Search Results - "Baláž, Anton"

Refine Results
  1. 1

    A non‐intrusive Smart metering system: Analytics and simulation of power consumption by Fecil'ak, Peter, Pekár, Adrián, Ádám, Norbert, Baláž, Anton, Chovancová, Eva

    Published in Concurrency and computation (10-07-2020)
    “…Summary This contribution deals with the design and experimental implementation of a Smart Metering Architecture which supports different transport…”
    Get full text
    Journal Article
  2. 2

    Android Access Control Extension by Baláž, Anton, Madoš, Branislav, Ambróz, Michal

    Published in Acta Informatica Pragensia (31-12-2015)
    “…The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel…”
    Get full text
    Journal Article
  3. 3

    Intrusion Detection Architecture Utilizing Graphics Processors by Vokorokos, Liberios, Baláž, Anton, Madoš, Branislav

    Published in Acta Informatica Pragensia (29-12-2012)
    “…With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been…”
    Get full text
    Journal Article
  4. 4

    Data Acquisition in Non-Invasive Brain-Computer Interface Using Emotiv Epoc Neuroheadset by Vokorokos, Liberios, Madoš, Branislav, Ádám, Norbert, Baláž, Anton

    Published in Acta electrotechnica et informatica (01-06-2012)
    “…This paper deals with the issue of the brain-computer interface (BCI) - the human-machine interface (HMI) based on acquisition, analysis and transformation of…”
    Get full text
    Journal Article
  5. 5

    Artificial neural network based IDS by Adam, Norbert, Mados, Branislav, Balaz, Anton, Pavlik, Tomas

    “…The Network Intrusion Detection Systems (NIDS) are either signature based or anomaly based. In this paper presented NIDS system belongs to anomaly based Neural…”
    Get full text
    Conference Proceeding
  6. 6

    Algorithm Design for User Experience Enhancement of Volume Dataset Reading from Storage Using 3D Binary Image as the Metadata by Mados, Branislav, Balaz, Anton, Adam, Norbert, Hurtuk, Jan, Bilanova, Zuzana

    “…The paper deals with the problematics of volume datasets that can be considered as the three dimensional regular grids of scalar values or regular grids of…”
    Get full text
    Conference Proceeding
  7. 7

    MongoDB scheme analysis by Vokorokos, Liberies, Uchnar, Matus, Balaz, Anton

    “…The aim of this work is to create a web administration interface for the MongoDB database to analyze the stored data. The application design was based on the…”
    Get full text
    Conference Proceeding
  8. 8
  9. 9

    Data flow graph mapping techniques of computer architecture with data driven computation model by Madoš, Branislav, Baláž, Anton

    “…Article introduces architecture of computer with data driven computation model based on principles of tile computing which is modern approach to multi-core…”
    Get full text
    Conference Proceeding
  10. 10

    Intrusion detection system based on partially ordered events and patterns by Balaz, Anton, Vokorokos, Liberios

    “…The purpose of this paper is to present intrusion detection systems (IDS) and proposed architecture of the IDS based on partially ordered events and patterns…”
    Get full text
    Conference Proceeding
  11. 11

    Priority of instructions execution and DFG mapping techniques of computer architecture with data driven computation model by Vokorokos, Liberios, Mados, Branislav, Adam, Norbert, Balaz, Anton

    “…The article introduces proposed computer architecture with data driven computation model based on principles of tile computing as the modern approach to…”
    Get full text
    Conference Proceeding
  12. 12

    Security sandbox based on RBAC model by Hurtuk, Jan, Balaz, Anton, Adam, Norbert

    “…The article presents a security solution of mapping RBAC model in to Linux kernel systems. RBAC management model represents an effective concept of mapping…”
    Get full text
    Conference Proceeding
  13. 13

    Web Search Engine by Vokorokos, Liberios, Baláž, Anton, Madoš, Branislav

    Published in Acta electrotechnica et informatica (01-01-2011)
    “…Searching an information is essential part of the Internet today. There are many algorithms and methods for effective web search engines, where the results are…”
    Get full text
    Journal Article
  14. 14

    The CASE tool for programming of the multi-core System-on-a-Chip with the data flow computation control by Mados, Branislav, Adam, Norbert, Balaz, Anton, Sinalova, Katarina

    “…The paper describes Computer Aided Software Engineering (CASE) tool, that supports programming of the experimental multi-core tile based System-on-a-Chip…”
    Get full text
    Conference Proceeding
  15. 15

    Extending Minecraft for Teaching Bitcoin Cryptocurrency by Balaz, Anton, Mados, Branislav, Pietrikova, Emilia

    “…This paper describes the author's additions to Minecraft and Bitcoin. The topic of the paper is an implementation of modification into the popular game…”
    Get full text
    Conference Proceeding
  16. 16

    ICT Security through Games by Balaz, Anton, Pietrikova, Emilia, Mados, Branislav, Jansky, Roland

    “…With the increasing number of connected devices today, there is a growing reliance on digital technologies. This trend brings along an increased incidence of…”
    Get full text
    Conference Proceeding
  17. 17

    P-double operators in the pipeline system of DF-KPI architecture by Adam, N., Mados, B., Balaz, A.

    “…The data flow technique is a multiprocessor technique which enables parallelism to be found without being explicitly declared. One of the most important steps…”
    Get full text
    Conference Proceeding
  18. 18

    Information Hiding Using Domain-Specific Hierarchical Data Structure Symmetry-aware Sparse Voxel Directed Acyclic Graphs by Mados, Branislav, Balaz, Anton, Khorshidiyeh, Heidar, Hasin, Martin

    “…Steganography is considered to be the science and the art of hidden communication through an open communication channel or hiding information using innocent…”
    Get full text
    Conference Proceeding
  19. 19

    Possibilities of methods for IDS testing by Hulic, Michal, Balaz, Anton, Stancel, Martin

    “…The aim of this paper is to present what devices IDS and IPS are and ways of possibilities of testing these devices. In the individual chapters we present the…”
    Get full text
    Conference Proceeding
  20. 20

    Classification of Security for System Vulnerabilities by Balaz, Anton, Hulic, Michal, Kurilec, Marek, Stancel, Martin

    “…The result of this publication is a presentation of a risk assessment and monitoring tool in computer systems at the network infrastructure, operating systems…”
    Get full text
    Conference Proceeding