<?xml version="1.0"?>
<dblpperson name="Daniela Chud&#225;" pid="92/28" n="37">
<person key="homepages/92/28" mdate="2009-06-08">
<author pid="92/28">Daniela Chud&#225;</author>
</person>
<r><article key="journals/compsec/GoldschmidtC25" mdate="2025-07-04">
<author orcid="0000-0003-4872-1299" pid="296/0909">Patrik Goldschmidt</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Network intrusion datasets: A survey, limitations, and recommendations.</title>
<pages>104510</pages>
<year>2025</year>
<volume>156</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2025.104510</ee>
<url>db/journals/compsec/compsec156.html#GoldschmidtC25</url>
<stream>streams/journals/compsec</stream>
</article>
</r>
<r><inproceedings key="conf/IEEEares/MockoSC25" mdate="2025-09-11">
<author orcid="0000-0001-8982-0141" pid="243/3865">Martin Mocko</author>
<author orcid="0000-0002-6328-1335" pid="16/10715">Jakub Sevcech</author>
<author orcid="0000-0002-3873-9308" pid="92/28">Daniela Chud&#225;</author>
<title>Clustering Malware at Scale: A First Full-Benchmark Study.</title>
<pages>231-251</pages>
<year>2025</year>
<booktitle>ARES (2)</booktitle>
<ee>https://doi.org/10.1007/978-3-032-00627-1_12</ee>
<crossref>conf/IEEEares/2025-2</crossref>
<url>db/conf/IEEEares/ares2025-2.html#MockoSC25</url>
<stream>streams/conf/IEEEares</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/dighum/HrckovaRTCTS25" mdate="2026-03-28">
<author orcid="0000-0001-9312-6451" pid="295/6382">Andrea Hrckova</author>
<author orcid="0000-0002-2385-9470" pid="152/8567">Jennifer Renoux</author>
<author orcid="0000-0003-3057-6273" pid="32/403">Rafael Tolosana-Calasanz</author>
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="236/0255">Martin Tamajka</author>
<author orcid="0000-0003-0239-4237" pid="09/8578">Jakub Simko</author>
<title>AI Research Is Not Magic, It Has to Be Reproducible and Responsible: Challenges in the AI Field from the Perspective of Its PhD Students.</title>
<pages>451-466</pages>
<year>2025</year>
<booktitle>DIGHUM</booktitle>
<ee>https://doi.org/10.1007/978-3-032-11108-1_34</ee>
<crossref>conf/dighum/2025</crossref>
<url>db/conf/dighum/dighum2025.html#HrckovaRTCTS25</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2502-06688" mdate="2025-03-12">
<author pid="296/0909">Patrik Goldschmidt</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Network Intrusion Datasets: A Survey, Limitations, and Recommendations.</title>
<year>2025</year>
<month>February</month>
<volume>abs/2502.06688</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2502.06688</ee>
<url>db/journals/corr/corr2502.html#abs-2502-06688</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2511-23198" mdate="2026-01-14">
<author pid="243/3865">Martin Mocko</author>
<author pid="16/10715">Jakub Sevcech</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Clustering Malware at Scale: A First Full-Benchmark Study.</title>
<year>2025</year>
<month>November</month>
<volume>abs/2511.23198</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2511.23198</ee>
<url>db/journals/corr/corr2511.html#abs-2511-23198</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><inproceedings key="conf/itat/ChudaJ24" mdate="2024-10-24">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="227/7617">Lukas Janik</author>
<title>Enhancing Smartphone Security through Behavioral Biometrics-based Gestures.</title>
<pages>226-228</pages>
<year>2024</year>
<booktitle>ITAT</booktitle>
<ee type="oa">https://ceur-ws.org/Vol-3792/paper29.pdf</ee>
<crossref>conf/itat/2024</crossref>
<url>db/conf/itat/itat2024.html#ChudaJ24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2408-06847" mdate="2025-05-01">
<author pid="295/6382">Andrea Hrckova</author>
