Building Vector Representations for Candidates and Projects in a CV Recommender System
Candidate Classification and Skill Recommendation in a CV Recommender System
Population-Based Variable Neighborhood Descent for Discrete Optimization
GRASP Method for Vehicle Routing with Delivery Place Selection
Efficient Multi-user Service Selection Based on the Transportation Problem
Multi-User Service Selection
Real-time adaptive QoS prediction using approximate matrix multiplication
Efficient Web Service Reliability Prediction Using Collaborative Filtering
Component Recommendation for Composite Application Development
Prediction of Atomic Web Services Reliability for QoS-aware Recommendation
A preliminary study on similarity-preserving digital book identifiers
Designing the programming assignment for a university compiler design course
Consumerized and Peer-tutored Service Composition
Performance Evaluation of Websocket Protocol for Implementation of Full-Duplex Web Streams
A Reliability Improvement Method for SOA-Based Applications
Scalable and Accurate Prediction of Availability of Atomic Web Services
Introduction to Consumer Computing
Erl-metafeed: web feeds mashup engine and GUI widget toolkit
Prediction of atomic web services reliability based on k-means clustering
Formal Model for Data Dependency Analysis between Controls and Actions of a Graphical User Interface
Application of widget-based consumer programming techniques in autonomous marine vehicle control system design
Hashing Scheme for Space-efficient Detection and Localization of Changes in Large Data Sets
Programming Languages for End-User Personalization of Cyber-Physical Systems
Reliability Modeling for SOA Systems
Consumer-Oriented Programming Application for Statistical Processing
Integration Proxy for Distributed Healthcare Systems
Automated Distribution of Short Lived Certificates in Grid-based Environments
Integration Proxy for Distributed Healthcare Systems
Distributed Document Management System
Interconnectable Gadgets and Web Services Usage in Supervisory Control of Unmanned Underwater Vehicles
Programming Language Design for Event-Driven Service Composition
Widget-Oriented Consumer Programming
Security of Web Level User Identity Management
Event-Driven Consumer Programming
Geppeto: Consumer's Approach to Programming
Geppeto: Promoting End-users to Gadget Developers
From Service Composition to Gadget Composition: Enabling Process-oriented Web
RegExpert: A Tool for Visualization of Regular Expressions
Usage Tracking Components for Service-Oriented Middleware Systems
Virtual Network for Development and Execution of Service-Oriented Applications
Programming language translation
Introduction to theory of computing
Programmable Internet Environment
Access control in service oriented systems
Service discovery and deployment in service-oriented systems
Korisnički jezik programskog modela zasnovanog na uslugama
End-User Programming Language for Service-Oriented Integration
Distributed Program Interpretation in Service Oriented Architectures
Performance Evaluation of Program Translation in Service-Oriented Architectures
PIE: End-User Programmable Internet Environment
Building Distributed Access Control Using Service- Oriented Programming Model
Virtual Network of Service-Oriented Computing Systems
Coopetition mechanisms for service-oriented distributed systems
Access control in hierarchies of protected cells
PIE – Programmable Internet Environment
Application-level quality of security service provisioning in distributed service-oriented middleware
Service discovery and deployment in service-oriented computing environment
Distributed program interpretation in service-oriented architectures
Service Load Balancing in Public Information System
Tentacle: User Agent of the Public Information System Mediator
Usage Tracking by Public Information System Mediator
Dynamic Load Management in the Public Information System Mediator
Service Development and Application Integration with Public Information System Mediator
Designing Scalable Storage System for Application Oriented Middleware – MidArc
Data Management in Public Information System Middleware
Common Services of Middleware System in Internet Global Network
Distributed System for Lawful Interception in VoIP Networks
Methods for Lawful Interception in IP Telephony Networks Based on H.323
Distributed Applications in Public Information System
Performance Evaluation of Distributed Object Platforms for Public Information System Implementation
Extending the Textbook: A Distributed Tool for Learning Automata Theory Fundamentals
Analytical Performance Prediction of WWW Distributed Cache Management (DCM) Protocols
Application Middleware: A Case Study
Distributed Cache Management Protocol
Formal Definition of SIP Proxy Behavior
Design of High-speed and Flexible Controllers in Programmable Logic Devices
Decision Function in Hybrid Self-Adaptive WWW Cache Coherence Protocol (hSATTL)
