. Klinkowski","doi":"10.1007/978-3-642-33018-6_17","DOIUrl":"https://doi.org/10.1007/978-3-642-33018-6_17","url":null,"abstract":"","PeriodicalId":149237,"journal":{"name":"CISIS/ICEUTE/SOCO Special Sessions","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116854555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}