Abstract is missing.
- Estimation of the domination number in sparse random graphs and applicationsMartin Nehéz, Dusan Bernát, Marek Lelovský. [doi]
- Towards analysis of IP communication in a constrained environment of tactical radio networksMarcel Marek, Ondrej Rysavy, Vladimír Veselý. [doi]
- Design principles of an embedded language (EFL) enabling well defined order-independent executionMoshe Goldstein, David Dayan, Max Rabin, Devora Berlowitz, Or Berlowitz, Raphael B. Yehezkael. [doi]
- Decision guidance models for microservices: service discovery and fault toleranceStefan Haselböck, Rainer Weinreich, Georg Buchgeher. [doi]
- An FPGA-based beam steering transceiver prototype for narrowband IoT communicationsGiulio D'Amato, Gianfranco Avitabile, Giuseppe Coviello, Claudio Talarico. [doi]
- Towards defending connected vehicles against attacksEslam G. AbdAllah, Mohammad Zulkernine, Yuan Xiang Gu, Clifford Liem. [doi]
- rtioco-based timed test sequences using backward-inductionJunaid Iqbal, Dragos Truscan, Jüri Vain, Ivan Porres. [doi]
- Performance improvement of distributed file system using tunnelingLadislav Pesicka, Lubos Matejka, Jirí Safarík, Stanislav Racek. [doi]
- Dual channel securityWissam Al Jurdi, Jacques Bou Abdo. [doi]
- Model driven secure web applications: the SeWAT platformAkram Idani. [doi]
- An approach to formal verification of python software transactional memoryBranislav Kordic, Miroslav Popovic, Silvia Ghilezan, Ilija Basicevic. [doi]
- Using core ontologies for extending sensitive business process modeling with the knowledge perspectiveMariam Ben Hassen, Mohamed Turki, Faïez Gargouri. [doi]
- Towards a generic framework for model-driven engineering of software process linesHalimeh Agh, Raman Ramsin. [doi]
- Instructions energy consumption on a heterogeneous multicore platformMomcilo Krunic, Jelena Kovacevic, Miroslav Popovic, Vlado Krunic. [doi]
- A Constraint-based intrusion detection systemM. D. Siam Hasan, Thomas R. Dean, Fahim T. Imam, Francisco Garcia, Sylvain P. Leblanc, Mohammad Zulkernine. [doi]
- Virtual machine consolidation for cloud data centers using parameter-based adaptive allocationAbdelkhalik Mosa, Rizos Sakellariou. [doi]
- Optimal smart mobile access point placement for maximal coverage and minimal communicationAmin Majd, Masoud Daneshtalab, Elena Troubitsyna, Golnaz Sahebi. [doi]
- Using FPGA implementations for evaluation of internet retransmission-time-out predictorsLuis Rizo Domínguez, Rabi Mahapatra, Ivan Padilla-Cantoya. [doi]
- Employing issues and commits for in-code sentence based use case identification and remodularizationPeter Berta, Michal Bystrický, Michal Krempaský, Valentino Vranic. [doi]
- Information system evolution management: a complex evaluationMarek Polák, Irena Holubová. [doi]
- Structuring analyses of complex enterprise datasets with adaptive morphogenesis methodsEinar Polis. [doi]
- Towards a realtime, collision-free motion coordination and navigation system for a UAV fleetAdnan Ashraf, Amin Majd, Elena Troubitsyna. [doi]