<author orcid="0000-0002-2385-9470" pid="152/8567">Jennifer Renoux</author>
<author pid="32/403">Rafael Tolosana-Calasanz</author>
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="236/0255">Martin Tamajka</author>
<author pid="09/8578">Jakub Simko</author>
<title>AI Research is not Magic, it has to be Reproducible and Responsible: Challenges in the AI field from the Perspective of its PhD Students.</title>
<year>2024</year>
<volume>abs/2408.06847</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2408.06847</ee>
<url>db/journals/corr/corr2408.html#abs-2408-06847</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2310-06656" mdate="2023-10-24">
<author pid="26/9782">Dominik Macko</author>
<author pid="296/0909">Patrik Goldschmidt</author>
<author pid="266/5508">Peter Pistek</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Assessing the Impact of a Supervised Classification Filter on Flow-based Hybrid Network Anomaly Detection.</title>
<year>2023</year>
<volume>abs/2310.06656</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2310.06656</ee>
<url>db/journals/corr/corr2310.html#abs-2310-06656</url>
</article>
</r>
<r><inproceedings key="conf/compsystech/PetrikC21" mdate="2025-08-05">
<author orcid="0000-0001-5429-3513" pid="240/1242">Juraj Petr&#237;k</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>The effect of time drift in source code authorship attribution: Time drifting in source code - stylochronometry.</title>
<pages>87-92</pages>
<year>2021</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/3472410.3472445</ee>
<ee>https://www.wikidata.org/entity/Q130868910</ee>
<crossref>conf/compsystech/2021</crossref>
<url>db/conf/compsystech/compsystech2021.html#PetrikC21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsystech/JanikCB20" mdate="2022-01-03">
<author pid="227/7617">Lukas Janik</author>
<author pid="92/28">Daniela Chud&#225;</author>
<author orcid="0000-0002-6308-7081" pid="168/4852">Kamil Burda</author>
<title>SGFA: A Two-Factor Smartphone Authentication Mechanism Using Touch Behavioral Biometrics.</title>
<pages>35-42</pages>
<year>2020</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/3407982.3408021</ee>
<crossref>conf/compsystech/2020</crossref>
<url>db/conf/compsystech/compsystech2020.html#JanikCB20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/clef/PetrikC19" mdate="2023-03-10">
<author pid="240/1242">Juraj Petr&#237;k</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Bots and Gender Profiling with Convolutional Hierarchical Recurrent Neural Network.</title>
<year>2019</year>
<booktitle>CLEF (Working Notes)</booktitle>
<ee type="oa">https://ceur-ws.org/Vol-2380/paper_214.pdf</ee>
<crossref>conf/clef/2019w</crossref>
<url>db/conf/clef/clef2019w.html#PetrikC19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/clef/PetrikC19a" mdate="2023-03-10">
<author pid="240/1242">Juraj Petr&#237;k</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Twitter Feeds Profiling with TF-IDF.</title>
<year>2019</year>
<booktitle>CLEF (Working Notes)</booktitle>
<ee type="oa">https://ceur-ws.org/Vol-2380/paper_215.pdf</ee>
<crossref>conf/clef/2019w</crossref>
<url>db/conf/clef/clef2019w.html#PetrikC19a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sofsem/LabajRC19" mdate="2019-01-18">
<author orcid="0000-0002-2874-6715" pid="130/6279">Martin Labaj</author>
<author orcid="0000-0002-4904-2485" pid="18/2667">Karol R&#225;stocn&#253;</author>
<author orcid="0000-0002-3873-9308" pid="92/28">Daniela Chud&#225;</author>
<title>Towards Automatic Comparison of Cloud Service Security Certifications.</title>
<pages>298-309</pages>
<year>2019</year>
<booktitle>SOFSEM</booktitle>
<ee>https://doi.org/10.1007/978-3-030-10801-4_24</ee>
