Position Papers of the 2014 Federated Conference on Computer Science and Information Systems, FedCSIS 2014, Warsaw, Poland, September 7-10, 2014
暂无分享,去创建一个
[1] Hermann Härtig,et al. The Nizza secure-system architecture , 2005, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[2] Edward C. Prem,et al. Wireless Local Area Networks , 2008, Industrial Communication Systems.
[3] Reiner W. Hartenstein. Are We Really Ready for the Breakthrough , 2003 .
[4] The challenge for legal metrology of operating systems embedded in measuring instruments , .
[5] Peter F. Patel-Schneider,et al. Layering the Semantic Web: Problems and Directions , 2002, SEMWEB.
[6] D. M. Titterington,et al. Variational approximations in Bayesian model selection for finite mixture distributions , 2007, Comput. Stat. Data Anal..
[7] P. Pancheri,et al. Dal Minnesota Multiphasic Personality Inventory al “Panda”: il MMPI-2 automatico , 1999 .
[8] Salvatore J. Stolfo,et al. Measuring Security , 2011, IEEE Security & Privacy.
[9] Yehya Mohamad,et al. Supporting Inclusive Design of User Interfaces with a Virtual User Model , 2011, HCI.
[10] Tor D. Wager,et al. Individual differences in multiple types of shifting attention , 2006, Memory & cognition.
[11] Elizabeth Chang,et al. Semantic Web Service matchmakers: state of the art and challenges , 2013, Concurr. Comput. Pract. Exp..
[12] Michal Panczyk,et al. A self–stabilizing algorithm for finding weighted centroid in trees , 2012 .
[13] Yasushi Azuma,et al. Counting the atoms in a 28Si crystal for a new kilogram definition , 2011 .
[14] Dino Schweitzer,et al. Designing interactive visualization tools for the graphics classroom , 1992, SIGCSE '92.
[15] Tetsuo Tamai,et al. Software lifetime and its evolution process over generations , 1992, Proceedings Conference on Software Maintenance 1992.
[16] Vaduvur Bharghavan,et al. MACAW: a media access protocol for wireless LAN's , 1994, SIGCOMM 1994.
[17] Vyas Sekar,et al. Verifiable network function outsourcing: requirements, challenges, and roadmap , 2013, HotMiddlebox '13.
[18] Marianne M. Swanson,et al. Standards for Security Categorization of Federal Information and Information Systems , 2004 .
[19] Lonnie Golden,et al. A Brief History of Long Work Time and the Contemporary Sources of Overwork , 2008 .
[20] Yuh-Jen Chen,et al. An empirical knowledge management framework for professional virtual community in knowledge-intensive service industries , 2012, Expert Syst. Appl..
[21] Kevin C. Almeroth,et al. The impact of channel bonding on 802.11n network management , 2011, CoNEXT '11.
[22] J. Konorski,et al. Implementation and testing of Level 2 security architecture for the IIP System , 2012 .
[23] Matthias Lange,et al. L4Android: a generic operating system framework for secure smartphones , 2011, SPSM '11.
[24] T. Rydén,et al. Stylized Facts of Daily Return Series and the Hidden Markov Model , 1998 .
[25] Chih-Yu Wang,et al. IEEE 802.11n MAC Enhancement and Performance Evaluation , 2009, Mob. Networks Appl..
[26] Gerard Salton,et al. A vector space model for automatic indexing , 1975, CACM.
[27] Monia Bellalouna,et al. Average-Case Analysis for the Probabilistic Bin Packing Problem , 2004 .
[28] The Bologna Declaration on the European space for higher education: an explanation , 2000 .
[29] Jolanta Sala,et al. Kształcenie kadr dla potrzeb gospodarki elektronicznej , 2008 .
[30] Po-Jung Chen,et al. Design of a Low-Power and Low-Latency MAC Protocol with Nodes Grouping and Transmission Pipelining in Wireless Sensor Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[31] Hakan Altinçay,et al. Analytical evaluation of term weighting schemes for text categorization , 2010, Pattern Recognit. Lett..
[32] Vangelis Th. Paschos,et al. The probabilistic longest path problem , 1999, Networks.
[33] Jaroslaw Legierski,et al. USSD communication channel as alternative to XML SOAP in mobile Unified Communication applications , 2013, FedCSIS.
[34] A. Tripathi,et al. On prioritization of vulnerability categories based on CVSS scores , 2011, 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT).
[35] Rick Cattell,et al. Scalable SQL and NoSQL data stores , 2011, SGMD.
[36] V. Paschos,et al. Well solved cases of probabilistic traveling salesman problem , 2010 .
[37] Marco Conti,et al. Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows , 2008, IEEE Transactions on Mobile Computing.
[38] Lionel Pichon,et al. A Matched-Pulse Approach for Soft-Fault Detection in Complex Wire Networks , 2012, IEEE Transactions on Instrumentation and Measurement.
[39] Stewart Kowalski,et al. Information Security Metrics: State of the Art : State of the art , 2011 .
[40] D. R. Paulson,et al. Active Learning in the College Classroom. , 1998 .
[41] Stephen N. Luko,et al. Risk Management Principles and Guidelines , 2013 .
[42] Dimitris Bertsimas,et al. A Vehicle Routing Problem with Stochastic Demand , 1992, Oper. Res..
[43] Viviane Reding,et al. The European data protection framework for the twenty-first century , 2012 .
[44] David L. Cohn,et al. Autonomic Computing , 2003, ISADS.
[45] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[46] Janusz Furtak,et al. How to use the TPM in the method of secure data exchange using Flash RAM media , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[47] Jennifer L. Bayuk,et al. Security as a theoretical attribute construct , 2013, Comput. Secur..
[48] Xu Zhiqun,et al. Emerging of Telco Cloud , 2013, China Communications.
[49] Vangelis Th. Paschos,et al. The Probabilistic Minimum Vertex‐covering Problem , 2002 .
[50] Chris Barlas. Beating Babel - Identification, Metadata and Rights , 2002, ISMIR.
[51] M. E. Kabay,et al. Writing Secure Code , 2015 .
[52] Andrea Hershatter,et al. Millennials and the World of Work: An Organization and Management Perspective , 2010 .
[53] Jelena Dakic,et al. Contemporary management in a higher education institution in Serbia , 2013 .
