Search Results - "PAVKOVIC, N"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Handling engineering design experience by Ziha, K., Stankovic, T., Pavkovic, N., Skala, K.

    “…We present trials in handling of engineering design experience in industrial and academic communities. Advanced CAD/CAM and other computerized supporting tools…”
    Get full text
    Conference Proceeding
  2. 2

    Glucocorticoid receptor-Hsp90 interaction in the liver cytosol of cadmium-intoxicated rats by DUNDJERSKI, J, KOVAC, T, PAVKOVIC, N, CVORO, A, MATIC, G

    Published in Cell biology and toxicology (01-01-2000)
    “…The influence of cadmium on the rat liver glucocorticoid receptor (GR) binding capacity, on the cytosolic level of 90 kDa heat shock protein (Hsp90), and on…”
    Get full text
    Journal Article
  3. 3
  4. 4

    Social Engineering Toolkit - A systematic approach to social engineering by Pavkovic, N., Perkov, L.

    “…Social engineering techniques, exploiting humans as information systems' security weakest link, are mostly the initial attack vectors within larger intrusions…”
    Get full text
    Conference Proceeding
  5. 5

    Back-Tracing Technical Progress with Evolutionary Algorithms by Stankovic, T., Ziha, K., Pavkovic, N.

    “…This paper investigates the engineering development as an evolutionary process. Therefore it first reveals the benefits of evolutionary algorithms in…”
    Get full text
    Conference Proceeding
  6. 6

    Image Programming for Scientific Visualization by Cluster Computing by Sojat, Z., Pavkovic, N., Skala, K.

    “…Advancement of computer usage in scientific work must be based on development of the e-Science technologies. More generally e-Science refers to the development…”
    Get full text
    Conference Proceeding
  7. 7

    High-availability using open source software by Perkov, L., Pavkovic, N., Petrovic, J.

    “…Availability, the degree to which a system is in a specified, operable state, is a critical criterion in overall information systems' quality. Since network…”
    Get full text
    Conference Proceeding
  8. 8

    Recent advances in GSM insecurities by Perkov, L., Klisura, A., Pavkovic, N.

    “…GSM is one of the most widely used standards in the world with more than 1.5 billion users. Privacy, interception and theft of service continue to raise…”
    Get full text
    Conference Proceeding
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13