<crossref>conf/sofsem/2019</crossref>
<url>db/conf/sofsem/sofsem2019.html#LabajRC19</url>
</inproceedings>
</r>
<r><article key="journals/iwc/ChudaKB18" mdate="2021-10-14">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="19/11105">Peter Kr&#225;tky</author>
<author orcid="0000-0002-6308-7081" pid="168/4852">Kamil Burda</author>
<title>Biometric Properties of Mouse Interaction Features on the Web.</title>
<pages>359-377</pages>
<year>2018</year>
<volume>30</volume>
<journal>Interact. Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1093/iwc/iwy015</ee>
<url>db/journals/iwc/iwc30.html#ChudaKB18</url>
</article>
</r>
<r><article key="journals/jiis/KratkyC18" mdate="2018-11-07">
<author pid="19/11105">Peter Kr&#225;tky</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Recognition of web users with the aid of biometric user model.</title>
<pages>621-646</pages>
<year>2018</year>
<volume>51</volume>
<journal>J. Intell. Inf. Syst.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10844-018-0500-0</ee>
<url>db/journals/jiis/jiis51.html#KratkyC18</url>
</article>
</r>
<r><inproceedings key="conf/compsystech/PetrikC18" mdate="2025-08-05">
<author orcid="0000-0001-5429-3513" pid="240/1242">Juraj Petr&#237;k</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Source code authorship approaches natural language processing.</title>
<pages>58-61</pages>
<year>2018</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/3274005.3274031</ee>
<crossref>conf/compsystech/2018</crossref>
<url>db/conf/compsystech/compsystech2018.html#PetrikC18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sofsem/BurdaC18" mdate="2021-10-14">
<author orcid="0000-0002-6308-7081" pid="168/4852">Kamil Burda</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Influence of Body Postures on Touch-Based Biometric User Authentication.</title>
<pages>459-468</pages>
<year>2018</year>
<booktitle>SOFSEM</booktitle>
<ee>https://doi.org/10.1007/978-3-319-73117-9_32</ee>
<crossref>conf/sofsem/2018</crossref>
<url>db/conf/sofsem/sofsem2018.html#BurdaC18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsystech/KratkyRC17" mdate="2018-11-06">
<author pid="19/11105">Peter Kr&#225;tky</author>
<author pid="208/9443">Tom&#225;s Repisk&#253;</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Is the Visitor Reading or Navigating?</title>
<pages>80-87</pages>
<year>2017</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/3134302.3134330</ee>
<crossref>conf/compsystech/2017</crossref>
<url>db/conf/compsystech/compsystech2017.html#KratkyRC17</url>
</inproceedings>
</r>
<r><article key="journals/ijhcitp/KratkyTC16" mdate="2020-04-25">
<author pid="19/11105">Peter Kr&#225;tky</author>
<author pid="47/3703">Jozef Tvarozek</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Big Five Personality in Online Learning and Games: Analysis of Student Activity.</title>
<pages>33-46</pages>
<year>2016</year>
<volume>7</volume>
<journal>Int. J. Hum. Cap. Inf. Technol. Prof.</journal>
<number>3</number>
<ee>https://doi.org/10.4018/IJHCITP.2016070103</ee>
<url>db/journals/ijhcitp/ijhcitp7.html#KratkyTC16</url>
</article>
</r>
<r><inproceedings key="conf/compsystech/ChudaB16" mdate="2016-11-15">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="168/4852">Kamil Burda</author>
<title>Toward Posture Recognition with Touch Screen Biometrics.</title>
<pages>293-299</pages>
<year>2016</year>
<booktitle>CompSysTech</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2983525</ee>
<crossref>conf/compsystech/2016</crossref>
<url>db/conf/compsystech/compsystech2016.html#ChudaB16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsystech/KratkyC16" mdate="2016-11-15">
