National Repository of Grey Literature 8 records found  Search took 0.01 seconds. 
Cryptography and Its Application in Secure Data-File Transfer
Pop, Tomáš ; Spoustová, Johanka (advisor) ; Spousta, Miroslav (referee)
In the present work we study applied cryptography. . . The goal of this work is not to study algorithms from the mathematical or statistical view, instead we are trying to look at cryptography from a poin of view of the "end consumer or "programmmer. It should help the reader to find an appropriate algorithm for his program. The application on the end of the work is written to as readable as possible.
Pasivní monitorování spojení v IP sítích
Veselý, Ján ; Spousta, Miroslav (advisor) ; Spoustová, Johanka (referee)
In the presented work we examine the possibility of real-time network data analysis. A proof-of-concept application is designed and implemented. The application captures network traffic and filters out the most common transport protocols - TCP and UDP. The application is able to use provided plugins for analysing DNS and HTTP application layer protocols. The application is extensible in the means of the protocol support and packet capture mechanism. Captured data are analysed in the real-time and the results are presented in a user-friendly way.
Classification of document contents
Major, Martin ; Mareš, Martin (advisor) ; Spoustová, Johanka (referee)
This paper deals with automatic classification of text documents, showing advantages of the classification as well as showing difficulty during implementation. It presents several methods in detail, based on analysis of document linking and bayesian filtering. Part of the task is testing on real web pages which should demonstrate the quality of the specific verification methods used.
Software for Bidirectional Sequence Classification
Katuščák, Slavomír ; Raab, Jan (advisor) ; Spoustová, Johanka (referee)
The goal of this master thesis was to implement algorithm for bidirectional classifi cation of sequences described in article of Libin Shen and col. This work builds on implementation and experimental project Mor ce, morphological tagger based on hidden Markov model with averaged perceptron and on Jan Raab's master thesis, which goal was to implement Viterbi's algorithm and nd best possible set of features for it. This work o ers Shen's algorithm as alternative to Viterbi's algorithm. Limitation of Viterbi's algorithm is in its one-way direction, selection of tag on some position can depend on some already done decisions, but only on preceeding positions. This can cause selection of suboptimal candidate and regression of analyser accuracy. This work implements algorithm, that works bidirectionally and can use already done decisions from both sides of current position, keeping tolerable complexity.
Classification of document contents
Major, Martin ; Spoustová, Johanka (referee) ; Mareš, Martin (advisor)
This paper deals with automatic classification of text documents, showing advantages of the classification as well as showing difficulty during implementation. It presents several methods in detail, based on analysis of document linking and bayesian filtering. Part of the task is testing on real web pages which should demonstrate the quality of the specific verification methods used.
Pasivní monitorování spojení v IP sítích
Veselý, Ján ; Spoustová, Johanka (referee) ; Spousta, Miroslav (advisor)
In the presented work we examine the possibility of real-time network data analysis. A proof-of-concept application is designed and implemented. The application captures network traffic and filters out the most common transport protocols - TCP and UDP. The application is able to use provided plugins for analysing DNS and HTTP application layer protocols. The application is extensible in the means of the protocol support and packet capture mechanism. Captured data are analysed in the real-time and the results are presented in a user-friendly way.
Software for Bidirectional Sequence Classification
Katuščák, Slavomír ; Raab, Jan (advisor) ; Spoustová, Johanka (referee)
The goal of this master thesis was to implement algorithm for bidirectional classifi cation of sequences described in article of Libin Shen and col. This work builds on implementation and experimental project Mor ce, morphological tagger based on hidden Markov model with averaged perceptron and on Jan Raab's master thesis, which goal was to implement Viterbi's algorithm and nd best possible set of features for it. This work o ers Shen's algorithm as alternative to Viterbi's algorithm. Limitation of Viterbi's algorithm is in its one-way direction, selection of tag on some position can depend on some already done decisions, but only on preceeding positions. This can cause selection of suboptimal candidate and regression of analyser accuracy. This work implements algorithm, that works bidirectionally and can use already done decisions from both sides of current position, keeping tolerable complexity.
Cryptography and Its Application in Secure Data-File Transfer
Pop, Tomáš ; Spoustová, Johanka (advisor) ; Spousta, Miroslav (referee)
In the present work we study applied cryptography. . . The goal of this work is not to study algorithms from the mathematical or statistical view, instead we are trying to look at cryptography from a poin of view of the "end consumer or "programmmer. It should help the reader to find an appropriate algorithm for his program. The application on the end of the work is written to as readable as possible.

See also: similar author names
1 Spoustová, Jaroslava
2 Spoustová, Jitka
Interested in being notified about new results for this query?
Subscribe to the RSS feed.