Search Results

You are looking at 1 - 10 of 118 items for :

  • Information Technology x
Clear All
Open access

Wael Alosaimi, Michal Zak, Khalid Al-Begain, Roobaea Alroobaea and Mehedi Masud

Overlay Security Layer to Mitigate Do S Attacks. - In: Proc. of 7th IEEE Int. Symp. Netw. Comput. Appl., IEEE, July 2008 [Cited 16 December 2016], pp. 19-28. 6. Beitollahi, H., G. Deconinc k. Analyzing Well-Known Countermeasures Against Distributed Denial of Service Attacks. - Comput. Commun., Elsevier B. V., Vol. 35, Jun 2012, No 11 [Cited 8 October 2016], pp. 1312-1332. 7. Chen, E. Y. Detecting TCP

Open access

Dmitry N. Aldoshkin and Roman Y. Tsarev

Recognizing Complex Patterns. Applicant and Patent Holder Paul V. C. Hough. No 19600325; Application. 25.03.60; Publ. 18.12.62. 17. Duda, R. O., P. E. Hart. Use of the Hough Transformation to Detect Lines and Curves in Pictures. – Communications of the ACM, Vol. 15 , 1972, No 1, pp. 11-15. 18. Chen, W., X. Wu, Y. Lu. An Improved Path Planning Method Based on Artificial Potential Field for a Mobile Robot. – Cybernetics and Information Technologies, Vol. 15 , 2015, No 2, pp. 181-191.

Open access

Ruta Pirta and Janis Grabis

REFERENCES [1] P. Bernus, O. Noran, A. Molina “Enterprise architecture: Twenty years of the GERAM framework” in Annual Reviews in Control , vol. 39, 2015, pp. 83–93. [2] G. Doucet, J. Gųtze, P. Saha, S. Bernard “Coherency management: Using enterprise architecture for alignment, agility, and assurance,” Journal of EA , 2008, pp. 1–12. [3] J. R. Getter “Enterprise Architecture and IT Governance: A Risk-Based Approach” System Sciences , 2007, pp. 220–230. [4] COBIT 5: A Business Framework

Open access

Ziyu Yang, Maoshen Jia, Wenbei Wang and Jiaming Zhang

, No 9, pp. 655-673. 7. Liutkus, A., S. Gorlow, N. Sturmel, S. Zhang, L. Girin, R. Badeau, L. Daudet, S. Marchand, G. Richard. Informed Audio Source Separation: A Comparative Study. – In: Proc. of 20th European Signal Processing Conference, EURASIP’12, Bucharest, Romania, 2012, pp. 2397-2401. 8. Ozerov, A., A. Liutkus, R. Badeau, G. Richard. Coding-Based Informed Source Separation: Nonnegative Tensor Factorization Approach. – IEEE Transactions on Audio, Speech and Language Processing, Vol. 21 , 2013, No 8, pp. 1699-1712. 9. Zheng, X., C. Ritz, J. T

Open access

Vadim Romanuke

noise of distortion,” Computer and Information Science , vol. 6, no. 2, 2013, pp. 38–54. [19] G. Arulampalam and A. Bouzerdoum, “A generalized feedforward neural network architecture for classification and regression,” Neural Networks , vol. 16, iss. 5–6, 2003, pp. 561–568. [20] V. V. Romanuke, “Optimizing parameters of the two-layer perceptrons’ boosting ensemble training for accuracy improvement in wear state discontinuous tracking model regarding statistical data

Open access

Fernando Almeida, Pedro Silva and Fernando Araújo

. 32. Feuerstein, S. The Bestof Oracle PL/SQL: Must Know Features, Best Practices and New Features in Oracle Database 11g. Toad World. Retrieved 21 December 2017. 33. Feuerstein, S., B. Pribyl, C. Dawes. Oracle PL/SQL Language: Pocket Reference. Sebastopol, O’Reilly Media, 2008. 34. Gupta, S. Advanced Oracle PL/SQL Developer’s Guide. Birmingham, Packt Publishing, 2016. 35. Greenwald, R., R. Stackowiak, G. Dodge, D. Klein, B

Open access

Vijaya Bhaskar Velpula and Mhm Krishna Prasad

. Information-Theoretic Co-Clustering. - In: Proc. of 9th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining (KDD’03), 2003, pp. 89-98. 12. Hongyuan, Z., D. Chris, G. Ming, H. Xiaofeng, S. Horst. Spectral Relaxation for K-Means Clustering. - In: Proc. of Neural Info. Processing Systems (NIPS), Vancouver, 2001, pp. 1057-1064. 13. Shi, J., J. Malik. Normalized Cuts and Image Segmentation. - IEEE Trans. Pattern Anal. Mach.Intell., Vol. 22, August 2000, No 8, pp. 888-905. 14. Zhao, Y., G. Karypis. Empirical and

Open access

Milena Dobreva, Galia Angelova and Gennady Agre

:// 32. Chen, C.-M., S. Lin. Assessing Effects of Information Architecture of Digital Libraries on Supporting e-Learning: A Case Study on the Digital Library of Nature & Culture. - Computers & Education, Vol. 75, 2014, pp. 92-102. 33. Schmidt, K., H.-C. Schmitz, M. Wolpers. Developing a Network of Cultural Heritage Objects Repositories for Educational Purposes. Metadata and Semantic Research. Springer, Berlin Heidelberg, 2011, pp. 337-348. 34. Avellis, G. Non Functional Requirements

Open access

P. Ravi Kumar, P. Herbert Raj and P. Jelciana

, 2015, pp. 25-31. 33. Atieniese, G., R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song. Provable Data Possession at Untrusted Stores. - In: Proc. of 14th ACM Conference on Computer and Communication Security, 2007, pp. 598-609. 34. Atieniese, G., R. DiPuetro, L. V. Mancini, G. Tsudik. Scalable and Efficient Provable Data Possession. - In: Proc. of 4th International Conference on Security and Privacy in Communication Networks, Art. 9, 2008. 35. Atieniese, G., R. Burns, R. Curtmola, J. Herring, O. Khan, L

Open access

Arkadiusz Janz, Paweł Kędzia and Maciej Piasecki

, T. A. S. Pardo. Revisiting Cross-Document Structure Theory for Multidocument Discourse Parsing. – Inf. Process. Manage, Vol. 50 , March 2014, No 2, pp. 297-314. 23. Nivre, J., J. Hall, J. Nilsson, A. Chanev, G. Eryigit, S. Kübler, S. Marinov, E. Marsi. MaltParser: A Language-Independent System for Data-Driven Dependency Parsing. – Natural Language Engineering, Vol. 13 , 2007, No 2, pp. 95-135. 24. Pease, A. Ontology: A Practical Guide. Angwin, CA, Articulate Software Press, 2011. 25. Piasecki, M., S. Szpakowicz, B. Broda. A Wordnet from the