Abstract is missing.
- 60 Years of Evolution Strategies in 60 Minutes (Invited Paper)Dirk Arnold 0001. 1 [doi]
- Scenes-and-Frames Semantics and Its Possibilities in Building a Knowledge Database of the Slovak Language (Invited Paper)Peter Kostelnik, Martina Ivanová. 2-16 [doi]
- Kernel P Systems and Connections With Membrane Systems (Invited Paper)Marian Gheorghe 0001. 17-19 [doi]
- Computational and Machine Learning Methods to Study Genomics of Diseases (Invited Paper)Fereydoun Hormozdiari. 20 [doi]
- From Ink to Algorithms: AI-Powered Processing and Cryptanalysis of Historical Ciphers (Invited Paper)Eugen Antal. 21 [doi]
- Neurosymbolic Learning With Random ForestMichal Barnisin, Lubomír Popelínský. 22-30 [doi]
- Comparison of Monte Carlo Tree Search VariantsPeter Guba, Jakub Gemrot. 31-46 [doi]
- Design of Transformer-Based QA Systems for Logistic DataMartin Baca, Simon Horvát. 47-57 [doi]
- Network Text Analysis Framework for Mapping Research Trends: A Neural Architecture Search Case StudyPetra Vidnerová, Roman Neruda. 58-68 [doi]
- Precipitation and Cloud Forecasting Using Radar Data and Encoder-Decoder Convolutional LSTMBianka Szepesiová, Richard Stana. 69-80 [doi]
- Isolated Sign Language Recognition Using Deep LearningBarbora Lapinová, Lubomir Antoni, Simon Horvát. 81-92 [doi]
- Factors That Impact Success in Higher Education: Analysis of Educational DataDiellor Hoxhaj, Jan Hric, Iveta Mrázová. 93-104 [doi]
- Textual Embeddings with Word-Type-Weighted Word2Vec and Graph Neural NetworksTheodor Ladin, Lukás Korel, Martin Holena. 105-113 [doi]
- Deep Segmentation of Fuel Rod End Plugs for Nuclear Assembly InspectionVojtech Bláha, Jan Blazek. 114-127 [doi]
- A Practical Guide to Method Selection for Feature-Poor Bipartite Graphs: From Traditional Baselines to Graph Neural NetworksPavel Procházka, Daniil Buchko. 128-141 [doi]
- Automated Construction of Legal Terminology ThesaurusZoltán Szoplák, Peter Gurský, Dávid Varga, Simon Horvát, Stanislav Krajci. 142-152 [doi]
- Rule-Based Sentiment Analysis of MacedonianSofija Kochovska, Branko Kavsek, Jernej Vicic. 153-163 [doi]
- Corpus Frequencies in Morphological Inflection: Do They Matter?Tomás Sourada, Jana Straková. 164-178 [doi]
- From the Prague Dependency Treebank to the Uniform Meaning Representation: Gold-Standard Czech UMR Data and Partial Automatic ConversionMarkéta Lopatková, Hana Hledíková, Jan Stepánek, Daniel Zeman. 179-190 [doi]
- LR Parsing of Permutation PhrasesJana Kosticová. 191-204 [doi]
- Complete CF(¢, $)-Grammars, Pumping Reductions, and RegularityFrantisek Mráz, Dana Pardubská, Martin Plátek, Martin Procházka, Marta Vomlelová. 205-214 [doi]
- A Unifying Approach to Picture AutomataYvo Ad Meeres, Frantisek Mráz. 215-229 [doi]
- Remarks on the Universal Approximation Property of Feedforward Neural NetworksJiri Kupka, Zahra Alijani, Petra Stevuliáková. 230-241 [doi]
- Tuning of Language Models in Eastern European Languages on Twitter/XTomás Filip, Martin Pavlícek, Petr Sosík. 242-252 [doi]
- Modified P Colony With Rule Application IntensityLucie Ciencialová, Ludek Cienciala. 253-263 [doi]
- Compatibility of IR Colonies and Protocols for Communication Between IoT DevicesSárka Vavrecková. 264-279 [doi]
- Effective Modifications of Self-Organizing Migrating AlgorithmRadka Poláková, Daniel Valenta. 280-291 [doi]
- Brightfield Cell Segmentation Without Labels or LearningXénia Richnáková, Viktória Hodorová, Jirí Hladuvka. 292-301 [doi]
- Weighted de Novo Clustering of Third-Generation Transcriptomic DatasetsLuca Denti, Yoshihiro Shibuya. 302-312 [doi]
- Local Enrichment of Genomic AnnotationsJakub Drobný, Brona Brejová. 313-325 [doi]
- Seeing Through Hairballs: Simplifying Pangenome GraphsMartin Senderák, Tomás Vinar. 326-333 [doi]
- Bafiq: BAM Flag Index Tool for Faster Repeated Queries of Mapped ReadsJan Kotrs, Matej Lexa. 334-342 [doi]
- Overview of Reverse Shell TechniquesDusan Bernát, Matús Bucher. 343-357 [doi]
- Formal Concept Analysis and Attribute Dependencies of NIST Data Leakage CaseLubomir Antoni, Pavol Sokol, Sophia Petra Krisáková, Dominika Kotlárová, Ondrej Krídlo, Stanislav Krajci. 358-368 [doi]
- Reconstruction of the Image Captured by TempestSDRFilip Tuch, Richard Ostertág. 369-378 [doi]
- Identification of Malicious Slovak Domains Using Machine LearningVanda Matusíková, Eva Marková, Rastislav Krivos-Bellus, Sophia Petra Krisáková. 379-394 [doi]
- Bad Cipher Design: Chessography and Cascaded Spin ShuffleMartin Stanek. 395-403 [doi]
- Data-Driven Digital Forensics: Anomaly Detection in Mozilla FirefoxZuzana Hennelová, Pavol Sokol, Tomás Bajtos, Sophia Petra Krisáková. 404-413 [doi]
- Impact of Cybersecurity Incidents on Stock PricesRichard Ostertág, Martin Stanek. 414-421 [doi]