<author pid="19/11105">Peter Kr&#225;tky</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Fine-tuning Web Traffic Statistics by Deduplication and Splitting of Visitors Records Using Mouse Biometrics.</title>
<pages>300-306</pages>
<year>2016</year>
<booktitle>CompSysTech</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2983500</ee>
<crossref>conf/compsystech/2016</crossref>
<url>db/conf/compsystech/compsystech2016.html#KratkyC16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/www/KratkyC16" mdate="2018-11-06">
<author pid="19/11105">Peter Kr&#225;tky</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Estimating Gender and Age of Web Page Visitors from the Way They Use Their Mouse.</title>
<pages>61-62</pages>
<year>2016</year>
<booktitle>WWW (Companion Volume)</booktitle>
<ee>https://doi.org/10.1145/2872518.2889384</ee>
<crossref>conf/www/2016c</crossref>
<url>db/conf/www/www2016c.html#KratkyC16</url>
</inproceedings>
</r>
<r><article key="journals/ijhcitp/ChudaK15" mdate="2020-04-25">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="19/11105">Peter Kr&#225;tky</author>
<title>Mouse Usage Biometrics in eLearning Systems: Detection of Impersonation and User Profiling.</title>
<pages>39-50</pages>
<year>2015</year>
<volume>6</volume>
<journal>Int. J. Hum. Cap. Inf. Technol. Prof.</journal>
<number>1</number>
<ee>https://doi.org/10.4018/ijhcitp.2015010104</ee>
<url>db/journals/ijhcitp/ijhcitp6.html#ChudaK15</url>
</article>
</r>
<r><inproceedings key="conf/compsystech/ChudaK15" mdate="2018-11-06">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="19/11105">Peter Kr&#225;tky</author>
<title>Grouping instances in <i>k</i>NN for classification based on computer mouse features.</title>
<pages>214-220</pages>
<year>2015</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/2812428.2812454</ee>
<crossref>conf/compsystech/2015</crossref>
<url>db/conf/compsystech/compsystech2015.html#ChudaK15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/www/ChudaKT15" mdate="2018-11-06">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="19/11105">Peter Kr&#225;tky</author>
<author pid="47/3703">Jozef Tvarozek</author>
<title>Mouse Clicks Can Recognize Web Page Visitors!</title>
<pages>21-22</pages>
<year>2015</year>
<booktitle>WWW (Companion Volume)</booktitle>
<ee>https://doi.org/10.1145/2740908.2742749</ee>
<crossref>conf/www/2015c</crossref>
<url>db/conf/www/www2015c.html#ChudaKT15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsystech/KuceckaC14" mdate="2018-11-06">
<author pid="12/10163">Tom&#225;s Kucecka</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Similarity detection among longer texts by matching keywords found in segments.</title>
<pages>142-149</pages>
<year>2014</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/2659532.2659635</ee>
<crossref>conf/compsystech/2014</crossref>
<url>db/conf/compsystech/compsystech2014.html#KuceckaC14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsystech/ChudaK14" mdate="2018-11-06">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="19/11105">Peter Kr&#225;tky</author>
<title>Usage of computer mouse characteristics for identification in web browsing.</title>
<pages>218-225</pages>
<year>2014</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/2659532.2659645</ee>
<crossref>conf/compsystech/2014</crossref>
<url>db/conf/compsystech/compsystech2014.html#ChudaK14</url>
</inproceedings>
</r>
<r><article key="journals/te/ChudaNKH12" mdate="2021-10-14">
<author pid="92/28">Daniela Chud&#225;</author>
<author orcid="0000-0001-7409-6218" pid="40/1811">Pavol N&#225;vrat</author>
<author pid="08/8736">Bianka Kov&#225;cov&#225;</author>
<author pid="96/10860">Pavel Humay</author>
<title>The Issue of (Software) Plagiarism: A Student View.</title>