[54] Qiang Wang,et al. Fractal-Based Brain State Recognition from EEG in Human Computer Interaction , 2011, BIOSTEC.
[55] Patrick Jaillet. On Some Probabilistic Combinatorial Optimization Problems Defined on Graphs , 1987 .
[56] Jean-Pierre Seifert,et al. Advances on Access-Driven Cache Attacks on AES , 2006, Selected Areas in Cryptography.
[57] F. Harary,et al. Outerplanar Graphs and Weak Duals , 1974 .
[58] Thierry Turletti,et al. A survey of QoS enhancements for IEEE 802.11 wireless LAN , 2004, Wirel. Commun. Mob. Comput..
[59] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[60] B. Gates. Business @ the Speed of Thought , 1999 .
[61] Yang Ou,et al. To ontologise or not to ontologise: An information model for a geospatial knowledge infrastructure , 2012, Comput. Geosci..
[62] Steffen Staab,et al. Knowledge Processes and Ontologies , 2001, IEEE Intell. Syst..
[63] G. Becker,et al. Human Capital: A Theoretical and Empirical Analysis with Special Reference to Education, Third Edition , 1993 .
[64] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[65] Arthur M. Farley. Vertex Centers of Trees , 1982 .
[66] Guido Proietti,et al. On the Stability of Approximation for Hamiltonian Path Problems , 2006, Algorithmic Oper. Res..
[67] Reijo Savola. On the Feasibility of Utilizing Security Metrics in Software-Intensive Systems , 2010 .
[68] Witold Pedrycz,et al. Data Mining: A Knowledge Discovery Approach , 2007 .
[69] Magdalene Marinaki,et al. A hybrid Honey Bees Mating Optimization algorithm for the Probabilistic Traveling Salesman Problem , 2009, 2009 IEEE Congress on Evolutionary Computation.
[70] Horst Zuse,et al. A Framework of Software Measurement , 1998 .
[71] S. M. Hedetniemi,et al. Linear Algorithms for Finding the Jordan Center and Path Center of a Tree , 1981 .
[72] Marcin Kuzia,et al. Mobile Payment System - Telco 2.0 application dedicated for payments , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[73] Vilhelm Verendel,et al. Quantified security is a weak hypothesis: a critical survey of results and assumptions , 2009, NSPW '09.
[74] Abdullah Al-Dhelaan. Pairwise key establishment scheme for hypercube-based wireless sensor networks , 2011 .
[75] Vangelis Th. Paschos,et al. Probabilistic graph-coloring in bipartite and split graphs , 2009, J. Comb. Optim..
[76] Sebastian Abeck,et al. Metrics for Evaluating Service Designs Based on SoaML , 2011 .
[77] Scott W. Brown,et al. Processing resources in timing and sequencing tasks , 2007, Perception & psychophysics.
[78] Claudia Linnhoff-Popien,et al. A Context Modeling Survey , 2004 .
[79] Deshi Li,et al. Research on Wireless Sensor Network and Carrying Network Integration Based on Gateway , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[80] David Boyle,et al. Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.
[81] Deep Medhi,et al. CAM05-6: Lightpath Topology Configuration for Wavelength-routed IP/MPLS Networks for Time-Dependent Traffic , 2006, IEEE Globecom 2006.
[82] B. Kiker. Investment in human capital , 1971 .
[83] Khalid Hafeez,et al. Dynamics of human resource and knowledge management , 2003, J. Oper. Res. Soc..
[84] Khaled Ghédira,et al. A priori parallel machines scheduling , 2010, Comput. Ind. Eng..
[85] Nicola Santoro,et al. Distributed algorithms for finding centers and medians in networks , 1984, TOPL.
[86] Edsger W. Dijkstra,et al. Self stabilization in spite of distributed control , 1974 .
[87] P. Tse,et al. Attention and the subjective expansion of time , 2004, Perception & psychophysics.
[88] T. Sarkar,et al. Analysis of Multiconductor Transmission Lines , 1988, 31st ARFTG Conference Digest.
[89] Douglas R. Shier,et al. On powers and centers of chordal graphs , 1983, Discret. Appl. Math..
[90] Daniel Jachyra,et al. Multiway classification of MMPI profiles , 2013, The International Conference on Digital Technologies 2013.
[91] Krzysztof Cabaj,et al. Towards Self-defending Mechanisms Using Data Mining in the EFIPSANS Framework , 2010, MISSI.
[92] D. M. Titterington,et al. VARIATIONAL BAYESIAN ANALYSIS FOR HIDDEN MARKOV MODELS , 2009 .
[93] Monia Bellalouna,et al. Problèmes d'optimisation combinatoires probabilistes , 1993 .
[94] Giorgio Marchetti,et al. Observation levels and units of time: A critical analysis of the main assumption of the theory of the artificial , 2000, AI & SOCIETY.
[95] Otto Carlos Muniz Bandeira Duarte,et al. Authentication and Access Control Architecture for Software Defined Networks , 2013 .
[96] Krzysztof Pancerz,et al. Computer-aided diagnosis of patients with mental disorders using the Copernicus system , 2011, 2011 4th International Conference on Human System Interactions, HSI 2011.
[97] Fernando M. V. Ramos,et al. Towards secure and dependable software-defined networks , 2013, HotSDN '13.
[98] Eduardo Feitosa,et al. Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.
[99] Electrical Units of Measurement , 1883, Nature.
[100] Iwona Doliñska. Wybrane aspekty zapewniania bezpieczeñœtwa sieci bezprzewodowych IEEE 802.11 , 2011 .
[101] James L. McClelland. Is a Machine Realization of Truly Human-Like Intelligence Achievable? , 2009, Cognitive Computation.
[102] J. Shih. Project Time in Silicon Valley , 2004 .
[103] Danny Krizanc,et al. Revitalizing computing education through free and open source software for humanity , 2009, Commun. ACM.
[104] Mohammad Atique,et al. Power Aware Wireless Sensor Node DesignUsing PSoC , 2013 .
[105] Mohammad Reza Akhavan,et al. Study the Performance Limits of IEEE 802 . 11 Wirelesses LANs Master of Science in Computer Science and Engineering , 2006 .
