


default search action
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems 2005
- Jerzy Pejas, Andrzej Piegat:

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems. Springer 2005, ISBN 978-1-4020-7776-0
Information Technology Security
- Janusz Górski

:
How can we justify trust in software based systems? 3-12 - Tomasz Hebisz, Eugeniusz Kuriata:

The capacity of ciphers fulfilling the accessibility of cryptograms. 13-22 - Volodymyr Beletskyy, D. Burak:

Parallelization of the Data Encryption Standard (DES) algorithm. 23-33 - Witold Macków:

Linked authenticated dictionaries for certificate status verification. 35-46 - Imed El Fray

, Jerzy Pejas:
Integrated Payment System for Public Key Infrastructure Services. 47-59 - Jerzy Pejas

, Imed El Fray
:
Some methods of the analysis and risk assessment in the PKI system services providers. 61-70 - Igor Margasinski, Krzysztof Szczypiorski

:
VAST: Versatile Anonymous System for Web Users. 71-82 - Bartosz Sokol, V. N. Yarmolik:

Cryptography and Steganography: teaching experience. 83-92 - Marek Jackiewicz, Eugeniusz Kuriata:

Analysis of non-linear pseudo-noise sequences. 93-102 - Janusz Górski

, Aleksander Jarzebowicz
, Rafal Leszczyna
, Jakub Miler
, Marcin Olszewski:
Tool support for detecting defects in object-oriented models. 103-112 - Wlodzimierz Chocianowicz, Jerzy Pejas

, Andrzej Rucinski:
The Proposal of Protocol for Electronic Signature Creation in Public Environment. 113-124 - Krzysztof Chmiel:

On Arithmetic Subtraction Linear Approximation. 125-134 - S. Berczynski, Yurii A. Kravtsov, Jerzy Pejas

, E. D. Surovyatkina:
Secure Data Transmission via Modulation of the Chaotic Sequence Parameters. 135-142
Biometric Systems
- Leonid Kompanets:

Some Advances and Challenges in Live Biometrics, Personnel Management, and Other "Human Being" Applications. 145-156 - Georgy Kukharev, Adam Kuzminski:

An environment for recognition systems modeling. 157-164 - Georgy Kukharev, Pawel Masicz, Piotr Masicz:

Modified Gradient Method for Face Localization. 165-176 - Adam Nowosielski

:
Three stage face recognition algorithm for visitor identification system. 177-184 - Khalid Saeed, Marcin Werdoni:

A New Approach for Hand-Palm Recognition. 185-194 - Khalid Saeed, Piotr Charkiewicz:

An Experimental Criterion for Face Classification. 195-202 - Dariusz Frejlichowski:

Contour Objects Recognition Based On UNL-Fourier Descriptors. 203-208 - Mariusz Borawski

, Pawel Forczmanski
:
Sonar Image Simulation by Means of Ray Tracing and Image Processing. 209-214 - Liming Chen, Georgy Kukharev, Tomasz Ponikowski:

The PCA Reconstruction Based Approach for Extending Facial Image Databases for Face Recognition Systems. 215-227 - Edward Pólrolniczak

:
Investigation of fingerprint verification algorithm based on local centers method. 229-238 - Leonid Kompanets, Mariusz Kubanek

, Szymon Rydzek:
Czestochowa's Precise Model of a Face Based on the Facial Asymmetry, Ophthalmogeometry, and Brain Asymmetry Phenomena: the Idea and Algorithm Sketch. 239-251
Methods of Artificial Intelligence and Intelligent Agents
- Gisella Facchinetti, Ilda Mannino

, Giovanni Mastroleo
, Stefano Soriani:
A fuzzy expert approach for comparing alternative end uses for requalification of contaminated sites. 255-265 - Pawel Banás:

Training assisting program with hybrid decision supporting system. 267-272 - Adam Szustalewicz:

Numerical problems with evaluating the fractal dimension of real data. 273-283 - Zbigniew Pietrzykowski

:
Multi-stage ship control in a fuzzy environment. 285-299 - Andrzej Piegat:

Informative value of the possibilistic extension principle. 301-310 - Roman Smierzchalski

:
Intelligent Marine Control Systems. 311-319 - Izabela Rejer:

How to deal with the data in a bankruptcy modelling. 321-328 - Piotr Lipinski:

Dependency Mining in Large Sets of Stock Market Trading Rules. 329-336 - Anna Bartkowiak, Joanna Zdziarek, Niki Evelpidou

, Andreas Vassilopoulos:
Choosing representative data items: Kohonen, Neural Gas or Mixture Model? 337-344 - Marcin Plucinski

:
Application of the Ant Colony Algorithm for the Path Planning. 345-352 - Victor J. Mamaev, Dmitry A. Judin:

Application of fuzzy logic for track corrector formation into flight simulator. 353-359 - Przemyslaw Klesk

:
Algorithm for Automatic Definition of Validated and Non-Validated Region in Multi-Dimensional Space. 361-370 - Walery Rogoza

:
Adaptive simulation of separable dynamical systems in the neural network basis. 371-386 - Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi:

Improvement of the processors operating ratio in task scheduling using the deadline method. 387-394

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