Hybrid Self-Adaptive WWW Cache Coherence Protocol (hsATTL): Improving the Coherence of WWW Objects
Using Interactivity in Computer-facilitated Learning for Efficient Comprehension of Mathematical Abstractions
Formal Definition of SIP End Systems Behavior
Directory Based Multi-tier Internet Architectures
Self-Adaptive WWW Cache Coherence Protocol (SATTL)
Performance of UDP and TCP Communication on Personal Computers
Performance Tuning of Large-Scale Distributed WWW Caches
Internet today and tomorrow
Distributed architecture of information computer system based on Internet
SpecC Profiler
Time Domain Performance Evaluation of Adaptive Hybrid Cache Coherence Protocols
The NUMAchine Multiprocessor
Performance of Distributed Systems Based on Ethernet and Personal Computers
Design and Implementation of the NUMAchine Multiprocessor
The NUMAChine Multiprocessor: A Cache Coherence Protocol
AT&T GeoPlex Directory Based Distributed Cache Management Protocol: Boosting the Scalability of World Wide Web Proxy Caches
Analytical Prediction of Performance for Cache Coherence Protocols
Memory Management and Cache Coherency
Hierarchical Directory Controllers in the NUMAchine Multiprocessor
Models for Performance Prediction of Coherence Protocols
An Adaptive Coherence Protocol Using Write Invalidate and Write Update Mechanisms
Experience in Designing a Large-scale Multiprocessor using Field-Programming Devices and Advanced CAD Tolls
Performance Prediction for Different Consistency Schemes in Distributed Shared Memory Systems
An Overview of the NUMAchine Multiprocessor Project
Analytical Performance Evaluation of Data Replication Based Shared Memory Model
Modification of Cache Coherence Protocols for the Distributed Environment
Syntax Analysis of Sequential Control Programs
Feasibility Study of Computer Systems For Lathe And Similar Machining Centers
A Dynamic Interpreter for Sequential Control Programs
Disk-drive microprocessor module design within machine tool control unit
Specialized Operating System for Machine Tool Control Unit
Competences
-
Computational and artificial intelligence
Artificial intelligence Affective computing Autonomous robots Cognitive systems Context awareness Cooperative systems Decision support systems Intelligent systems Autonomous systems Collective intelligence Intelligent robots Knowledge based systems Expert systems Mobile agents Knowledge engineering Inference mechanisms Knowledge acquisition Knowledge discovery Knowledge representation Learning (artificial intelligence) Distance learning Electronic learning Nearest neighbor methods Learning systems Backpropagation Cognitive systems Learning automata Learning management systems Semisupervised learning Supervised learning Unsupervised learning Machine learning Boosting Dimensionality reduction Robot learning Statistical learning Prediction methods Linear predictive coding Predictive coding Predictive encoding Predictive models Virtual artifact Autonomous mental development Computational intelligence Computation theory Computational complexity Concurrent computing Greedy algorithms Support vector machines Evolutionary computation Evolutionary robotics Particle swarm optimization Fuzzy systems Fuzzy control Fuzzy neural networks Hybrid intelligent systems Genetic algorithms Logic Fuzzy logic Fuzzy cognitive maps Takagi-Sugeno model Multivalued logic Probabilistic logic Sufficient conditions Machine intelligence Pattern analysis Neural networks Artificial neural networks Convolutional neural networks Hebbian theory Self-organizing feature maps Biological neural networks Cellular neural networks Feedforward neural networks Multilayer perceptrons Multi-layer neural network Neural network hardware Radial basis function networks Recurrent neural networks Hopfield neural networks -
Computers and information processing
Approximate computing Computer applications Application virtualization Edge computing Big Data applications Bot (Internet) Computer aided analysis Computer aided engineering Computer aided instruction Learning management systems Computer generated music Computer integrated manufacturing Control engineering computing Green computing High energy physics instrumentation computing Linear particle accelerator Knowledge management Knowledge transfer Mathematics computing Matlab Medical information systems Electronic medical records Military computing Mobile applications Physics computing Power engineering computing Power system analysis computing Publishing Bibliometrics Company reports Desktop publishing Electronic publishing Open Access Scientific publishing Scientific computing Telecommunication computing Internetworking Soft switching Virtual enterprises Virtual manufacturing Virtual machining Web sites Facebook MySpace Uniform resource locators Web design YouTube World Wide Web Bot (Internet) Mashups Computer architecture Accelerator architectures Data