default search action
Vaclav Zeman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i1]Agnieszka Lawrynowicz, Luis Galárraga, Mehwish Alam, Berenice Jaulmes, Vaclav Zeman, Tomás Kliegr:
Neurosymbolic Methods for Rule Mining. CoRR abs/2408.05773 (2024) - 2021
- [j4]Václav Zeman, Tomás Kliegr, Vojtech Svátek:
RDFRules: Making RDF rule mining easier and even more efficient. Semantic Web 12(4): 569-602 (2021)
2010 – 2019
- 2018
- [j3]Stanislav Vojír, Vaclav Zeman, Jaroslav Kuchar, Tomás Kliegr:
EasyMiner.eu: Web framework for interpretable machine learning based on rules and frequent itemsets. Knowl. Based Syst. 150: 111-115 (2018) - [c26]Petr Cika, Stepan Grabovsky, Vaclav Zeman, Vlastimil Clupek:
Network Emulator of Transmission Parameters of Data Networks. ICUMT 2018: 1-6 - [c25]Stepan Grabovsky, Petr Cika, Vaclav Zeman, Vlastimil Clupek, Milan Svehlak, Jan Klimes:
Denial of Service Attack Generator in Apache JMeter. ICUMT 2018: 1-4 - [c24]Vaclav Zeman, Tomás Kliegr, Vojtech Svátek:
RdfRules Preview: Towards an Analytics Engine for Rule Mining in RDF Knowledge Graphs. RuleML+RR (Supplement) 2018 - 2017
- [c23]Tomás Kliegr, Jaroslav Kuchar, Stanislav Vojír, Václav Zeman:
EasyMiner - Short History of Research and Current Development. ITAT 2017: 235-239 - [c22]Stanislav Vojír, Vaclav Zeman, Jaroslav Kuchar, Tomás Kliegr:
Using EasyMiner API for Financial Data Analysis in the OpenBudgets.eu Project. RuleML+RR (Supplement) 2017 - 2016
- [j2]Lukas Malina, Jan Hajny, Vaclav Zeman:
Light-weight group signatures with time-bound membership. Secur. Commun. Networks 9(7): 599-612 (2016) - [c21]Petar Ristoski, Heiko Paulheim, Vojtech Svátek, Vaclav Zeman:
The Linked Data Mining Challenge 2016. (KNOW@LOD/CoDeS)@ESWC 2016 - [c20]Jindrich Mynarz, Vaclav Zeman:
DB-quiz: a DBpedia-backed knowledge game. SEMANTiCS 2016: 121-124 - [c19]Vlastimil Clupek, Vaclav Zeman:
Robust mutual authentication and secure transmission of information on low-cost devices using Physical unclonable functions and Hash functions. TSP 2016: 100-103 - 2015
- [c18]Petar Ristoski, Heiko Paulheim, Vojtech Svátek, Vaclav Zeman:
The Linked Data Mining Challenge 2015. KNOW@LOD 2015 - [c17]Stanislav Vojír, Vaclav Zeman, Jaroslav Kuchar, Tomás Kliegr:
EasyMiner/R Preview: Towards a Web Interface for Association Rule Learning and Classification in R. Challenge+DC@RuleML 2015 - [c16]Petr Dzurenda, Jan Hajny, Vaclav Zeman, Kamil Vrba:
Modern physical access control systems and privacy protection. TSP 2015: 1-5 - [c15]Lukas Malina, Jan Hajny, Vaclav Zeman, Kamil Vrba:
Security and privacy in the smart grid services. TSP 2015: 71-75 - [c14]Vlastimil Clupek, Vaclav Zeman:
Unilateral authentication on low-cost devices. TSP 2015: 88-92 - [c13]Jan Hajny, Petr Dzurenda, Lukas Malina, Vaclav Zeman:
Cryptography for privacy-preserving electronic services. TSP 2015: 596-600 - [c12]Lukas Malina, Jan Hajny, Vaclav Zeman:
Usability of pairing-based cryptography on smartphones. TSP 2015: 617-621 - [c11]Vlastimil Clupek, Lukas Malina, Vaclav Zeman:
Secure digital archiving in post-quantum era. TSP 2015: 622-626 - [c10]Zdenek Martinasek, Lukas Malina, Vaclav Zeman:
Scalable authentication for integration server. TSP 2015: 632-636 - 2013
- [c9]Lukas Malina, Vlastimil Clupek, Zdenek Martinasek, Jan Hajny, Kimio Oguchi, Vaclav Zeman:
Evaluation of Software-Oriented Block Ciphers on Smartphones. FPS 2013: 353-368 - [c8]Jan Hajny, Lukas Malina, Zdenek Martinasek, Vaclav Zeman:
Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks. SECRYPT 2013: 267-274 - [c7]Lukas Malina, Jan Hajny, Vaclav Zeman:
Trade-off between signature aggregation and batch verification. TSP 2013: 57-61 - 2012
- [c6]Lukas Malina, Jan Hajny, Vaclav Zeman:
Group signatures for secure and privacy preserving vehicular ad hoc networks. Q2SWinet 2012: 71-74 - 2011
- [j1]Jan Hajny, Vaclav Zeman:
Anonymous Authentication with Spread Revelation. Cryptologia 35(3): 235-246 (2011) - [c5]Jan Hajny, Lukas Malina, Vaclav Zeman:
Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use. SECRYPT 2011: 405-408 - [c4]Jiri Sobotka, Vaclav Zeman:
Application of FMEA procedure for ALU unit testing. TSP 2011: 428-432 - 2010
- [c3]Jan Hajny, Tomas Pelka, Vaclav Zeman:
Privacy Protection for user Authentication. SECRYPT 2010: 90-93
2000 – 2009
- 2005
- [c2]Lubomir Cvrk, Vaclav Zeman, Dan Komosny:
H.323 Client-Independent Security Approach. ICN (2) 2005: 673-680 - 2000
- [c1]Daniel Becvar, Kamil Vrba, Vaclav Zeman, Vladislav Musil:
Novel universal active block: a universal current conveyor. ISCAS 2000: 471-474
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-19 00:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint