1. Chomsky, N.: Syntactic Structures. Mouton, London (1957)
2. Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)
3. Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Design and evaluation of a quorum-based synchronization protocol of multimedia replicas. Int. J. Ad Hoc Ubiquitous Comput. 17(2/3), 100–109 (2014)
4. Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Flexible synchronization protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Barolli, L., Terzo, O. (eds.) Complex, Intelligent, and Software Intensive Systems, Advances in Intelligent Systems and Computing, vol. 611, pp. 82–93 (2018)
5. Ogiela, L.: Cognitive computational intelligence in medical pattern semantic understanding. In: Guo, M.Z., Zhao, L., Wang, L.P. (eds.) ICNC 2008: Fourth International Conference on Natural Computation, vol. 6 Proceedings. Jian, Peoples Republic of China, October 18–20, 2008, pp. 245–247 (2008)