Login / Signup
IDAACS (2)
2011
2011
2011
Keyphrases
Publications
2011
Oleksii Baranovskyi
Content - Monitoring as a new trend in quantitative evaluation of changes in social processes.
IDAACS (2)
(2011)
Antons Patlins
,
Nadezhda Kunicina
,
Leonids Ribickis
Information tools for education of electrical engineers.
IDAACS (2)
(2011)
Carsten Wolff
,
Idania Gorrochategui
,
Markus Bucker
Managing large HW/SW Codesign projects.
IDAACS (2)
(2011)
Oksana Pomorova
,
Tetyana Hovorushchenko
Research of artificial neural network's component of software quality evaluation and prediction method.
IDAACS (2)
(2011)
Bassam A. Hussein
,
Saeed Ramazani
,
Sara Haji Kazemi
Preliminary investigation of project success criteria in Norway.
IDAACS (2)
(2011)
J. Kohlbrecher
,
S. Hakobyan
,
Johannes Pickert
,
Uwe Grossmann
Visualizing energy information on mobile devices.
IDAACS (2)
(2011)
Alexey Lagunov
Features of using geometrical theory to standard IEEE 802.11 network construction indoors.
IDAACS (2)
(2011)
Andreas Bilke
,
Jürgen Sieck
Recognition of movable objects.
IDAACS (2)
(2011)
Peter J. A. Reusch
New standards for project audit and the impact on existing standards for project management.
IDAACS (2)
(2011)
Gabriel Girban
,
Mircea Popa
WSN testing environment with energy consumption monitoring and simulation of sensed data.
IDAACS (2)
(2011)
Gediminas Danilevicius
,
Darius Ezerskis
,
Leonas Balasevicius Kaunas
Data structures and interfaces for automated PLC applications development process.
IDAACS (2)
(2011)
Jan Kaluski
Game-theoretical model for resources management in mining industry.
IDAACS (2)
(2011)
Peter J. A. Reusch
,
Muhammad Khushnood
,
Sergio Vasquez Kaufmann
Concepts on competences in project management.
IDAACS (2)
(2011)
Miki Ueno
,
Naoki Mori
,
Keinosuke Matsumoto
Novel chatterbot system utilizing Web information for estimating current user interests.
IDAACS (2)
(2011)
Werner Wetekamp
Net Present Value (NPV) as a tool supporting effective project management.
IDAACS (2)
(2011)
Katrin Loehr
,
Rao Aamir Khan
Project finance - On new standards for processes in project and Program Management.
IDAACS (2)
(2011)
Arkadiusz Banasik
,
Adrian Kapczynski
Fuzzy evaluation of biometric authentication systems.
IDAACS (2)
(2011)
Tadeusz Witkowski
,
Pawel Antczak
,
Arkadiusz Antczak
Machine learning - Based classification in manufacturing system.
IDAACS (2)
(2011)
Taras Lendyuk
,
Sergey Rippa
Information portal of E-learning system in Semantic Web environment.
IDAACS (2)
(2011)
Iryna Golyash
,
Svitlana Sachenko
,
Sergey Rippa
Improving the information security audit of enterprise using XML technologies.
IDAACS (2)
(2011)
Jiri Schafer
,
Michal Drozd
Detecting network attacks using behavioural models.
IDAACS (2)
(2011)
Veska Gancheva
,
Bogdan Shishedjiev
,
Elena Kalcheva-Yovkova
An approach to convert scientific data description.
IDAACS (2)
(2011)
Laura Esmeralda Garcia Moreno
Concentrated Solar Power (CSP) in DESERTEC - Analysis of technologies to secure and affordable Energy Supply.
IDAACS (2)
(2011)
Rao Aamir Khan
,
Konrad Spang
Critical success factors for international projects.
IDAACS (2)
(2011)
Mykola Dyvak
,
Andriy Pukas
,
Myroslav Komar
Methods and tools for reducing the risk of damage the reverse laryngeal nerve during the surgical operation on a thyroid.
IDAACS (2)
(2011)
Taras Boyko
,
Tetiana Bubela
Uncertainty of measurement results in the process of product qualitative level identification.
