Zobrazeno 1 - 10
of 98
pro vyhledávání: '"Vlado Sruk"'
Autor:
Goran Rajic, Vlado Sruk
Publikováno v:
IEEE Access, Vol 12, Pp 99704-99738 (2024)
Object Constraint Language (OCL) plays a pivotal role in Model Driven Architecture (MDA), an important applied software engineering concept created over a quarter of a century ago. The expressiveness and precision of the primary specification languag
Externí odkaz:
https://doaj.org/article/917b77f2adc64173ad63b7de1e006909
Publikováno v:
Sensors, Vol 22, Iss 20, p 7803 (2022)
Heterogeneous multiprocessor platforms are the foundation of systems that require high computational power combined with low energy consumption, like the IoT and mobile robotics. In this paper, we present five new algorithms for the design space expl
Externí odkaz:
https://doaj.org/article/53be2512449a465aae40b9275c436d87
Publikováno v:
Automatika, Vol 60, Iss 1, Pp 91-104 (2019)
Early application timing estimation is essential in decision making during design space exploration of heterogeneous embedded systems in terms of hardware platform dimensioning and component selection. The decisions which have the impact on project d
Externí odkaz:
https://doaj.org/article/2832845851b843578b9953648ed7dc0e
Publikováno v:
Tehnički Vjesnik, Vol 25, Iss 2, Pp 390-400 (2018)
Botnets are considered as the primary threats on the Internet and there have been many research efforts to detect and mitigate them. Today, Botnet uses a DNS technique fast-flux to hide malware sites behind a constantly changing network of compromise
Externí odkaz:
https://doaj.org/article/b0c79b3f8f47463da0f71791b9c8023b
Publikováno v:
Sensors; Volume 22; Issue 20; Pages: 7803
Heterogeneous multiprocessor platforms are the foundation of systems that require high computational power combined with low energy consumption, like the IoT and mobile robotics. In this paper, we present five new algorithms for the design space expl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::91f266bba5634ad81fc5caff79d7a3c5
https://doi.org/10.3390/s22207803
https://doi.org/10.3390/s22207803
Publikováno v:
Automatika, Vol 60, Iss 1, Pp 91-104 (2019)
Automatika : časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije
Volume 60
Issue 1
Automatika : časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije
Volume 60
Issue 1
Early application timing estimation is essential in decision making during design space exploration of heterogeneous embedded systems in terms of hardware platform dimensioning and component selection. The decisions which have the impact on project d
Publikováno v:
Cluster Computing. 20:661-671
This paper presents a review of current denial of service (DoS) attack and defence concepts, from a theoretical ad practical point of view. Seriousness of DoS attacks is tangible and they present one of the most significant threats to assurance of de
Autor:
Goran Rajić, Vlado Sruk
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030306892
SAM
SAM
Traditionally telecommunication protocols were developed by the use of the ITU languages such as SDL, ASN.1, and ECN. Recently, many parts of protocols are more and more being developed using model-driven development tools such as UML. However, in th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ea9686ef7dc8b6262bf98497ce52a768
https://doi.org/10.1007/978-3-030-30690-8_4
https://doi.org/10.1007/978-3-030-30690-8_4
Autor:
Nikolina Frid, Vlado Sruk
Publikováno v:
MIPRO
This paper discusses multiobjective exploration of heterogeneous MPSoC design space using a method based on NSGA-II evolutionary algorithm. Key feature of the proposed method is separation of computation and communication which enables exploration of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0b34c7c6c516d24dc38ccdab1d9b89d4
https://www.bib.irb.hr/988325
https://www.bib.irb.hr/988325
Distributed Denial of Service (DDoS) attacks are a serious threat to Internet security. A lot of research effort focuses on having detection and prevention methods on the victim server side or source side. The Bloom filter is a space-efficient data s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6339be604caf11cbdaa55355d4fe146b
https://www.bib.irb.hr/888623
https://www.bib.irb.hr/888623