structures Arrays Binary decision diagrams Null value Octrees Persistent identifiers Table lookup Tree data structures Dynamic voltage scaling Memory architecture Memory management Multiprocessor interconnection Hypercubes Parallel architectures Multicore processing Reconfigurable architectures Computer interfaces Application programming interfaces WebRTC Browsers Field buses Firewire Haptic interfaces Data gloves Force feedback Grasping Hypertext systems Input devices Interface phenomena Network interfaces Interface states Musical instrument digital interfaces Ports (Computers) System buses Computer networks Ad hoc networks AODV Mesh networks Mobile ad hoc networks Vehicular ad hoc networks Computer network management Computer network reliability Disruption tolerant networking Management information base Middleboxes Network address translation Network synthesis Content distribution networks Cyberspace Diffserv networks Domain Name System Ethernet Energy efficient ethernet EPON Google Heterogeneous networks Internet Bot (Internet) Botnet Crowdsourcing Instant messaging Internet of Things Internet security Internet telephony Internet topology Linked data Middleboxes Semantic Web Social computing Web 2.0 Web services Intserv networks IP networks TCPIP Metropolitan area networks Multiprocessor interconnection networks Network function virtualization Network security Network servers Next generation networking Overlay networks Peer-to-peer computing Software defined networking Storage area networks Token networks Unicast Virtual private networks Extranets Wide area networks Wireless access points Computer performance Computer errors Computer crashes Performance loss Computer peripherals Disk drives Keyboards Modems Printers Computer science Computational neuroscience Formal languages Computer languages Runtime library Network theory (graphs) Programming Augmented reality Automatic programming Concatenated codes Functional programming Granular computing Integer linear programming Logic programming Microprogramming Object oriented methods Object oriented programming Opportunistic software systems development Parallel programming Performance analysis Programming profession Robot programming Computer security Application security Authentication Cloud computing security Computer crime Counterfeiting Cyber terrorism Cyberattack SQL injection Computer hacking Countermeasures (computer) Cross-site scripting Cyber espionage Cyber warfare Cyberattack Data integrity Denial-of-service attack Distributed denial-of-service attack Firewalls (computing) Honey pot (computing) Identity management systems Internet security Mobile security Password Penetration testing Permission Phishing Computers Analog computers Calculators Difference engines Microcomputers Portable computers Workstations Parallel machines Supercomputers Tablet computers Wearable Computers Smart glasses Wearable computers Concurrency control Processor scheduling Scheduling algorithms Data systems Data acquisition Fastbus User-generated content Data centers Data compression Adaptive coding Audio compression Huffman coding Source coding Test data compression Transform coding Data conversion Analog-digital conversion Digital-analog conversion Data engineering Data handling Data assimilation Data dissemination Data encapsulation Data integrity Document handling Merging Sorting Data processing Associative processing Business data processing Data analysis Data collection Data integration Data preprocessing Data transfer Information exchange Spreadsheet programs Text processing Virtual enterprises Data storage systems Triples (Data structure) Data warehouses Database machines Digital systems Digital preservation Internet Bot (Internet) Botnet Crowdsourcing Instant messaging Internet of Things Internet security Internet telephony Internet topology Linked data Middleboxes Semantic Web Social computing Web 2.0 Web services ISDN B-ISDN Local area networks Wireless LAN Metropolitan area networks Token networks Virtual artifact Distributed computing Client-server systems Middleware Servers Collaborative work Collaborative intelligence Cooperative communication Crowdsourcing Social computing Diffserv networks Distributed databases Distributed information systems Distributed management Publish-subscribe Internet Bot (Internet) Botnet Crowdsourcing Instant messaging Internet of Things Internet security Internet telephony Internet topology Linked data Middleboxes Semantic Web Social computing Web 2.0 Web services Metacomputing Grid computing Peer-to-peer computing DNA computing File servers Hardware Input devices Open source hardware Reconfigurable devices Wireless access points High performance computing Image processing Active shape model Blob detection Corner detection Feature extraction Fiducial markers Geophysical image processing Gray-scale Image analysis Image classification Image motion analysis Image quality