default search action
ITAT 2024: Drienica, Slovakia
- Lucie Ciencialová, Martin Holena, Róbert Jajcay, Tatiana Jajcayová, Martin Macaj, Frantisek Mráz, Richard Ostertág, Dana Pardubská, Martin Plátek, Martin Stanek:
Proceedings of the 24th Conference Information Technologies - Applications and Theory (ITAT 2024), Drienica, Slovakia, September 20-24, 2024. CEUR Workshop Proceedings 3792, CEUR-WS.org 2024
Invited Talks
- Ostap Okhrin:
Reinforcement Learning in Transportation (invited paper). 1 - Sárka Zikánová:
Text Structure and Its Ambiguities: Corpus Annotation as a Helpful Guide (invited paper). 2-12 - Primoz Potocnik:
Generating and Cataloging Symmetric Graphs (invited paper). 13 - György Vaszil:
Describing Computations of Membrane Systems with Petri Nets (invited paper). 14
Computational Intelligence and Data Mining - 12th International Workshop (IWCIDM 2024)
- Maros Bratko, Thomas Seidelmann, Martin Holena:
Graph Neural Networks and Deep Reinforcement Learning in Job Scheduling. 15-23 - Aleksandr Fedorov, David Linke:
Extrapolation Problems in Kinetic Modelling of Catalytic Reactions with Neural Networks. 24-30 - Vrushali Mahajan, Ermiyas Birihanu, Tsegaye Misikir Tashu:
A Dynamic Session-Based Recommender System with Graph Neural Networks. 31-36 - Theodor Ladin, Lukás Korel, Martin Holena:
Textual Embeddings with Word-Type-Weighted Word2Vec. 37-42 - Jana Kosticová:
Low-Latency Streaming Evaluation of JSONPath Queries. 43-51 - Florian Beck, Johannes Fürnkranz, Phuong Huynh Van Quoc:
When Characteristic Rule-based Models Should be Preferred over Discriminative Ones. 52-59
5th Workshop on Automata, Formal and Natural Languages (WAFNL 2024)
- Markéta Lopatková, Eva Fucíková, Federica Gamba, Jan Stepánek, Daniel Zeman, Sárka Zikánová:
Towards a Conversion of the Prague Dependency Treebank Data to the Uniform Meaning Representation. 60-74 - Martin Plátek, Frantisek Mráz, Dana Pardubská, Martin Procházka:
Non-Regularity of Complete CF(¢, $)-Grammars. 75-80 - Oleksandr Fetkovych, Peter Gurský, Dávid Varga, Zoltán Szoplák:
Adapting Plagiarism Detection Techniques for Citation Identification in Legal Texts. 81-88 - Maria Anisimova, Sárka Zikánová:
Problematic Cases of Attitude Annotation in Diplomatic Speeches. 89-93 - Adam Osuský, Dávid Javorský, Ondrej Bojar:
InsBERT: Word Importance from Artificial Insertions. 94-104
Workshop on Natural Computing (WNC 2024)
- Jiri Blahuta, Tomás Soukup, Jirí Kozel, Jiri Martinu:
An OCR-based Application using Tesseract Engine to Extract Text Information from Ultrasound B-MODE Images. 105-110 - Sárka Vavrecková:
Transferable Programs and Reactions for Modeling IoT Network. 111-120 - Radu Traian Bobe, Marian Gheorghe, Florentin Ipate, Ionut-Mihai Niculescu:
Numerical P Systems: Variants and Applications. 121-128 - Lucie Ciencialová, Ludek Cienciala:
Models of P Colonies. 129-135
Computational Aspects of Large-Scale Problems in Discrete Mathematics (CADM 2024)
- György Kiss, Gábor Korchmáros, Federico Romaniello, Valentino Smaldore:
A Note on Parabolic and Linear One-Factorizations of the Complete Graph $K_{p+1}$. 136-142 - Annachiara Korchmaros:
Forbidden Paths and Cycles in the Undirected Underlying Graph of a 2-quasi Best Match Graph. 143-149 - Dusan Bernát, Ján Mazák:
Circular Chromatic Index of Small Snarks. 150-155 - Dominika Závacká, Cristina Dalfó, Miquel Angel Fiol:
Integer Sequences from k-iterated Line Digraphs. 156-161 - Valter Cingel, Tatiana Jajcayová, Ján Pastorek:
Partial Automorphisms and Level of Symmetry of Graphs. 162-170 - Pavol Kollár, Martin Macaj:
Upper Bounds and Probability Heuristic Estimates of $r$-Regular Families of Permutations. 171-179 - Nina Hronkovicová, Martin Macaj:
On Siamese Color Graphs. 180-189
Workshop on Applied Security (WAS 2024)
- Richard Ostertág, Martin Stanek:
Anomaly Detection in Certificate Transparency Logs. 190-196 - Martin Stanek:
Revisiting Monte Carlo Strength Evaluation. 197-202 - Richard Ostertág:
Enforcing Fresh Nonces with Affine Type System. 203-208 - Pavol Sokol, Sophia Petra Krisáková, Rastislav Krivos-Bellus:
Forensic Artifacts' Analysis using Graph Theory. 209-215 - Jaroslav Janácek:
A Bug in Linux ACL Implementation. 216-222 - Dusan Bernát, Matús Hluch:
Graph Models of Memory Access Traces. 223-225 - Daniela Chudá, Lukas Janik:
Enhancing Smartphone Security through Behavioral Biometrics-based Gestures. 226-228
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.