IDAACS (2)
(2011)
Bassam A. Hussein
Quasi-experimental method to identify the impact of ambiguity and urgency on project participants in the early project phase.
IDAACS (2)
(2011)
Gerold Bausch
,
Helmut Beikirch
An unsupervised method for realtime spike sorting.
IDAACS (2)
(2011)
Stefan Balogh
,
Matej Pondelik
Capturing encryption keys for digital analysis.
IDAACS (2)
(2011)
Jan Sobotka
,
Jiri Novák
,
Jan Malinsky
Analytic model of FlexRay synchronization mechanism.
IDAACS (2)
(2011)
Jan Zidek
,
Petr Bilik
,
Tomas Wittassek
Application of graphical programming and benefit of virtual instrumentation in teaching of state-of-the-art instrumentation.
IDAACS (2)
(2011)
Security risk analysis for cloud computing systems.
IDAACS (2)
(2011)
Adrian Kapczynski
,
Arkadiusz Banasik
Biometric logical access control enhanced by use of steganography over secured transmission channel.
IDAACS (2)
(2011)
I. V. Baranova
,
O. V. Aleksenko
,
K. A. Omelianenko
,
V. V. Shendryk
The specifics of vane pump firmness features research by means of COSMOSWorks.
IDAACS (2)
(2011)
George Markowsky
Universal asset assessment system based on excel™.
IDAACS (2)
(2011)
Marcin Sobota
,
Adrian Kapczynski
,
Arkadiusz Banasik
Application of quantum cryptography protocols in authentication process.
IDAACS (2)
(2011)
Pavel Bzoch
,
Jirí Safarík
Security and reliability of distributed file systems.
IDAACS (2)
(2011)
Vladimir Simov Jotsov
Machine self-learning applications in security systems.
IDAACS (2)
(2011)
Orest Ivakhiv
,
Petro Mushenyk
,
Orest Bazylevych
Intelligent system for testing of object information state.
IDAACS (2)
(2011)
Ghannam Aljabari
,
Evren Eren
Virtualization of wireless LAN infrastructures.
IDAACS (2)
(2011)
Jonathan David Farley
,
George Markowsky
Evolutionary dynamics of revolution: Opinion modeling in society based on graphs and rules.
IDAACS (2)
(2011)
Alexander M. Prokhorenkov
,
Alexander S. Sovlukov
,
Roman A. Istratov
Application of forecasting models for control of heat supply systems.
IDAACS (2)
(2011)
Pavlo Bykovyy
,
Yuriy Pigovsky
,
Volodymyr Kochan
,
Nadiya Vasylkiv
,
Andriy F. Karachka
Assessment of probabilistic parameters of alarm security detectors taking uncertain noise into account.
IDAACS (2)
(2011)
Laura Pomponio
,
Marc Le Goc
,
Eric Pascual
,
Alain Anfosso
Resident's activity at different abstraction levels: Proposition of a general theoretical framework.
IDAACS (2)
(2011)
Uliana Yatsykovska
,
Mykola Karpinski
,
Ihor Vasyltsov
,
Pavlo Bykovyy
The monitoring system of DoS/DDoS attacks in the global network.
IDAACS (2)
(2011)
I. V. Baranova
,
Y. V. Parfenenko
,
V. G. Nenja
Complex mathematical model for computer calculation of delivery and heat distribution in pipeline system.
IDAACS (2)
(2011)
Igor V. Kotenko
,
Olga Polubelova
Verification of security policy filtering rules by Model Checking.
IDAACS (2)
(2011)
Roman Pasichnyk
,
Andriy Melnyk
,
Natalia Pasichnyk
,
Iryna V. Turchenko
Method of adaptive control structure learning based on model of test's complexity.
IDAACS (2)
(2011)
Jonathan D. Beezley
,
Jan Mandel
,
Loren Cobb
Wavelet ensemble Kalman filters.
IDAACS (2)
(2011)
Sigeru Omatu
Diagnosis of mechanical devices by the ICA with sub-band filter.
IDAACS (2)
(2011)