Image sequence analysis Image texture analysis Object detection Subtraction techniques Image annotation Image capture Image coding Image color analysis Image decomposition Image denoising Image enhancement Image filtering Image fusion Image generation Plasma displays Visual effects Image recognition Image edge detection Image reconstruction Image registration Image representation Image resolution High-resolution imaging Spatial resolution Image restoration Image sampling Image segmentation Image segmentaton Thresholding (Imaging) Image sequences Image texture Machine vision Object recognition Object segmentation Morphological operations Optical feedback Saliency detection Smart pixels Spatial coherence Structure from motion Table lookup Memory Analog memory Associative memory Buffer storage Computer buffers Cache memory Cache storage Content addressable storage Flash memories Flash memory cells Magnetic memory Floppy disks Hard disks Memory management Nonvolatile memory Nonvolatile single electron memory Phase change memory Phase change random access memory Random access memory DRAM chips Phase change random access memory Resistive RAM SDRAM SRAM cells SRAM chips Read only memory PROM Read-write memory Registers Shift registers Scanning probe data storage Semiconductor memory Mobile computing Wireless access points Molecular computing Multitasking Parametric study Open systems Open Access Public domain software Open Educational Resources Physical layer Physical layer security Optical computing Parallel processing Multiprocessing systems Data flow computing Processor scheduling Systolic arrays Multithreading Parallel algorithms Pipeline processing Pattern recognition Active shape model Activity recognition Character recognition Clustering methods Pattern clustering Data mining Anomaly detection Association rules Data privacy Text analysis Text mining Web mining Face recognition Fingerprint recognition Gesture recognition Sign language Handwriting recognition Forgery Nearest neighbor methods Pattern matching Image matching Speech recognition Automatic speech recognition Speech analysis Text recognition Pervasive computing Ubiquitous computing Context-aware services Wearable computers Petascale computing Platform virtualization Probabilistic computing Probability computing Quantum computing Quantum cellular automata Real-time systems Telexistence WebRTC Software Anti-virus software Application software Embedded software Invasive software Computer viruses Computer worms Middleware Mediation Message-oriented middleware Web services Open source software Optical character recognition software Public domain software Software agents Agent-based modeling Autonomous agents Botnet Intelligent agents Software as a service Software debugging Software design Software maintenance Software packages EMTDC PSCAD SPICE Software performance Software quality Software reusability Software safety Software systems Software tools Authoring systems System software File systems Operating systems Program processors Utility programs Software engineering Capability maturity model Computer aided software engineering Formal verification Programming environments Reasoning about programs Runtime Dynamic compiler Runtime environment Software architecture Client-server systems Microarchitecture Representational state transfer Software libraries Software product lines System recovery Checkpointing Core dumps Debugging Time sharing computer systems Virtual machine monitors -
Computational and artificial intelligence
Artificial intelligence Affective computing Autonomous robots Cognitive systems Context awareness Cooperative systems Decision support systems Intelligent systems Autonomous systems Collective intelligence Intelligent robots Knowledge based systems Expert systems Mobile agents Knowledge engineering Inference mechanisms Knowledge acquisition Knowledge discovery Knowledge representation Learning (artificial intelligence) Distance learning Electronic learning Nearest neighbor methods Learning systems Backpropagation Cognitive systems Learning automata Learning management systems Semisupervised learning Supervised learning Unsupervised learning Machine learning Boosting Dimensionality reduction Robot learning Statistical learning Prediction methods Linear predictive coding Predictive coding Predictive encoding Predictive models Virtual artifact Autonomous mental development Computational intelligence Computation theory Computational complexity Concurrent computing Greedy algorithms Support vector machines Evolutionary computation Evolutionary robotics Particle swarm optimization Fuzzy systems Fuzzy control Fuzzy neural networks Hybrid intelligent systems Genetic algorithms Logic Fuzzy logic Fuzzy cognitive maps Takagi-Sugeno model Multivalued logic Probabilistic logic Sufficient conditions Machine intelligence Pattern analysis Neural networks Artificial neural networks Convolutional neural networks Hebbian theory Self-organizing feature maps Biological neural networks Cellular neural networks Feedforward neural networks Multilayer perceptrons Multi-layer neural network Neural network hardware Radial basis function networks Recurrent neural networks Hopfield neural networks -