[106] Patrick Jaillet,et al. A Priori Optimization , 1990, Oper. Res..
[107] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[108] Fernando M. V. Ramos,et al. Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.
[109] Mehmet Hakan Karaata,et al. Self-stabilizing algorithms for finding centers and medians of trees , 1994, PODC '94.
[110] Jugoslav Ackoski,et al. Service-Oriented Architecture concept for intelligence information system development , 2011 .
[111] B. Moor,et al. Subspace identification for linear systems , 1996 .
[112] Damon Greer. Safe Harbor—a framework that works , 2011 .
[113] Krzysztof Pancerz,et al. Experiments with Hybridization and Optimization of the Rules Knowledge Base for Classification of MMPI Profiles , 2011, ICDM.
[114] Philip S. Yu,et al. Top 10 algorithms in data mining , 2007, Knowledge and Information Systems.
[115] S. Rosenow. Comparison of an Exact Branch-and-Bound and an Approximative Evolutionary Algorithm for the Probabilistic Traveling Salesman Problem , 1999 .
[116] D. Drysdale. An Introduction to Fire Dynamics , 2011 .
[117] Vyas Sekar,et al. Making middleboxes someone else's problem: network processing as a cloud service , 2012, SIGCOMM '12.
[118] Dominik Kujawa,et al. The Hybrid Algorithm for Procedural Generation of Virtual Scene Components , 2012, ISVC.
[119] Jukka Ylitalo,et al. OpenID authentication as a service in OpenStack , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[120] Daniel Jachyra,et al. Classification of MMPI Profiles using Decision Trees , 2011 .
[121] Riel Miller,et al. Measuring What People Know: Human Capital Accounting for the Knowledge Economy , 1996 .
[122] Shlomi Dolev,et al. Self Stabilization , 2004, J. Aerosp. Comput. Inf. Commun..
[123] Mária Bieliková,et al. Query construction for related document search based on user annotations , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[124] Lakhmi C. Jain,et al. Introduction to Bayesian Networks , 2008 .
[125] Michal Panczyk,et al. A self-stabilizing algorithm for finding weighted centroid in trees , 2012, Ann. UMCS Informatica.
[126] Vangelis Th. Paschos,et al. Probabilistic models for the Steiner Tree problem , 2010, Networks.
[127] Ian Sommerville,et al. Decision Support Tools for Cloud Migration in the Enterprise , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[128] Luca Mari,et al. A Comparison Between Foundations of Metrology and Software Measurement , 2008, IEEE Transactions on Instrumentation and Measurement.
[129] Sebastian Grabowski,et al. BusStop — Telco 2.0 application supporting public transport in agglomerations , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).
[130] Aristides Matopoulos,et al. The Evolution of Logistics Service Providers and the Role of Internet-based Applications in Facilitating Global Operations , 2010 .
[131] D. Schunk. Learning Theories: An Educational Perspective , 1991 .
[132] Irina Shklovski,et al. Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.
[133] R. William Beckwith. High Assurance Security/Safety for Deeply Embedded, Real-time Systems , 2004 .
[134] Marcin S. Szczuka,et al. The Rough Set Exploration System , 2005, Trans. Rough Sets.
[135] Panagiotis Symeonidis,et al. Ternary Semantic Analysis of Social Tags for Personalized Music Recommendation , 2008, ISMIR.
[136] Dieter Gollmann,et al. Quality of Protection - Security Measurements and Metrics , 2006, Advances in Information Security.
[137] Thierry Bertin-Mahieux,et al. The Million Song Dataset , 2011, ISMIR.
[138] Enrique Alba,et al. Parallelism and evolutionary algorithms , 2002, IEEE Trans. Evol. Comput..
[139] Alexandru Iosup,et al. Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[140] Chris Arney. Artificial Psychology: The Quest for What It Means to Be Human , 2009 .
[141] John Debenham,et al. Knowledge Engineering , 1998, Artificial Intelligence.
[142] Luiz Antonio,et al. CONSTRUCTIVE GENETIC ALGORITHM FOR GRAPH COLORING , 1997 .
[143] Wieslaw Paja,et al. Feasibility Studies of Quality of Knowledge Mined from Multiple Secondary Sources. I. Implementation of generic operations , 2005, Intelligent Information Systems.
[144] Christoph Krauß,et al. Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques , 2007, ESAS.
[145] Peretz Shoval,et al. Information Filtering: Overview of Issues, Research and Systems , 2001, User Modeling and User-Adapted Interaction.
[146] Antoine B. Bagula,et al. Context-aware handoff decision for wireless access networks using Bayesian networks , 2009, SAICSIT '09.
[147] Eugene Agichtein,et al. Find it if you can: a game for modeling different types of web search success using interaction data , 2011, SIGIR.
[148] H. R. E. H. Bouchekara,et al. Diagnosis of Multi-Fault Wiring Network Using Time-Domain Reflectometry and Electromagnetism-Like Mechanism , 2013 .
[149] Patrick Jaillet,et al. Probabilistic Traveling Salesman Problems , 1985 .
[150] Henwood,et al. Author index , 1983, Pharmacology Biochemistry and Behavior.
[151] Wei Wang,et al. Design and Implementation of Wireless Sensor Network Gateway Based on Environmental Monitoring , 2009, 2009 International Conference on Environmental Science and Information Application Technology.
[152] Thomas Keays,et al. Semantic Web for the Working Ontologist , 2008 .
[153] HeiserGernot,et al. Are virtual-machine monitors microkernels done right? , 2006 .
[154] Steven M. Bellovin. On the Brittleness of Software and the Infeasibility of Security Metrics , 2006, IEEE Security & Privacy Magazine.
[155] Patrick Jaillet. Rates of Convergence for Quasi-Additive Smooth Euclidean Functionals and Application to Combinatorial Optimization Problems , 1992, Math. Oper. Res..
[156] Reijo Savola,et al. Quality of security metrics and measurements , 2013, Comput. Secur..
[157] Markus Modzelewski,et al. An ontology-based approach to achieve inclusive design support in the early phases of the product development process , 2014 .
[158] Jacek Baginski. Software Support of the Risk Reduction Assessment in the ValueSec Project Flood Use Case , 2013, DepCoS-RELCOMEX.
[159] Mohammed El-Abd,et al. Cooperative models of particle swarm optimizers , 2008 .
