


default search action
Acta Cybernetica, Volume 26
Volume 26, Number 1, 2023
- Andreas Rauh
, Balázs Bánhelyi
:
Preface. 3 - Auguste Bourgois
, Amine Chaabouni, Andreas Rauh
, Luc Jaulin
:
Proving the Stability of the Rolling Navigation. 5-34 - Elena V. Chausova
:
The Inventory Control Problem for a Supply Chain With a Mixed Type of Demand Uncertainty. 35-52 - Tamás Dózsa
:
Inverses of Rational Functions. 53-69 - Takehiko Kinoshita
, Yoshitaka Watanabe
, Mitsuhiro T. Nakao
:
On Some Convergence Properties for Finite Element Approximations to the Inverse of Linear Elliptic Operators. 71-82 - Matyás Lorenc
:
B π R -Matrices, B-Matrices, and Doubly B-Matrices in the Interval Setting. 83-103 - Andreas Rauh
, Rachid Malti
:
Quantification of Time-Domain Truncation Errors for the Reinitialization of Fractional Integrators. 105-128 - Nathalie Revol
:
Affine Iterations and Wrapping Effect: Various Approaches. 129-147
Volume 26, Number 2, November 2022
- Shajulin Benedict
:
EA-POT: An Explainable AI Assisted Blockchain Framework for HoneyPot IP Predictions. 149-173 - Attila Klenik
, András Pataricza
:
Adding Semantics to Measurements: Ontology-Guided, Systematic Performance Analysis. 175-213 - Reza Fuad Rachmadi
, I Ketut Eddy Purnama
, Supeno Mardi Susiki Nugroho
, Yoyon Kusnendar Suprapto
:
Dual Convolutional Neural Network Classifier with Pyramid Attention Network for Image-Based Kinship Verification. 215-241 - Gábor Rácz
, Attila Sali
, Klaus-Dieter Schewe
:
Refined Fuzzy Profile Matching. 243-266 - Andreas Rauh
, Auguste Bourgois
, Luc Jaulin
:
Verifying Provable Stability Domains for Discrete-Time Systems Using Ellipsoidal State Enclosures. 267-291
Volume 26, Number 3, 2024
- Modafar Al-Shouha
, Gábor Szücs
:
Single and Combined Algorithms for Open Set Classification on Image Datasets. 297-322 - Amirreza Bagheri
, Péter Hegedüs
:
Towards a Block-Level ML-Based Python Vulnerability Detection Tool. 323-371 - Péter Bereczky
, Dániel Horpácsi
, Simon J. Thompson
:
A Formalisation of Core Erlang, a Concurrent Actor Language. 373-404 - Zsófia Erdei
, Melinda Tóth
, István Bozó
:
Identifying Concurrent Behaviours in Erlang Legacy Systems. 405-429 - Anett Fekete
, Zoltán Porkoláb
:
Using Version Control Information to Visualize Developers' Knowledge. 431-454 - Hussein Ali Ahmed Ghanim
, László Kovács
:
Ontology Supported Domain Knowledge Module for E-Tutoring System. 455-474 - Emília Heinc
, Balázs Bánhelyi
:
Comparing Structural Constraints for Accelerated Branch and Bound Solver of Process Network Synthesis Problems. 475-499 - Zoltán Richárd Jánki
, Vilmos Bilicki
:
Standardized Telemedicine Software Development Kit with Hybrid Cloud Support. 501-528 - Mátyás Kiglics
, Gábor Valasek
, Csaba Bálint
, Róbert Bán
:
Quadratic Displacement Maps for Heightmap Rendering. 529-542 - Grácián Kokrehel
, Vilmos Bilicki
:
The Influence of the Nonfunctional Requirements on the Data Model. 543-562 - Gergely Kovásznai
, Mohammed Ridha Nsaif
:
Integer Programming Based Optimization of Power Consumption for Data Center Networks. 563-579 - Dániel Lukács
, Máté Tejfel
:
Overlaying Control Flow Graphs on P4 Syntax Trees with Gremlin. 593-619 - Ágoston Sipos
:
Corner-Based Implicit Patches. 621-636 - Zoltán Szabó
, Emoke Adrienn Hompoth
, Vilmos Bilicki
:
Patient Flow Analysis with a Custom Simulation Engine. 637-669 - Dániel Szekeres
, István Majzik
:
Towards Abstraction-based Probabilistic Program Analysis. 671-711 - Kristóf Umann
, Gábor Horváth
, Zoltán Porkoláb
:
Uncovering Hidden Dependencies: Constructing Intelligible Path Witnesses using Dataflow Analyses. 713-747
Volume 26, Number 4, 2024
- Julien Alexandre Dit Sandretto
, Alexandre Chapoutot
, Christophe Garion
, Xavier Thirioux
:
A Constraint Programming Approach for Polytopic Simulation of Ordinary Differential Equations. 755-774 - Ekaterina Auer
, Andreas Ahrens
:
Verified Bit and Power Allocation for MIMO Systems: A Comparison of SVD Based Techniques With GMD. 775-798 - Oussama Benzinane
, Andreas Rauh
:
Robust Control and Actuator Fault Detection Based on an Iterative LMI Approach: Application on a Quadrotor. 799-816 - Pierre Filiol, Théotime Bollengier
, Luc Jaulin
, Jean-Christophe Le Lann
:
A New Interval Arithmetic to Generate the Complementary of Contractors. 817-838 - Mohamed Fnadi
, Andreas Rauh
:
Exponential State Enclosure Techniques for the Implementation of Validated Model Predictive Control. 839-854 - Marit Lahme
, Andreas Rauh
:
Set-Valued Approach for the Online Identification of the Open-Circuit Voltage of Lithium-Ion Batteries. 855-869 - Simon Rohou
, Benoît Desrochers, Fabrice Le Bars
:
The Codac Library. 871-887 - Pierre Filiol
, Théotime Bollengier
, Luc Jaulin
, Jean-Christophe Le Lann
:
RISC-V Based Hardware Acceleration of Interval Contractor Primitives in the Context of Mobile Robotics. 889-912 - Lorenz Gillner
, Ekaterina Auer
:
GPU-Accelerated, Interval-Based Parameter Identification Methods Illustrated Using the Two-Compartment Problem. 913-932 - Luc Jaulin
:
Asymptotically Minimal Contractors Based on the Centered Form. 933-954

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.