Computers and information processing
Approximate computing Computer applications Application virtualization Edge computing Big Data applications Bot (Internet) Computer aided analysis Computer aided engineering Computer aided instruction Learning management systems Computer generated music Computer integrated manufacturing Control engineering computing Green computing High energy physics instrumentation computing Linear particle accelerator Knowledge management Knowledge transfer Mathematics computing Matlab Medical information systems Electronic medical records Military computing Mobile applications Physics computing Power engineering computing Power system analysis computing Publishing Bibliometrics Company reports Desktop publishing Electronic publishing Open Access Scientific publishing Scientific computing Telecommunication computing Internetworking Soft switching Virtual enterprises Virtual manufacturing Virtual machining Web sites Facebook MySpace Uniform resource locators Web design YouTube World Wide Web Bot (Internet) Mashups Computer architecture Accelerator architectures Data structures Arrays Binary decision diagrams Null value Octrees Persistent identifiers Table lookup Tree data structures Dynamic voltage scaling Memory architecture Memory management Multiprocessor interconnection Hypercubes Parallel architectures Multicore processing Reconfigurable architectures Computer interfaces Application programming interfaces WebRTC Browsers Field buses Firewire Haptic interfaces Data gloves Force feedback Grasping Hypertext systems Input devices Interface phenomena Network interfaces Interface states Musical instrument digital interfaces Ports (Computers) System buses Computer networks Ad hoc networks AODV Mesh networks Mobile ad hoc networks Vehicular ad hoc networks Computer network management Computer network reliability Disruption tolerant networking Management information base Middleboxes Network address translation Network synthesis Content distribution networks Cyberspace Diffserv networks Domain Name System Ethernet Energy efficient ethernet EPON Google Heterogeneous networks Internet Bot (Internet) Botnet Crowdsourcing Instant messaging Internet of Things Internet security Internet telephony Internet topology Linked data Middleboxes Semantic Web Social computing Web 2.0 Web services Intserv networks IP networks TCPIP Metropolitan area networks Multiprocessor interconnection networks Network function virtualization Network security Network servers Next generation networking Overlay networks Peer-to-peer computing Software defined networking Storage area networks Token networks Unicast Virtual private networks Extranets Wide area networks Wireless access points Computer performance Computer errors Computer crashes Performance loss Computer peripherals Disk drives Keyboards Modems Printers Computer science Computational neuroscience Formal languages Computer languages Runtime library Network theory (graphs) Programming Augmented reality Automatic programming Concatenated codes Functional programming Granular computing Integer linear programming Logic programming Microprogramming Object oriented methods Object oriented programming Opportunistic software systems development Parallel programming Performance analysis Programming profession Robot programming Computer security Application security Authentication Cloud computing security Computer crime Counterfeiting Cyber terrorism Cyberattack SQL injection Computer hacking Countermeasures (computer) Cross-site scripting Cyber espionage Cyber warfare Cyberattack Data integrity Denial-of-service attack Distributed denial-of-service attack Firewalls (computing) Honey pot (computing) Identity management systems Internet security Mobile security Password Penetration testing Permission Phishing Computers Analog computers Calculators Difference engines Microcomputers Portable computers Workstations Parallel machines Supercomputers Tablet computers Wearable Computers Smart glasses Wearable computers Concurrency control Processor scheduling Scheduling algorithms Data systems Data acquisition Fastbus User-generated content Data centers Data compression Adaptive coding Audio compression Huffman coding Source coding Test data compression Transform coding Data conversion Analog-digital conversion Digital-analog conversion Data engineering Data handling Data assimilation Data dissemination Data encapsulation Data integrity Document handling Merging Sorting Data processing Associative processing Business data processing Data analysis Data collection Data integration Data preprocessing Data