


default search action
ACS 2016: Miȩ;dzyzdroje, Poland
- Shin-ya Kobayashi, Andrzej Piegat, Jerzy Pejas

, Imed El Fray
, Janusz Kacprzyk:
Hard and Soft Computing for Artificial Intelligence, Multimedia and Security, Selected, Revised Papers from the International Conference on Advanced Computer Systems, ACS 2016, Miȩdzyzdroje, Poland, 19-21 October 2016. Advances in Intelligent Systems and Computing 534, 2017, ISBN 978-3-319-48428-0
Artificial Intelligence
- Andrzej Piegat, Marek Landowski

:
On Fuzzy RDM-Arithmetic. 3-16 - Marcin Pietras:

Hidden Markov Models with Affix Based Observation in the Field of Syntactic Analysis. 17-26 - Olga Pilipczuk

, Galina Cariowa
:
Opinion Acquisition: An Experiment on Numeric, Linguistic and Color Coded Rating Scale Comparison. 27-36 - Walery Rogoza

, Michal Zablocki:
A Weather Forecasting System Using Intelligent BDI Multiagent-Based Group Method of Data Handling. 37-48 - Marek Landowski

:
Comparison of RDM Complex Interval Arithmetic and Rectangular Complex Arithmetic. 49-57 - Robert Burduk, Paulina Heda:

Homogeneous Ensemble Selection - Experimental Studies. 58-67 - Walery Rogoza

:
Deterministic Method for the Prediction of Time Series. 68-80 - Leszek J. Chmielewski

, Arkadiusz Orlowski
, Maciej Janowicz
:
A Study on Directionality in the Ulam Square with the Use of the Hough Transform. 81-90
Design of Information and Security Systems
- Nikolay Borgest

, Maksim Korovin
:
Ontological Approach Towards Semantic Data Filtering in the Interface Design Applied to the Interface Design and Dialogue Creation for the "Robot-Aircraft Designer" Informational System. 93-101 - Grzegorz Smigielski

, Roman Dygdala, Hubert Zarzycki
, Damian Lewandowski:
Real-Time System of Delivering Water-Capsule for Firefighting. 102-111 - Kosuke Yamaguchi, Tsutomu Inamoto, Keiichi Endo, Yoshinobu Higami, Shinya Kobayashi:

Evaluation of Influence Exerted by a Malicious Group's Various Aims in the External Grid. 112-122 - Izabela Rejer

, Lukasz Cieszynski:
Subject-Specific Methodology in the Frequency Scanning Phase of SSVEP-Based BCI. 123-132 - Anna Grocholewska-Czurylo:

S-boxes Cryptographic Properties from a Statistical Angle. 133-145 - Izabela Rejer

:
Wavelet Transform in Detection of the Subject Specific Frequencies for SSVEP-Based BCI. 146-155 - Tomasz Klasa, Imed El Fray

:
Data Scheme Conversion Proposal for Information Security Monitoring Systems. 156-166 - Tomasz Hyla

, Jerzy Pejas
:
Non-standard Certification Models for Pairing Based Cryptography. 167-181
Multimedia Systems
- Aleksandr Cariow

, Galina Cariowa
:
An Algorithm for the Vandermonde Matrix-Vector Multiplication with Reduced Multiplicative Complexity. 185-194 - Jakub Peksinski

, Grzegorz Mikolajczak
, Janusz Pawel Kowalski:
The Use of the Objective Digital Image Quality Assessment Criterion Indication to Create Panoramic Photographs. 195-204 - Pawel Forczmanski

:
Human Face Detection in Thermal Images Using an Ensemble of Cascading Classifiers. 205-215 - Radoslaw Mantiuk

:
Accuracy of High-End and Self-build Eye-Tracking Systems. 216-227 - Robert Staniucha, Adam Wojciechowski

:
Mouth Features Extraction for Emotion Analysis. 228-237 - Dorota Oszutowska-Mazurek

, Przemyslaw Mazurek
:
Sensitivity of Area-Perimeter Relation for Image Analysis and Image Segmentation Purposes. 238-248 - Edward Pólrolniczak

, Michal Kramarczyk
:
Vocal Tract Resonance Analysis Using LTAS in the Context of the Singer's Level of Advancement. 249-257 - Janusz Bobulski

:
Parallel Facial Recognition System Based on 2DHMM. 258-265 - Mariusz Kubanek

, Filip Depta, Dorota Smorawa:
System of Acoustic Assistance in Spatial Orientation for the Blind. 266-277
Software Technologies
- Andriy Luntovskyy

:
Performance and Energy Efficiency in Distributed Computing. 281-292 - Alexander V. Koval

, Larisa S. Globa
, Rina Novogrudska
:
The Approach to Web Services Composition. 293-304 - Wlodzimierz Bielecki

, Marek Palkowski
:
Loop Nest Tiling for Image Processing and Communication Applications. 305-314 - Wlodzimierz Bielecki

, Piotr Skotnicki
:
Tile Merging Technique to Generate Valid Tiled Code by Means of the Transitive Closure of a Dependence Graph. 315-327 - Anna Derezinska

, Marian Szczykulski:
Performance Evaluation of Impact of State Machine Transformation and Run-Time Library on a C# Application. 328-340 - Luiza Fabisiak:

The Method of Evaluating the Usability of the Website Based on Logs and User Preferences. 341-354 - Agnieszka Konys

:
Ontology-Based Approaches to Big Data Analytics. 355-365

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














