National Repository of Grey Literature 50 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
VR Interactive Application
Novotný, Miroslav ; Tóth, Michal (referee) ; Milet, Tomáš (advisor)
The goal of this thesis is to learn about virtual reality and the aspects of the development for this platform. The next goal is to find well suited development environment for the application and test the capabilities and limits of them both. The thesis will be completed by designing, implementing and then testing the aplication using knowledge learnt.  
The Application of the Project Management to the Approval Process of a New Product
Zavadilová, Veronika ; Novotný, Miroslav (referee) ; Smolíková, Lenka (advisor)
The master thesis deals with the application of the methodology of project management in a business case in the company Meopta - optika, s.r.o. following the product life cycle. After the company’s analysis, it evaluates the real project management solution focusing on the critical sides of project. The last chapter specifies solutions for effective project management and risk elimination.
Parsing Based on State Grammars
Novotný, Miroslav ; Kocman, Radim (referee) ; Meduna, Alexandr (advisor)
This thesis's main focus is parsing, based on state grammars. The goal is to create a program, that will be able to load the grammar from input file. Based on a loaded grammar, the program will create an LL table and parse an input file using this table. The next goal is to study properties of parsing, based on state grammars, while using a created program as a stand point. Part of the testing will also be grammar structures which are not context-free.
Trust Management Systems in P2P Networks
Novotný, Miroslav ; Zavoral, Filip (advisor) ; Janeček, Jan (referee) ; Fujita, Satoshi (referee)
The architecture of certain class of services, such as distributed computing, distributed storages or content delivering networks shifts from the traditional client-server model to more scalable and robust peer to peer networks. Providing proper protection to such complex, open and anonymous systems is very complicated. Malicious peers can cooperate and develop sophisticated strategies to bypass existing security mechanisms. Recently, many trust management systems for P2P networks have been proposed. However, their effectiveness is usually tested only against simple malicious strategies. Moreover, a complex comparison of resistance of a particular method is missing. In this thesis, we (1) propose a new trust management system called BubbleTrust and (2) develop a simulation framework for testing trust management systems against various malicious strategies. Our simulation framework defines several criteria which determine the success of each malicious strategy in the network with a given system. We present results of four trust management systems that represent main contemporary approaches and BubbleTrust.
Distributed containers
Hraška, Adam ; Zavoral, Filip (advisor) ; Novotný, Miroslav (referee)
Distributed hash tables provide similar functionality to ordinary hash tables but they distribute stored data across a self-organized peer-to-peer network. In this thesis we explore the various challenges DHTs must face and we also examine the algorithms used to overcome them. We focus on key location algorithms as well as the data maintenance strategies. Furthermore, the thesis also includes a flexible and simple-to-use implementation of a DHT. The DHT is based on a set of algorithms which we believe provide good balance between performance and bandwidth usage. The implemented DHT may form the basis of a large-scale decentralized application. However, practical deployment of the DHT on hundreds of nodes and evaluation of the performance of the implemented DHT in such a deployment is outside the scope of this thesis.
Accounting software for OS X
Váša, Kryštof ; Novotný, Miroslav (advisor) ; Klímek, Jakub (referee)
This work implements a tax management application target primarily for the MacOS X platform. It focuses on a user-friendly interface and supports custom invoice printing, printing of income, expense, VAT overviews. It includes modules for invoicing, cataloguing bank statements, has a Cashier module, a modules to keep track of your business trips, storage, it supports both import and export of the records. It is targeted for smaller businesses and tradesmen. It is not meant to be used by professional accountants. The core is written in C++, the UI in Objective-C (framework Cocoa), hence it runs natively on MacOS X.
Distributed computing
Šišaj, Róbert ; Dvořák, Zdeněk (advisor) ; Novotný, Miroslav (referee)
The aim of this work is creating a system for distributed computing in smaller LAN networks. The system should provide a platform for various applications, which will be able to run parallel processing of computationally expensive tasks (e.g. searching for prime numbers, rendering video sequences, editing photographs, ...). The reader will learn about distributed systems, about their advantages and disadvantages and will get knowledge of definitions and key words from this area. The work also makes a comparison of this system and a few existing systems (SETI@home, distributed.net). An analysis of weak parts of the proposed system is included in this paper and also some ideas and thoughts on some improvements of the system in the future.
Methods and possibilities of anonymous communication
Tomisová, Martina ; Beneš, Antonín (advisor) ; Novotný, Miroslav (referee)
The thesis discusses communication methods which provide anonymity to their participants. Basic concepts such as the concept of anonymity are explained in the first part of the thesis. Well known and practically used communication methods and their evaluation techniques are described together with suggestions of a few new methods. The thesis covers both methods that can be called as almost purely theoretical, which can be hardly implemented in the real world, and methods that are widely used in the today's networks. Each method is firstly explained and then evaluated from various aspects of security with regards to the confidentiality of the identity of the users to its practicality and feasibility. Both the possibilities of the attackers and the victims are examined. Last parts of the thesis is devoted to the techniques of evaluation of the communication methods. This problem is nontrivial since the methods differ from each other quite much and hence it is hard to find metrics that would match them all. Such a general metric is not invented in the thesis, at least not a computationally simple one. The conclusion of the thesis attempts to summarize the possibilities and limits of anonymous communication and its evaluation.
Web-based interface for software project management with emphasis to manpower administration
Täuber, Jiří ; Bureš, Tomáš (advisor) ; Novotný, Miroslav (referee)
There are many different aplications which help with project management nowdays. Project management applications differ considerably in their options, capabilities and most of all in their area of focus. Applications focused on coordinating work of group of people are among them. There are also many webpages that give their users the means to offer or request workforce. It is surprising that nobody has thought about bringing those two ideas together. It offers significant flexibility, especially in the area of software development. Workgroups can be easily created and disbanded as needed. The goal of this project is to create a simple web application which will provide dynamic environment for easy collaboration of many users on many projects. Part of the project will be a very simple project management software focused on manpower administration as well as a place to publish workforce supply and demmand advertisements.
Bezpečnostní auditor WWW stránek
Steinhauser, Antonín ; Novotný, Miroslav (advisor) ; Kruliš, Martin (referee)
This work solves the problematics of web pages security primarily from the side of dynamic web application programmers. It describes single mistakes, that programmers perpetrate and declares, how is possible prevent these mistakes and what unpleasant possibilities of abuse these mistakes offer to potential attackers. The main part of the work is the program, which machinely searches majority of those errors. It functions in two phases - in the rst phase it explores a domain or alternatively de ned set of pages and detects potentially vulnerable locations and in the second phase it sends attack queries to these locations and by analysis of its replies detects security vulnerabilities.

National Repository of Grey Literature : 50 records found   1 - 10nextend  jump to record:
See also: similar author names
37 NOVOTNÝ, Marek
32 NOVOTNÝ, Martin
22 NOVOTNÝ, Matěj
5 NOVOTNÝ, Michael
56 NOVOTNÝ, Michal
8 NOVOTNÝ, Milan
1 Novotný, M.
37 Novotný, Marek
32 Novotný, Martin
4 Novotný, Matouš
22 Novotný, Matěj
4 Novotný, Maximilián
5 Novotný, Michael
56 Novotný, Michal
3 Novotný, Mikuláš
8 Novotný, Milan
1 Novotný, Milan Bc.
9 Novotný, Miloslav
1 Novotný, Miloš
1 Novotný, Mirek
18 Novotný, Miroslav
2 Novotný, Miroslav,
Interested in being notified about new results for this query?
Subscribe to the RSS feed.