transfer Information exchange Spreadsheet programs Text processing Virtual enterprises Data storage systems Triples (Data structure) Data warehouses Database machines Digital systems Digital preservation Internet Bot (Internet) Botnet Crowdsourcing Instant messaging Internet of Things Internet security Internet telephony Internet topology Linked data Middleboxes Semantic Web Social computing Web 2.0 Web services ISDN B-ISDN Local area networks Wireless LAN Metropolitan area networks Token networks Virtual artifact Distributed computing Client-server systems Middleware Servers Collaborative work Collaborative intelligence Cooperative communication Crowdsourcing Social computing Diffserv networks Distributed databases Distributed information systems Distributed management Publish-subscribe Internet Bot (Internet) Botnet Crowdsourcing Instant messaging Internet of Things Internet security Internet telephony Internet topology Linked data Middleboxes Semantic Web Social computing Web 2.0 Web services Metacomputing Grid computing Peer-to-peer computing DNA computing File servers Hardware Input devices Open source hardware Reconfigurable devices Wireless access points High performance computing Image processing Active shape model Blob detection Corner detection Feature extraction Fiducial markers Geophysical image processing Gray-scale Image analysis Image classification Image motion analysis Image quality Image sequence analysis Image texture analysis Object detection Subtraction techniques Image annotation Image capture Image coding Image color analysis Image decomposition Image denoising Image enhancement Image filtering Image fusion Image generation Plasma displays Visual effects Image recognition Image edge detection Image reconstruction Image registration Image representation Image resolution High-resolution imaging Spatial resolution Image restoration Image sampling Image segmentation Image segmentaton Thresholding (Imaging) Image sequences Image texture Machine vision Object recognition Object segmentation Morphological operations Optical feedback Saliency detection Smart pixels Spatial coherence Structure from motion Table lookup Memory Analog memory Associative memory Buffer storage Computer buffers Cache memory Cache storage Content addressable storage Flash memories Flash memory cells Magnetic memory Floppy disks Hard disks Memory management Nonvolatile memory Nonvolatile single electron memory Phase change memory Phase change random access memory Random access memory DRAM chips Phase change random access memory Resistive RAM SDRAM SRAM cells SRAM chips Read only memory PROM Read-write memory Registers Shift registers Scanning probe data storage Semiconductor memory Mobile computing Wireless access points Molecular computing Multitasking Parametric study Open systems Open Access Public domain software Open Educational Resources Physical layer Physical layer security Optical computing Parallel processing Multiprocessing systems Data flow computing Processor scheduling Systolic arrays Multithreading Parallel algorithms Pipeline processing Pattern recognition Active shape model Activity recognition Character recognition Clustering methods Pattern clustering Data mining Anomaly detection Association rules Data privacy Text analysis Text mining Web mining Face recognition Fingerprint recognition Gesture recognition Sign language Handwriting recognition Forgery Nearest neighbor methods Pattern matching Image matching Speech recognition Automatic speech recognition Speech analysis Text recognition Pervasive computing Ubiquitous computing Context-aware services Wearable computers Petascale computing Platform virtualization Probabilistic computing Probability computing Quantum computing Quantum cellular automata Real-time systems Telexistence WebRTC Software Anti-virus software Application software Embedded software Invasive software Computer viruses Computer worms Middleware Mediation Message-oriented middleware Web services Open source software Optical character recognition software Public domain software Software agents Agent-based modeling Autonomous agents Botnet Intelligent agents Software as a service Software debugging Software design Software maintenance Software packages EMTDC PSCAD SPICE Software performance Software quality Software reusability Software safety Software systems Software tools Authoring systems System software File systems Operating systems Program processors Utility programs Software engineering Capability maturity model Computer aided software engineering Formal verification Programming environments Reasoning about programs Runtime Dynamic compiler Runtime environment Software architecture Client-server systems Microarchitecture Representational state transfer Software libraries Software product lines System recovery Checkpointing Core dumps Debugging Time sharing computer systems Virtual machine monitors
Pristupačnost