


default search action
6. CISIM 2007: Elk, Poland
- 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007, Elk, Poland, June 28-30, 2007. IEEE Computer Society 2007, ISBN 0-7695-2894-5

Keynote Papers
- Anna Bartkowiak:

Should Normal Distribution be Normal? The Student's T Alternative. 3-8 - Ryszard Tadeusiewicz

, Marek R. Ogiela
, Lidia Ogiela:
A New Approach to the Computer Support of Strategic Decision Making in Enterprises by Means of a New Class of Understanding Based Management Support Systems. 9-13 - Václav Snásel:

GUI Patterns and Web Semantics. 14-19 - Akira Imada:

Finding a Needle in a Haystack: From Baldwin Effect to Quantum Computation. 20-25 - Ryszard S. Choras

:
Iris Image Recognition. 26-30 - Kurosh Madani:

Toward Higher Level Intelligent Systems. 31-36 - Yasufumi Takama:

Introduction of Humatronics--Towards Integration of Web Intelligence and Robotics. 37-44 - Adam Dabrowski, Pawel Pawlowski

:
Benchmark problems of Signal Processing and Control for Testing Emergent Architectures and Programming Techniques of DSP's, FASIC's, and PLD's. 45-52
Intelligent Computing and Frameworks
- Péter Fülöp, Sándor Szabó, Tamás Szálka:

Location Prediction Methods with Markovian Approach and Extended Random Walk Model. 53-58 - Christin Groba, Sebastian Cech, Frank Rosenthal, Andreas Gössling:

Architecture of a Predictive Maintenance Framework. 59-64 - Jolanta Koszelew

:
The Theoretical Framework of the Optimization of Public Transport Travel. 65-70 - Joanna Karbowska-Chilinska

:
Estimation of the Average Time of Computations of Probabilistic Algorithms with Continuous Time Parameter. 71-76 - Lidia Ogiela:

UBMSS (Understanding Based Managing Support Systems) as an Example of the Application of Cognitive Analysis in Data Analysis. 77-80 - Agnieszka Makarec:

Interpretation of Probabilistic Algorithmic Logic in Nondeterministic Algorithmic Logic. 81-86 - Khalid Saeed, Krzysztof Piekarski:

On Toeplitz Matrices Minimal Eigenvalues in Moving Object Description. 87-92 - Bartlomiej Gudowski, Jaroslaw Was

:
Some Criteria of Making Decisions in Pedestrian Evacuation Algorithms. 93-96 - Jin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang:

Universally Composable Key-Evolving Signature. 97-102 - Krzysztof Ciesielski, Mieczyslaw A. Klopotek, Slawomir T. Wierzchon

:
Histogram-Based Dimensionality Reduction of Term Vector Space. 103-108 - Moustapha Sene, Michel Barret, Kurosh Madani:

Bearing's Behavior Modeling for Mechanical Defects' Detection and Diagnosis. 109-114 - Amine Chohra, Nadia Kanaoui, Kurosh Madani:

Hybrid Intelligent Diagnosis Systems. 115-120 - Maciej Dakowicz, Christopher M. Gold:

Finite Difference Runoff Modelling Using "Voronoi Buckets". 121-124 - Pawel Boguslawski

, Christopher M. Gold:
Atomic Operators for Construction and Manipulation of the Augmented Quad-Edge. 125-128 - Rafal Goralski, Christopher M. Gold, Maciej Dakowicz:

Application of the Kinetic Voronoi Diagram to the Real-Time Navigation of Marine Vessels. 129-134 - Zhen-zhi Gong, Kong-fa Hu, Qing-Li Da:

A Grouping Aggregation Algorithm Based on the Dimension Hierarchical Encoding in Data Warehouse. 135-142
Nature Inspired Computing and Problem Solving
- Krzysztof Trojanowski

:
B-Cell Algorithm as a Parallel Approach to Optimization of Moving Peaks Benchmark Tasks. 143-148 - Urszula Boryczka:

Ants and Multiple Knapsack Problem. 149-154 - Andrzej Chmielewski

, Slawomir T. Wierzchon
:
Simple Method of Increasing the Coverage of Nonself Region for Negative Selection Algorithms. 155-160 - Andrzej Domaradzki:

AIS for Trend Change Detection. 161-165 - Shichang Sun, Ajith Abraham, Guiyong Zhang, Hongbo Liu:

A Particle Swarm Optimization Algorithm for Neighbor Selection in Peer-to-Peer Networks. 166-172
Digital Communication and Information Management
- Unai Bilbao, Paul Bustamante, Nagore Guarretxena, J. Santo Domingo:

Wireless Sensor Network for Intravenous Dripping Systems. 173-178 - Rituparna Chaki, Nabendu Chaki

:
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. 179-184 - Nabendu Chaki

, Rituparna Chaki:
ORRP: Optimal Reactive Routing Protocol for Mobile Ad-Hoc Networks. 185-190 - Péter Fülöp, Benedek Kovács:

