Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Branislav Mados"'
Autor:
Branislav MADOŠ, Zuzana BILANOVÁ
Publikováno v:
Acta Electrotechnica et Informatica, Vol 19, Iss 4, Pp 29-34 (2020)
The paper deals with the problematics of data hiding into domain specific hierarchical data structures which are dedicated to the geometry of the voxelized three-dimensional scenes representation. Sparse Voxel Directed Acyclic Graph (SVDAG) as the s
Externí odkaz:
https://doaj.org/article/73bc0a19674043cba266280c4bec0e9a
Publikováno v:
Symmetry, Vol 14, Iss 10, p 2114 (2022)
When representing the geometry of voxelized three-dimensional scenes (especially if they have been voxelized to high resolutions) in a naive—uncompressed—form, one may end up using vast amounts of data. These can easily attack the available memor
Externí odkaz:
https://doaj.org/article/770d734dfc9147f08efd73333a355f2b
Publikováno v:
Acta Informatica Pragensia, Vol 4, Iss 3, Pp 310-317 (2015)
The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities wit
Externí odkaz:
https://doaj.org/article/72d73327f2a1480ea9780bcbe1194df0
Autor:
Branislav Madoš, Mária Feková
Publikováno v:
Acta Informatica Pragensia, Vol 4, Iss 3, Pp 258-275 (2015)
Ambition to achieve possibility to hide digitally represented information which is coded in bit sequences into digital cover media is fulfilled through a number of steganographic algorithms, including Least Significant Bit (LSB) algorithm. A further
Externí odkaz:
https://doaj.org/article/d7f448f26f4d47cebf3bb8f9eec220ea
Publikováno v:
Acta Informatica Pragensia, Vol 2, Iss 2, Pp 51-58 (2013)
Paper deals with the data driven computation control paradigm, which is alternative to the mainstream control flow model of program execution control. In the second part of the paper we are introducing computer architecture that is proposed at the De
Externí odkaz:
https://doaj.org/article/62f03809a98b440eb002aa104ebae12f
Publikováno v:
Acta Informatica Pragensia, Vol 1, Iss 1, Pp 50-59 (2012)
With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventin
Externí odkaz:
https://doaj.org/article/451c4e69400b40d4b5c81efd702b511b
Publikováno v:
Journal of Information and Organizational Sciences, Vol 45, Iss 1, Pp 329-349 (2021)
Lossless data compression algorithms can use statistical redundancy to represent data using a fewer number of bits in comparison to the original uncompressed data. Run-Length Encoding (RLE) is one of the simplest lossless compression algorithms in te
Externí odkaz:
https://doaj.org/article/322422c0aac948aab9ee5164aac27dc3
Publikováno v:
2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI).
Publikováno v:
2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES).
Publikováno v:
2022 IEEE 20th Jubilee World Symposium on Applied Machine Intelligence and Informatics (SAMI).