[160] Steven L. Kinney. Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology) , 2006 .
[161] Mabry Tyson,et al. FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.
[162] Yu-Hsin Liu. Diversified local search strategy under scatter search framework for the probabilistic traveling salesman problem , 2008, Eur. J. Oper. Res..
[163] Chih-Ming Chen,et al. An efficient fuzzy classifier with feature selection based on fuzzy entropy , 2001, IEEE Trans. Syst. Man Cybern. Part B.
[164] William G. Griswold,et al. Exploring the potential of mobile phones for active learning in the classroom , 2007, SIGCSE.
[165] Yu-Hsin Liu. A hybrid scatter search for the probabilistic traveling salesman problem , 2007, Comput. Oper. Res..
[166] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[167] Maya Gokhale,et al. Matched Filter Computation on FPGA, Cell and GPU , 2007, 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2007).
[168] Arkadiusz Kawa,et al. Cooperation between Logistics Service Providers Based on Cloud Computing , 2013, ACIIDS.
[169] Klaus-Dieter Thoben,et al. Supporting Inclusive Design of Mobile Devices with a Context Model , 2012 .
[170] Peter Van Roy,et al. Exploring Fractals on the Macintosh , 1994 .
[171] Andreas Christmann,et al. Support vector machines , 2008, Data Mining and Knowledge Discovery Handbook.
[172] Guy Pujolle,et al. A Survey on Identity Management for the Future Network , 2013, IEEE Communications Surveys & Tutorials.
[173] Dimitris Bertsimas,et al. Computational Approaches to Stochastic Vehicle Routing Problems , 1995, Transp. Sci..
[174] J. Löser,et al. An I / O Architecture for Microkernel-Based Operating Systems , 2003 .
[175] Brian Elvesæter,et al. Specifying Services using the Service Oriented Architecture Modeling Language (SoaML) - A Baseline for Specification of Cloud-based Services , 2011, CLOSER.
[176] Li Sui,et al. The Design and Realization of Embedded Gateway Based on WSN , 2008, 2008 International Conference on Computer Science and Software Engineering.
[177] Marco Domenico Aime,et al. The risks with security metrics , 2008, QoP '08.
[178] Guy Leduc,et al. Basic Abstractions for an Autonomic Network Architecture , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[179] Divyakant Agrawal,et al. Big data and cloud computing: current state and future opportunities , 2011, EDBT/ICDT '11.
[180] Janusz Strużyna,et al. Puzzle "bycia zatrudnionym" - wyzwania nowego HRM dla menedżerów , 2013 .
[181] Piotr Korbel,et al. LocFusion API - Programming interface for accurate multi-source mobile terminal positioning , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[182] Hung-Hsuan Huang,et al. From observation to simulation: generating culture-specific behavior for interactive systems , 2009, AI & SOCIETY.
[183] Bogdan Franczyk,et al. Applying big data and linked data concepts in supply chains management , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[184] Jesus San-Miguel-Ayanz,et al. Active Fire Detection for Fire Emergency Management: Potential and Limitations for the Operational Use of Remote Sensing , 2005 .
[185] Mauro Nunes,et al. Assessing the Performance of Virtual Teams with Intelligent Agents , 2011 .
[186] Watts S. Humphrey,et al. The Watts New Collection: Columns by the SEI’s Watts Humphrey , 2009 .
[187] Miguel Correia,et al. SCFS: A Shared Cloud-backed File System , 2014, USENIX Annual Technical Conference.
[188] Dimitris Bertsimas,et al. The probabilistic minimum spanning tree problem , 1990, Networks.
[189] Markus Klann,et al. Virtual User Models - Approach and first results of the VICON project. , 2011 .
[190] Joel Rosenblatt. Security Metrics: A Solution in Search of a Problem , 2008 .
[191] Wayne A. Jansen,et al. Directions in Security Metrics Research , 2009 .
[192] Ajay Jasra,et al. On population-based simulation for static inference , 2007, Stat. Comput..
[193] Yehya Mohamad,et al. Prototype of a Virtual User Modeling Software Framework for Inclusive Design of Consumer Products and User Interfaces , 2013, HCI.
[194] Danny Dhillon,et al. Developer-Driven Threat Modeling: Lessons Learned in the Trenches , 2011, IEEE Security & Privacy.
[195] Ryszard Rutka,et al. Metoda identyfikacji zdolności systemu motywacyjnego do kreowania zachowań oczekiwanych przez pracodawcę , 2013 .
[196] Mabry Tyson,et al. A security enforcement kernel for OpenFlow networks , 2012, HotSDN '12.
[197] Antonio Casimiro,et al. A Trustworthy and Resilient Event Broker for Monitoring Cloud Infrastructures , 2012, DAIS.
[198] Anthony N. Pettitt,et al. Transdimensional sequential Monte Carlo using variational Bayes - SMCVB , 2016, Comput. Stat. Data Anal..
[199] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[200] Kirstie Hawkey,et al. Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures , 2012, Computers & security.
[201] Robert K. Cunningham,et al. Why Measuring Security Is Hard , 2010, IEEE Security & Privacy.
[202] Krzysztof Pancerz,et al. Classification of MMPI Profiles of Patients with Mental Disorders - Experiments with Attribute Reduction and Extension , 2010, RSKT.
[203] D. Bertsimas,et al. Further results on the probabilistic traveling salesman problem , 1993 .
[204] Kunihiko Kaneko,et al. A Generic Mechanism for Adaptive Growth Rate Regulation , 2007, PLoS Comput. Biol..
[205] Patrick Langdon,et al. Inclusion and interaction: Designing interaction for inclusive populations , 2010, Interact. Comput..
[206] Bernhard Ager,et al. Outsourcing the routing control logic: better internet routing based on SDN principles , 2012, HotNets-XI.
[207] A. J. Goldman. Minimax Location of a Facility in a Network , 1972 .
[208] Simeon Keates,et al. Inclusive Design: Design for the Whole Population , 2003 .
[209] Feng Zhao,et al. Tiny web services: design and implementation of interoperable and evolvable sensor networks , 2008, SenSys '08.
[210] Eiji Oki,et al. Application of Attractor Selection to Adaptive Virtual Network Topology Control , 2008, BIONETICS.