<pages>22-28</pages>
<year>2012</year>
<volume>55</volume>
<journal>IEEE Trans. Educ.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TE.2011.2112768</ee>
<url>db/journals/te/te55.html#ChudaNKH12</url>
</article>
</r>
<r><inproceedings key="conf/compsystech/ChudaCK11" mdate="2018-11-06">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="07/10163">J&#225;n Chlpek</author>
<author pid="24/10161">Andrej Kumor</author>
<title>The impact of text pre-processing to determine the similarity in students assignments.</title>
<pages>417-422</pages>
<year>2011</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/2023607.2023677</ee>
<crossref>conf/compsystech/2011</crossref>
<url>db/conf/compsystech/compsystech2011.html#ChudaCK11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsystech/ChudaU11" mdate="2018-11-06">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="61/10161">Martin Uhl&#237;k</author>
<title>The plagiarism detection by compression method.</title>
<pages>429-434</pages>
<year>2011</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/2023607.2023679</ee>
<crossref>conf/compsystech/2011</crossref>
<url>db/conf/compsystech/compsystech2011.html#ChudaU11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsystech/ChudaR10" mdate="2018-11-06">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="49/8731">Dusan Rodina</author>
<title>Automata simulator.</title>
<pages>394-399</pages>
<year>2010</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/1839379.1839449</ee>
<crossref>conf/compsystech/2010</crossref>
<url>db/conf/compsystech/compsystech2010.html#ChudaR10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsystech/ChudaK10" mdate="2018-11-06">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="08/8736">Bianka Kov&#225;cov&#225;</author>
<title>Checking plagiarism in e-learning.</title>
<pages>419-424</pages>
<year>2010</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/1839379.1839453</ee>
<crossref>conf/compsystech/2010</crossref>
<url>db/conf/compsystech/compsystech2010.html#ChudaK10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsystech/ChudaNC09" mdate="2023-09-30">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="15/305">Martin Neh&#233;z</author>
<author orcid="0000-0001-5011-5293" pid="41/1317">Michal Cernansk&#253;</author>
<title>On using of random access machine simulators in teaching of theoretical computer science.</title>
<pages>84</pages>
<year>2009</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/1731740.1731830</ee>
<crossref>conf/compsystech/2009</crossref>
<url>db/conf/compsystech/compsystech2009.html#ChudaNC09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsystech/ChudaD09" mdate="2018-11-06">
<author pid="92/28">Daniela Chud&#225;</author>
<author pid="88/8736">Michal Durfina</author>
<title>Multifactor authentication based on keystroke dynamics.</title>
<pages>89</pages>
<year>2009</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/1731740.1731836</ee>
<crossref>conf/compsystech/2009</crossref>
<url>db/conf/compsystech/compsystech2009.html#ChudaD09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ismis/NavratBCR09" mdate="2022-10-02">
<author orcid="0000-0001-7409-6218" pid="40/1811">Pavol N&#225;vrat</author>
<author pid="b/MariaBielikova">M&#225;ria Bielikov&#225;</author>
<author pid="92/28">Daniela Chud&#225;</author>
<author orcid="0000-0003-1302-6261" pid="36/4412">Viera Rozinajov&#225;</author>
<title>Intelligent Information Processing in Semantically Enriched Web.</title>
<pages>331-340</pages>
<year>2009</year>
<booktitle>ISMIS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-04125-9_36</ee>
<crossref>conf/ismis/2009</crossref>
