Search Results - "Bankovic, Z."
-
1
An evolutionary scheduling approach for trading-off accuracy vs. verifiable energy in multicore processors
Published in Logic journal of the IGPL (01-12-2017)“…This work addresses the problem of energy-efficient scheduling and allocation of tasks in multicore environments, where the tasks can allow a certain loss in…”
Get full text
Journal Article -
2
Tuberous sclerosis complex protein 1 expression is affected by VHL Gene alterations and HIF-1α production in sporadic clear-cell renal cell carcinoma
Published in Experimental and molecular pathology (01-12-2016)“…Alterations in von Hippel-Lindau gene (VHL) do not determine deregulation of hypoxia-inducible factors (HIFs) in clear-cell renal carcinoma (ccRCC). Their…”
Get full text
Journal Article -
3
Vhl Dependent Expression of REDD1 and PDK3 Proteins in Clear-Cell Renal Cell Carcinoma
Published in Journal of medical biochemistry (01-01-2018)“…Background: Sporadic clear-cell renal cell carcinoma (ccRCC) is associated with mutations in the VHL gene, upregulated mammalian target of rapamycin (mTOR)…”
Get full text
Journal Article -
4
Detecting false testimonies in reputation systems using self-organizing maps
Published in Logic journal of the IGPL (01-08-2013)Get full text
Journal Article -
5
Self-organizing Maps versus Growing Neural Gas in Detecting Anomalies in Data Centres
Published in Logic journal of the IGPL (01-06-2015)Get full text
Journal Article -
6
Improving social odometry robot networks with distributed reputation systems for collaborative purposes
Published in Sensors (Basel, Switzerland) (01-12-2011)“…The improvement of odometry systems in collaborative robotics remains an important challenge for several applications. Social odometry is a social technique…”
Get full text
Journal Article -
7
Detecting unknown attacks in wireless sensor networks that contain mobile nodes
Published in Sensors (Basel, Switzerland) (01-08-2012)“…As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new…”
Get full text
Journal Article -
8
Compiler optimizations as a countermeasure against side-channel analysis in MSP430-based devices
Published in Sensors (Basel, Switzerland) (01-06-2012)“…Ambient Intelligence (AmI) requires devices everywhere, dynamic and massively distributed networks of low-cost nodes that, among other data, manage private…”
Get full text
Journal Article -
9
A Taxonomy of Trust and Reputation System Attacks
Published in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (01-06-2012)“…Trust and reputation have been suggested as an effective security mechanism for open and distributed environments. However, even though there exists a high…”
Get full text
Conference Proceeding -
10
Using clustering techniques for intelligent camera-based user interfaces
Published in Logic journal of the IGPL (01-06-2012)Get full text
Journal Article -
11
Holistic Solution for Confining Insider Attacks in Wireless Sensor Networks Using Reputation Systems Coupled with Clustering Techniques
Published in 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (01-11-2011)“…The most serious obstacle in further proliferation of wireless sensor networks is their low level of security, where the insider attacks are the most…”
Get full text
Conference Proceeding -
12
Real-Time Context-Aware Network Security Policy Enforcement System (RC-NSPES)
Published in 2009 Fifth International Conference on Networking and Services (01-04-2009)“…The major technical objectives of the RC-NSPES are to provide a framework for the concurrent operation of reactive and pro-active security functions to deliver…”
Get full text
Conference Proceeding -
13
Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms
Published in The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007) (01-10-2007)“…An extensive set of machine learning and pattern classification techniques trained and tested on KDD dataset failed in detecting most of the user-to-root…”
Get full text
Conference Proceeding -
14
A contribution to the study of architect Vladislav Vladisavljević's interwar period opus in Belgrade
Published in Nasleđe = Heritage (2021)“…The subject of the research presented in this paper is the Belgrade opus of the architect Vladislav D. Vladisavljević (1905-1961), predominantly realized…”
Get full text
Journal Article -
15
Three architectural competitions for the Belgrade City Museum design
Published in Nasleđe = Heritage (2018)“…The paper presents three architectural-urbanistic contests organized with the aim of ensuring permanent accommodation for the Belgrade City Museum. Though…”
Get full text
Journal Article