[211] Si-Ho Cha,et al. Ontology-Based Methodology for Managing Heterogeneous Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[212] Neil J. Gunther. Time—The Zeroth Performance Metric , 2011 .
[213] Louis Goubin,et al. Protecting AES with Shamir's Secret Sharing Scheme , 2011, CHES.
[214] Gerald G. Brown,et al. How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[215] Gilbert Laporte,et al. A Priori Optimization of the Probabilistic Traveling Salesman Problem , 1994, Oper. Res..
[216] Peter Gregor,et al. “User sensitive inclusive design”— in search of a new paradigm , 2000, CUU '00.
[217] G. Rein,et al. Forecasting fire growth using an inverse zone modelling approach , 2011 .
[218] Luca Maria Gambardella,et al. Solving the Homogeneous Probabilistic Traveling Salesman Problem by the ACO Metaheuristic , 2002, Ant Algorithms.
[219] Hagai Attias,et al. Inferring Parameters and Structure of Latent Variable Models by Variational Bayes , 1999, UAI.
[220] Dave Durkee,et al. Why Cloud Computing Will Never Be Free , 2010, ACM Queue.
[221] S. Hooper,et al. A "learning society"? , 1996, Science.
[222] Eduardo Feitosa,et al. System Design Artifacts for Resilient Identification and Authentication Infrastructures , 2014, ICNS 2014.
[223] Robert Faludi. Building wireless sensor networks , 2010 .
[224] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[225] Panos M. Pardalos,et al. Expanding neighborhood search–GRASP for the probabilistic traveling salesman problem , 2008, Optim. Lett..
[226] Alexander Aiken,et al. Expanding the frontiers of computer science: designing a curriculum to reflect a diverse field , 2010, SIGCSE.
[227] Iwona Dolinska,et al. The Mathematical Model for Interference Simulation and Optimization in 802.11n Networks , 2013, CS&P.
[228] Mary Levering. Intellectual Property Rights in Musical Works: Overview, Digital Library Issues and Related Initiatives , 2000, ISMIR.
[229] Damian Daniluk,et al. Logistics Mall - Logistiksoftware aus der Cloud , 2014, Wirtschaftsinformatik Manag..
[230] L. Pichon,et al. Detection and location of defects in wiring networks using Time Domain reflectometry and neural networks , 2010, Digests of the 2010 14th Biennial IEEE Conference on Electromagnetic Field Computation.
[231] Jeffrey A. Ingalsbe,et al. Threat Modeling: Diving into the Deep End , 2008, IEEE Software.
[232] Renato Recio,et al. Software defined networking to support the software defined environment , 2014, IBM J. Res. Dev..
[233] Jeffrey D. Case,et al. Simple Network Management Protocol (SNMP) , 1989, RFC.
[234] Glen Gibb,et al. Outsourcing network functionality , 2012, HotSDN '12.
[235] Adam Lackorzynski,et al. Virtual Processors as Kernel Interface , 2010 .
[236] Magdalene Marinaki,et al. A Hybrid Multi-Swarm Particle Swarm Optimization algorithm for the Probabilistic Traveling Salesman Problem , 2010, Comput. Oper. Res..
[237] Luis Miguel Vaquero Gonzalez,et al. Locking the sky: a survey on IaaS cloud security , 2010, Computing.
[238] G. Dodig-Crnkovic. Scientific Methods in Computer Science , 2002 .
[239] T. Fink,et al. Characterization of the probabilistic traveling salesman problem. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.
[240] Janusz Zalewski,et al. Rough sets: Theoretical aspects of reasoning about data , 1996 .
[241] David Simchi-Levi,et al. Finding the Optimal a Priori Tour and Location of a Traveling Salesman with Nonhomogeneous Customers , 1988, Transp. Sci..
[242] David Wright,et al. Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..
[243] Robert S. Laramee,et al. Open Source Software in Computer Science and IT Higher Education: A Case Study , 2011 .
[244] Akihiro Nakao. Deeply programmable network; emerging technologies for network virtualization and software defined network (SDN) , 2013, 2013 Proceedings of ITU Kaleidoscope: Building Sustainable Communities.
[245] Patrick Jaillet,et al. A Priori Solution of a Traveling Salesman Problem in Which a Random Subset of the Customers Are Visited , 1988, Oper. Res..
[246] Nazim Agoulmine,et al. FOCALE: A Novel Autonomic Networking Architecture , 2006 .
[247] Ian Sommerville,et al. Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[248] D. Lloyd. Biological time is fractal: Early events reverberate over a life time , 2008, Journal of Biosciences.
[249] Constantine Stephanidis,et al. User-Centered Interaction Paradigms for Universal Access in the Information Society , 2004, Lecture Notes in Computer Science.
[250] Vlad Trifa,et al. Towards physical mashups in the Web of Things , 2009, 2009 Sixth International Conference on Networked Sensing Systems (INSS).
[251] Jolanta Sala,et al. Rozwiązania instytucjonalne na rzecz transferu wiedzy i kompetencji , 2013 .
[252] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..
[253] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[254] Daniele Miorandi,et al. BIONETS : a New Vision of Opportunistic Networks , 2007 .
[255] David H. Sharp,et al. Complex Fluid Mixing Flows: Simulation vs. Theory vs. Experiment , 2006 .
[256] Ronald W. Potter. The Art of Measurement: Theory and Practice , 1999 .
[257] M. Wand,et al. Mean field variational bayes for elaborate distributions , 2011 .
[258] Kevin M. Stine,et al. Performance Measurement Guide for Information Security , 2008 .
[259] Yan Liu,et al. A Context-Aware Policy Model to Support Autonomic Networking , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.
[260] Andrew J. Kornecki,et al. Studying interrelationships of safety and security for software assurance in cyber-physical systems: Approach based on bayesian belief networks , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[261] Jerry Kanter,et al. Knowledge Management, Practically Speaking , 1999, Inf. Syst. Manag..
[262] W. Bruce Croft,et al. Effective query formulation with multiple information sources , 2012, WSDM '12.
[263] Olivier Darrigol,et al. Number and measure: Hermann von Helmholtz at the crossroads of mathematics, physics, and psychology. , 2003, Studies in history and philosophy of science.