Enhanced Mobility Management Modelling Framework. 191-196 - Yuri Grishin

:
Spread Spectrum Signals Classification Based on the Wigner-Ville Distribution and Neural Network Probability Density Function Estimation. 197-202 - John Tsiligaridis, Raj Acharya:

An Adaptive Data Broadcasting Model in Mobile Information Systems. 203-208 - Xu Chen, Michael J. O'Grady

, Gregory M. P. O'Hare
:
Towards a Pervasive Mobile Multimedia Experience. 209-212 - Bartlomiej Ziólkowski, Janusz Stoklosa

:
Mobile Agent-Based Digital Rights Management Scheme. 213-218 - Romuald Mosdorf

, Bozena Ignatowska:
On Frequency Synchronization of e-Learning Web System Users. 219-224 - Bartosz Oler, Imed El Fray

:
Deniable File System--Application of Deniable Storage to Protection of Private Keys. 225-229 - Grzegorz Kurdziel, Halina Kwasnicka

:
VCOP--The System of Visual Communication with Computers for Paralyzed Users. 230-238
Image Processing, Recognition, and Biometrics
- Jin Zhou, Yang Liu, Yuehui Chen:

Face Recognition Using Kernel PCA and Hierarchical RBF Network. 239-244 - Jin Zhou, Yang Liu, Yuehui Chen:

ICA Based on KPCA and Hybrid Flexible Neural Tree to Face Recognition. 245-250 - Robert Burduk:

Fuzzy Data in Local Optimal Strategy of Multistage Recognition. 251-254 - P. Andruszkiewicz, Cezary Boldak

, Jerzy Jaroszewicz
:
Semi-Automatic Segmentation of Fibrous Liver Tissue. 255-260 - Michal Choras:

Image Feature Extraction Methods for Ear Biometrics--A Survey. 261-265 - Halina Kwasnicka

, Mariusz Paradowski, Krzysztof Borysewicz:
Capillaroscopy Image Analysis as an Automatic Image Annotation Problem. 266-271 - Pavel Moravec

, Václav Snásel, Alexander A. Frolov, Dusan Húsek
, Hana Rezanková
, Pavel Polyakov:
Image Analysis by Methods of Dimension Reduction. 272-277 - Anna Piwonska, Urszula Grycuk:

Images Reconstruction with Use of a Genetic Algorithm. 278-281 - Piotr Porwik

:
The Compact Three Stages Method of the Signature Recognition. 282-287 - Marek Tabedzki

, Khalid Saeed:
Modified Word Recognition System--New Performance. 288-293 - Yue-Xiang Yang, Li-Zhi Cheng, Yong Luo, Rui Wang:

Bandelet Union Optimal Matrix Norms Constructing Lossless Watermarking. 294-298 - Dariusz Malyszko, Slawomir T. Wierzchon

:
Standard and Genetic k-means Clustering Techniques in Image Segmentation. 299-304 - Ban N. Thanoon

:
Using Wavelet Transform, DPCM and Adaptive Run-length Coding to Compress Images. 305-309 - Jaroslaw Kilon, Aida Saeed-Baginska, Jerzy Sienkiewicz, Romuald Mosdorf

:
Nonlinear and Frequency Analysis of the Weather in Bialystok. 310-315 - Jerzy Sas, Urszula Markowska-Kaczmar

:
Semi-Supervised Handwritten Word Segmentation Using Character Samples Similarity Maximization and Evolutionary Algorithm. 316-321 - Pawel Tadejko

, Waldemar Rakowski
:
Mathematical Morphology Based ECG Feature Extraction for the Purpose of Heartbeat Classification. 322-327 - Wojciech S. Mokrzycki, Andrzej Salamonczyk

:
Using Shaded Views in 3D Multiview Representation of Monotonous Polyhedron. 328-336
Computer System Engineering
- Maciej Brzozowski, Vyacheslav N. Yarmolik:

Obfuscation as Intellectual Rights Protection in VHDL Language. 337-340 - S. V. Yarmolik, Ireneusz Mrozek

, Bartosz Sokol:
Address Sequences Generation for Multiple Run Memory Testing. 341-344 - Valery Salauyou, Tomasz Grzes

:
FSM State Assignment Methods for Low-Power Design. 345-350
Industrial Management
- Jan Jekielek:

Managing Information on Industrial Automation Projects. 351-356 - Joanna Moczydlowska:

Organizational Knowledge Measurement. 357-363 - Milena Tvrdíková

:
Support of Decision Making by Business Intelligence Tools. 364-368 - Anna Zajkowska, Wojciech Zimnoch, Khalid Saeed:

A Study on the Importance of Biometric Technique Selection in the Protection of Company Resources. 369-374 - Anna Strychalska-Rudzewicz

:
Cooperation of Enterprises in the Area of Innovative Activity. 375-379 - Marcin Paprzycki

, Maria Ganzha:
Adapting Price Negotiations to an E-commerce System Scenario. 380-386

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