<url>db/conf/ismis/ismis2009.html#NavratBCR09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip12/NavratTEC08" mdate="2021-10-14">
<author orcid="0000-0001-7409-6218" pid="40/1811">Pavol N&#225;vrat</author>
<author pid="27/7020">Tomas Taraba</author>
<author pid="44/3993">Anna Bou Ezzeddine</author>
<author pid="92/28">Daniela Chud&#225;</author>
<title>Context Search Enhanced by Readability Index.</title>
<pages>373-382</pages>
<year>2008</year>
<booktitle>IFIP AI</booktitle>
<ee type="oa">https://doi.org/10.1007/978-0-387-09695-7_36</ee>
<crossref>conf/ifip12/2008</crossref>
<url>db/conf/ifip12/ai2008.html#NavratTEC08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsystech/Chuda07" mdate="2018-11-06">
<author pid="92/28">Daniela Chud&#225;</author>
<title>Visualization in education of theoretical computer science.</title>
<pages>84</pages>
<year>2007</year>
<booktitle>CompSysTech</booktitle>
<ee>https://doi.org/10.1145/1330598.1330687</ee>
<crossref>conf/compsystech/2007</crossref>
<url>db/conf/compsystech/compsystech2007.html#Chuda07</url>
</inproceedings>
</r>
<coauthors n="33" nc="3">
<co c="0"><na f="b/Bielikov=aacute=:M=aacute=ria" pid="b/MariaBielikova">M&#225;ria Bielikov&#225;</na></co>
<co c="0"><na f="b/Burda:Kamil" pid="168/4852">Kamil Burda</na></co>
<co c="2"><na f="c/Cernansk=yacute=:Michal" pid="41/1317">Michal Cernansk&#253;</na></co>
<co c="1"><na f="c/Chlpek:J=aacute=n" pid="07/10163">J&#225;n Chlpek</na></co>
<co c="-1"><na f="d/Durfina:Michal" pid="88/8736">Michal Durfina</na></co>
<co c="0"><na f="e/Ezzeddine:Anna_Bou" pid="44/3993">Anna Bou Ezzeddine</na></co>
<co c="0"><na f="g/Goldschmidt:Patrik" pid="296/0909">Patrik Goldschmidt</na></co>
<co c="0"><na f="h/Hrckova:Andrea" pid="295/6382">Andrea Hrckova</na></co>
<co c="0"><na f="h/Humay:Pavel" pid="96/10860">Pavel Humay</na></co>
<co c="0"><na f="j/Janik:Lukas" pid="227/7617">Lukas Janik</na></co>
<co c="0"><na f="k/Kov=aacute=cov=aacute=:Bianka" pid="08/8736">Bianka Kov&#225;cov&#225;</na></co>
<co c="0"><na f="k/Kr=aacute=tky:Peter" pid="19/11105">Peter Kr&#225;tky</na></co>
<co c="-1"><na f="k/Kucecka:Tom=aacute=s" pid="12/10163">Tom&#225;s Kucecka</na></co>
<co c="1"><na f="k/Kumor:Andrej" pid="24/10161">Andrej Kumor</na></co>
<co c="0"><na f="l/Labaj:Martin" pid="130/6279">Martin Labaj</na></co>
<co c="0"><na f="m/Macko:Dominik" pid="26/9782">Dominik Macko</na></co>
<co c="0"><na f="m/Mocko:Martin" pid="243/3865">Martin Mocko</na></co>
<co c="0"><na f="n/N=aacute=vrat:Pavol" pid="40/1811">Pavol N&#225;vrat</na></co>
<co c="2"><na f="n/Neh=eacute=z:Martin" pid="15/305">Martin Neh&#233;z</na></co>
<co c="-1"><na f="p/Petr=iacute=k:Juraj" pid="240/1242">Juraj Petr&#237;k</na></co>
<co c="0"><na f="p/Pistek:Peter" pid="266/5508">Peter Pistek</na></co>
<co c="0"><na f="r/R=aacute=stocn=yacute=:Karol" pid="18/2667">Karol R&#225;stocn&#253;</na></co>
<co c="0"><na f="r/Renoux:Jennifer" pid="152/8567">Jennifer Renoux</na></co>
<co c="0"><na f="r/Repisk=yacute=:Tom=aacute=s" pid="208/9443">Tom&#225;s Repisk&#253;</na></co>
<co c="-1"><na f="r/Rodina:Dusan" pid="49/8731">Dusan Rodina</na></co>
<co c="0"><na f="r/Rozinajov=aacute=:Viera" pid="36/4412">Viera Rozinajov&#225;</na></co>
<co c="0"><na f="s/Sevcech:Jakub" pid="16/10715">Jakub Sevcech</na></co>
<co c="0"><na f="s/Simko:Jakub" pid="09/8578">Jakub Simko</na></co>
<co c="0"><na f="t/Tamajka:Martin" pid="236/0255">Martin Tamajka</na></co>
<co c="0"><na f="t/Taraba:Tomas" pid="27/7020">Tomas Taraba</na></co>
<co c="0"><na f="t/Tolosana=Calasanz:Rafael" pid="32/403">Rafael Tolosana-Calasanz</na></co>
<co c="0"><na f="t/Tvarozek:Jozef" pid="47/3703">Jozef Tvarozek</na></co>
<co c="-1"><na f="u/Uhl=iacute=k:Martin" pid="61/10161">Martin Uhl&#237;k</na></co>
</coauthors>
</dblpperson>