[264] Jianhua Zhang,et al. Design and Optimization of Wireless Sensor Network with Mobile Gateway , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[265] Krzysztof Pancerz,et al. Rule-Based Classification of MMPI Data of Patients with Mental Disorders: Experiments with Basic and Extended Profiles , 2011, Int. J. Comput. Intell. Syst..
[266] Felix Stalder,et al. The Age of Spiritual Machines: When Computers Exceed Human Intelligence , 2001, CSOC.
[267] Brendan Jennings,et al. An autonomic architecture to manage Ubiquitous Computing networks and applications , 2009, 2009 First International Conference on Ubiquitous and Future Networks.
[268] Vangelis Th. Paschos,et al. The Probabilistic Minimum Coloring Problem , 2003, WG.
[269] George Strawn. Science or Security , 2016 .
[270] Charles Fleurent,et al. Genetic and hybrid algorithms for graph coloring , 1996, Ann. Oper. Res..
[271] Arthur M. Farley,et al. Computation of the center and diameter of outerplanar graphs , 1980, Discret. Appl. Math..
[272] Ann Melissa Campbell,et al. Extension of the 2-p-opt and 1-shift algorithms to the heterogeneous probabilistic traveling salesman problem , 2007, Eur. J. Oper. Res..
[273] Francesco Rossi,et al. Aspects of Heuristic Methods in the Probabilistic Traveling Salesman Problem (PTSP) , 1987 .
[274] Sungyoung Lee,et al. Connecting Sensor Networks with TCP/IP Network , 2006, APWeb Workshops.
[275] Jamal Hadi Salim,et al. Forwarding and Control Element Separation (ForCES) Forwarding Element Model , 2010, RFC.
[276] Alysson Neves Bessani,et al. State Machine Replication for the Masses with BFT-SMART , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[277] Vangelis Th. Paschos,et al. Probabilistic combinatorial optimization problems on graphs: A new domain in operational research , 1995 .
[278] Lisa Z. Song,et al. The Role of Information Technologies in Enhancing R&D–Marketing Integration: An Empirical Investigation , 2010 .
[279] S. Puuronen,et al. Fuzzy Classifier Based on Fuzzy Decision Tree , 2007, EUROCON 2007 - The International Conference on "Computer as a Tool".
[280] K Alagarsamy,et al. The Applicability of Existing Metrics for Software Security , 2010 .
[281] Vangelis Th. Paschos,et al. The probabilistic maximum independent set problem , 1995 .
[282] Emilie Poirson,et al. Comparative analysis of human modeling tools , 2013 .
[283] Benoit B. Mandelbrot,et al. Fractal Geometry of Nature , 1984 .
[284] G.N. Rouskas,et al. On Hierarchical Traffic Grooming in WDM Networks , 2008, IEEE/ACM Transactions on Networking.
[285] Gebhard Geiger,et al. Does lift of liquid ban raise or compromise the current level of aviation security in the European Union? Simulation-based quantitative security risk analysis and assessment , 2015 .
[286] 片山 徹. Subspace methods for system identification , 2005 .
[287] Yoji Akao,et al. Quality Function Deployment : Integrating Customer Requirements into Product Design , 1990 .
[288] Piotr Korbel,et al. Student information delivery platform using telecommunications open middleware APIs , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[289] Federico Gobbo,et al. The Pomodoro Technique for Sustainable Pace in Extreme Programming Teams , 2008, XP.
[290] Damian M. Lyons,et al. Evaluation of a Parallel Architecture and Algorithm for Mapping and Localization , 2007, 2007 International Symposium on Computational Intelligence in Robotics and Automation.
[291] Tarja Susi,et al. Technostress in the office: a distributed cognition perspective on human–technology interaction , 2013, Cognition, Technology & Work.
[292] Jaroslaw Legierski,et al. Parking Reservation - application dedicated for car users based on telecommunications APIs , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[293] L. Baum,et al. A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .
[294] J. Prins. Directive 2003/98/EC of the European Parliament and of the Council , 2006 .
[295] Richard W. Longman. On the Interaction Between Theory, Experiments, and Simulation in Developing Practical Learning Control Algorithms , 2003 .
[296] Peter I. Corke,et al. Toward trusted wireless sensor networks , 2010, TOSN.
[297] P. Moral,et al. Sequential Monte Carlo samplers , 2002, cond-mat/0212648.
[298] Kishor S. Trivedi,et al. Ten Fallacies of Availability and Reliability Analysis , 2008, ISAS.
[299] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[300] David Hylender,et al. Data Breach Investigations Report , 2011 .
[301] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[302] Song Wang,et al. Shape deformation: SVM regression and application to medical image segmentation , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.
[303] Konrad Campowsky,et al. BonFIRE: A Multi-cloud Test Facility for Internet of Services Experimentation , 2012, TRIDENTCOM.
[304] Marina Schmid,et al. The Third Wave , 2016 .
[305] Alessandro Chiuso,et al. Some Algorithmic aspects of Subspace Identification with Inputs , 2001 .
[306] Yiyu Yao,et al. On Generalizing Rough Set Theory , 2003, RSFDGrC.
[307] Adi Shamir,et al. How to share a secret , 1979, CACM.
[308] William H. Sanders. Quantitative Security Metrics: Unattainable Holy Grail or a Vital Breakthrough within Our Reach? , 2014, IEEE Security & Privacy.
[309] Jugoslav Achkoski,et al. Intelligence information system (IIS) with SOA-based information systems , 2011, Proceedings of the ITI 2011, 33rd International Conference on Information Technology Interfaces.
[310] Chunli Bai,et al. Fractal structure and fractal dimension determination at nanometer scale , 1999 .
[311] James G. Quintiere,et al. Enclosure Fire Dynamics , 1999 .
[312] Uwe Arnold,et al. Advancements in cloud computing for logistics , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[313] Krzysztof Pancerz,et al. A preliminary attempt to rules generation for mental disorders , 2010, 3rd International Conference on Human System Interaction.
[314] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[315] Mike P. Papazoglou,et al. e-Business: Organizational and Technical Foundations , 2006 .
[316] Peter I. Corke,et al. secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.
[317] L. Edvinsson. Developing intellectual capital at Skandia , 1997 .
