Author of the publication

Development of a Novel Semantic-Based System Integration Framework.

, , , , and . ECBS-EERC, page 18-24. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bilicki, Vilmos
add a person with the name Bilicki, Vilmos
 

Other publications of authors with the same name

Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat., and . SSS, volume 5873 of Lecture Notes in Computer Science, page 399-412. Springer, (2009)Access Control of EHR Records in a Heterogeneous Cloud Infrastructure., and . Acta Cybern., 25 (2): 485-516 (2021)Modeling Network-Level Impacts of P2P Flows., , and . PDP, page 590-594. IEEE Computer Society, (2011)Wlab of University of Szeged at ImageCLEF 2014 Plant Identification Task., , , , and . CLEF (Working Notes), volume 1180 of CEUR Workshop Proceedings, page 685-692. CEUR-WS.org, (2014)Scalable Stealth Mode P2P Overlays of Very Small Constant Degree., and . TAAS, 6 (4): 27:1-27:20 (2011)Detection of Respiratory Effort-Related Arousals Using a Hidden Markov Model and Random Decision Forest., , and . CinC, page 1-5. www.cinc.org, (2018)Stunner: A Smart Phone Trace for Developing Decentralized Edge Systems., , , , and . DAIS, volume 11534 of Lecture Notes in Computer Science, page 108-115. Springer, (2019)Taxonomy for Trade-off Problem in Distributed Telemedicine Systems., and . Acta Cybern., 25 (2): 285-306 (2021)Defining and understanding smartphone churn over the internet: A measurement study., , and . P2P, page 1-5. IEEE, (2014)Towards Automated Detection of Peer-to-Peer Botnets: On the Limits of Local Approaches., and . LEET, USENIX Association, (2009)