[318] Yuan-Shun Dai,et al. A study of service reliability and availability for distributed systems , 2003, Reliab. Eng. Syst. Saf..
[319] S. LalitMohan,et al. IDRBT Community Cloud for Indian Banks , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[320] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[321] Timothy J. Robinson,et al. Sequential Monte Carlo Methods in Practice , 2003 .
[322] Capers Jones,et al. Embedded Software: Facts, Figures, and Future , 2009, Computer.
[323] Gregory Gutin,et al. The traveling salesman problem , 2006, Discret. Optim..
[324] N. Chopin. A sequential particle filter method for static models , 2002 .
[325] M. Dorigo,et al. Ant colony optimization and local search for the probabilistic traveling salesman problem: a case study in stochastic combinatorial optimization , 2006 .
[326] Syed Ali Khayam,et al. Revisiting Traffic Anomaly Detection Using Software Defined Networking , 2011, RAID.
[327] Ramesh Sharda,et al. You’ve got email! Does it really matter to process emails now or later? , 2011, Inf. Syst. Frontiers.
[328] W E Hatcher. Automated classification of MMPI profiles into psychotic, neurotic or personality disorder types. , 1978, Computer programs in biomedicine.
[329] Terje Aven,et al. The Role of Quantitative Risk Assessments for Characterizing Risk and Uncertainty and Delineating Appropriate Risk Management Options, with Special Emphasis on Terrorism Risk , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[330] W. Levelt. Models of word production , 1999, Trends in Cognitive Sciences.
[331] Sebastian Abeck,et al. Evaluation of Service Designs Based on SoaML , 2010, 2010 Fifth International Conference on Software Engineering Advances.
[332] José A. Pino,et al. A generalized algorithm for centrality problems on trees , 1989, JACM.
[333] M. Peter,et al. Towards Modular Security-conscious Virtual Machines , 2010 .
[334] François Pachet,et al. Hit Song Science Is Not Yet a Science , 2008, ISMIR.
[335] Marco Listanti,et al. Off-line configuration of a MPLS over WDM network under time-varying offered traffic , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[336] Maria Macchiato,et al. On the methods to identify clustering properties in sequences of seismic time-occurrences , 2002 .
[337] O. Kariv,et al. An Algorithmic Approach to Network Location Problems. I: The p-Centers , 1979 .
[338] Hinrich Schütze,et al. Introduction to information retrieval , 2008 .
[339] J. Winch,et al. Supply Chain Management: Strategy, Planning, and Operation , 2003 .
[340] Giuseppe Longo,et al. Scaling and Scale Symmetries in Biological Systems , 2014 .
[341] Debra Herrmann,et al. Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI , 2007 .
[342] Artur Rot,et al. IT security threats in cloud computing sourcing model , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[343] Y. Rahmat-Samii,et al. Particle swarm optimization in electromagnetics , 2004, IEEE Transactions on Antennas and Propagation.
[344] Gernot Heiser,et al. The role of virtualization in embedded systems , 2008, IIES '08.
[345] Yehya Mohamad,et al. Creative Design for Inclusion Using Virtual User Models , 2012, ICCHP.
[346] Debra M. Amidon,et al. Innovation Strategy for the Knowledge Economy , 1997 .
[347] Mike P. Papazoglou,et al. Service-oriented design and development methodology , 2006, Int. J. Web Eng. Technol..
[348] Nazim Agoulmine,et al. Challenges for Autonomic Network Management , 2006 .
[349] Paulo Veríssimo,et al. Intrusion-tolerant middleware: the road to automatic security , 2006, IEEE Security & Privacy.
[350] R. Kurzweil,et al. The Singularity Is Near: When Humans Transcend Biology , 2006 .
[351] E. Eckholm,et al. Losing Ground: Environmental Stress and World Food Prospects , 1976 .
[352] Bogdan Franczyk,et al. Applying Linked Data concepts in BPM , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).
[353] David Sinreich,et al. An architectural blueprint for autonomic computing , 2006 .
[354] Richard Bejtlich,et al. The Practice of Network Security Monitoring: Understanding Incident Detection and Response , 2013 .
[355] Tom Briggs. Techniques for active learning in CS courses , 2005 .
[356] Rodrigo Braga,et al. Lightweight DDoS flooding attack detection using NOX/OpenFlow , 2010, IEEE Local Computer Network Conference.
[357] Anthony Seeger,et al. I Found It, How Can I Use It?" - Dealing With the Ethical and Legal Constraints of Information Access , 2003, ISMIR.
[358] Kristin L. Wood,et al. Development of a Functional Basis for Design , 2000 .
[359] Jiewen Wu,et al. A Study of Ontology-based Query Expansion , 2011 .
[360] Bozo Nikolic,et al. Designing and Building an Information System for a Higher Education Institution , 2008 .
[361] R. Srikant,et al. A tutorial on cross-layer optimization in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[362] Hao Wang,et al. Security metrics for software systems , 2009, ACM-SE 47.
[363] Ofodike A. Ezekoye,et al. Characterizing Heat Release Rates Using an Inverse Fire Modeling Technique , 2012 .
[364] Salim Hariri,et al. The Autonomic Computing Paradigm , 2006, Cluster Computing.
[365] Guillermo Rein,et al. Forecasting fire dynamics using inverse computational fluid dynamics and tangent linearisation , 2012, Adv. Eng. Softw..
[366] D. Luckham. Event Processing for Business: Organizing the Real-Time Enterprise , 2011 .
[367] David B. Fogel,et al. Evolutionary algorithms in theory and practice , 1997, Complex.
[368] Roberto Turrin,et al. Performance of recommender algorithms on top-n recommendation tasks , 2010, RecSys '10.
[369] Elena N. Zaitseva,et al. Usage of New Information Estimations for Induction of Fuzzy Decision Trees , 2002, IDEAL.
[370] Adam Lackorzynski,et al. Virtual machines jailed: virtualization in systems with small trusted computing bases , 2009, VDTS '09.
[371] Miguel Correia,et al. Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud , 2013, Euro-Par Workshops.
[372] Jaana Kekäläinen,et al. Cumulated gain-based evaluation of IR techniques , 2002, TOIS.
[373] Jean Kerisel. Of Stones and Man: From the Pharaohs to the Present Day , 2005 .
[374] Adalberto Llarena. Here Comes the Robotic Brain ! , 2010, FIRA RoboWorld Congress.
[375] Thomas A. Limoncelli,et al. The Practice of System and Network Administration , 2001 .
[376] Michaéla C. Schippers,et al. Energy Management of People in Organizations: A Review and Research Agenda , 2011, Journal of business and psychology.
[377] Jin-Kao Hao,et al. Hybrid Evolutionary Algorithms for Graph Coloring , 1999, J. Comb. Optim..
[378] Enrique Alba,et al. Parallel Metaheuristics: A New Class of Algorithms , 2005 .
[379] Prasanna Balaprakash,et al. Adaptive sample size and importance sampling in estimation-based local search for the probabilistic traveling salesman problem , 2009, Eur. J. Oper. Res..
[380] Slawomir Kuklinski,et al. Programmable management framework for evolved SDN , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[381] Mass Soldal Lund,et al. A Conceptual Model for Service Availability , 2006, Quality of Protection.
[382] Minna Räikkönen,et al. A Framework for Integrating Economic Evaluation and Risk Assessment to Support Policymakers' Security-related Decisions , 2012 .
[383] Michael Norrish,et al. seL4: formal verification of an OS kernel , 2009, SOSP '09.
[384] Chao Xu,et al. IFME: information filtering by multiple examples with under-sampling in a digital library environment , 2013, JCDL '13.
[385] Kristin E. Lauter,et al. Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.
[386] Uwe Arnold,et al. LOGICAL — Development of cloud computing platforms and tools for logistics hubs and communities , 2012, 2012 Federated Conference on Computer Science and Information Systems (FedCSIS).
[387] Andrei Broder,et al. A taxonomy of web search , 2002, SIGF.
[388] Antonio Cerone,et al. Using Free/Libre Open Source Software Projects as E-learning Tools , 2010, Electron. Commun. Eur. Assoc. Softw. Sci. Technol..
[389] Joshua D. Knowles,et al. Local search for the probabilistic traveling salesman problem: Correction to the 2-p-opt and 1-shift algorithms , 2005, Eur. J. Oper. Res..
[390] T. Healy,et al. The Well-Being of Nations: The Role of Human and Social Capital. Education and Skills. , 2001 .
[391] Yusnani Mohd Yussoff,et al. Identity-based Trusted Authentication in Wireless Sensor Network , 2012, ArXiv.
[392] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[393] J. Clarkson,et al. Inclusive design , 2010 .
[394] Mary-Anne Williams,et al. Robot Social Intelligence , 2012, ICSR.
[395] D. Bertsimas. Probabilistic combinatorial optimization problems , 1988 .
[396] Radu Sion,et al. To cloud or not to cloud?: musings on costs and viability , 2011, SOCC '11.
[397] Matthew J. Traxler,et al. Introduction to Psycholinguistics: Understanding Language Science , 2011 .
[398] Jane Large Koeckeritz,et al. The Seven Principles of Good Practice , 2002 .
[399] Qian Zhu,et al. IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[400] Luca Maria Gambardella,et al. An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem , 2002, PPSN.
[401] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[402] Ajay Kumar,et al. Cloud computing - An emerging trend in information technology , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).
[403] W. R. Howard. Software Measurement and Estimation: A Practical Approach , 2007 .
[404] Victor Bahl,et al. Mobile IP: A Solution for Transparent, Seamless Mobile Computer Communications , 1998 .
[405] Fred Cohen,et al. How Do We Measure Security , 2011 .
[406] Juraj Hromkovic. Stability of Approximation Algorithms for Hard Optimization Problems , 1999, SOFSEM.
[407] Adam Smith,et al. Special Issue on Statistical and Learning-Theoretic Challenges in Data Privacy , 2012, J. Priv. Confidentiality.
[408] Begoña C. Arrue,et al. Computer vision techniques for forest fire perception , 2008, Image Vis. Comput..
[409] Dharma P. Agrawal,et al. A generalized algorithm for evaluating distributed-program reliability , 1993 .
[410] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[411] Krzysztof Pancerz,et al. Copernicus - An Expert System Supporting Differential Diagnosis of Patients Examined using the MMPI Test - An Index-rule Approach , 2011, HEALTHINF.
[412] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[413] J. Stephen Downie,et al. The International Music Information Retrieval Systems Evaluation Laboratory: Governance, Access and Security , 2004, ISMIR.
[414] Ali Mostashari,et al. Measuring systems security , 2013, Syst. Eng..
[415] Konstantina Papagiannaki,et al. Structural analysis of network traffic flows , 2004, SIGMETRICS '04/Performance '04.
[416] Andrzej Bialas. Risk Assessment Aspects in Mastering the Value Function of Security Measures , 2013, DepCoS-RELCOMEX.
[417] Haoyu Song,et al. Protocol-oblivious forwarding: unleash the power of SDN through a future-proof forwarding plane , 2013, HotSDN '13.
[418] Alex Doboli,et al. Dynamic reconfiguration in a PSoC device , 2009, 2009 International Conference on Field-Programmable Technology.
[419] Ronald Maier,et al. Knowledge management systems - information and communication technologies for knowledge management (3. ed.) , 2007 .
[420] J. Beardwood,et al. The shortest path through many points , 1959, Mathematical Proceedings of the Cambridge Philosophical Society.
[421] Selim Zaim,et al. Performance of knowledge management practices: a causal analysis , 2007, J. Knowl. Manag..
[422] L. Zadeh,et al. Fuzzy Logic for the Management of Uncertainty , 1992 .
[423] Min Zhu,et al. B4: experience with a globally-deployed software defined wan , 2013, SIGCOMM.
[424] Ziynet Dayıoğlu. Secure Database in Cloud Computing - CryptDB Revisited , 2014 .
[425] Hermann Härtig,et al. Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors , 2004, EW 11.
[426] Michel Gendreau,et al. A Tabu Search Heuristic for the Vehicle Routing Problem with Stochastic Demands and Customers , 1996, Oper. Res..
[427] Eric Rogers,et al. Subspace Identification of Process Dynamics for Iterative Learning Control , 2013 .
[428] Ming Li,et al. Software Design of a Simple Wireless Sensor Network System Based on CC2430 , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.