


default search action
11. CISIM 2012: Venice, Italy
- Agostino Cortesi

, Nabendu Chaki
, Khalid Saeed, Slawomir T. Wierzchon
:
Computer Information Systems and Industrial Management - 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012. Proceedings. Lecture Notes in Computer Science 7564, Springer 2012, ISBN 978-3-642-33259-3
Invited Talks
- Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari

, Letterio Galletta, Gianluca Mezzetti:
Formalising Security in Ubiquitous and Cloud Scenarios. 1-29 - Young Im Cho:

Designing Smart Cities: Security Issues. 30-40
Security, Access Control and Intrusion Detection
- Tomasz Hyla, Jerzy Pejas:

Certificate-Based Encryption Scheme with General Access Structure. 41-55 - Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny:

Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks. 56-67 - Um-e-Ghazia, Rahat Masood

, Muhammad Awais Shibli, Muhammad Bilal:
Usage Control Model Specification in XACML Policy Language - XACML Policy Engine of UCON. 68-79 - Novarun Deb

, Nabendu Chaki:
TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks. 80-91 - Petr Gajdos

, Pavel Moravec:
Intruder Data Classification Using GM-SOM. 92-100 - Pavla Drázdilová, Alisa Babskova, Jan Martinovic, Katerina Slaninová, Stepan Minks:

Method for Identification of Suitable Persons in Collaborators' Networks. 101-110 - Subhasis Dasgupta

, Aditya Bagchi:
A Graph-Based Formalism for Controlling Access to a Digital Library Ontology. 111-122 - Aneta Poniszewska-Maranda

:
Role Approach in Access Control Development with the Usage Control Concept. 123-134
Pattern Recognition and Image Processing
- Krzysztof Misztal

, Jacek Tabor, Khalid Saeed:
A New Algorithm for Rotation Detection in Iris Pattern Recognition. 135-145 - Ryszard Kozera, Jacek Tchórzewski:

Outlier Removal in 2D Leap Frog Algorithm. 146-157 - Rafal Doroz

, Krzysztof Wrobel
:
Dynamic Signature Recognition Based on Modified Windows Technique. 158-167 - Andrea Albarelli, Filippo Bergamasco, Andrea Torsello:

Rigid and Non-rigid Shape Matching for Mechanical Components Retrieval. 168-179 - Boguslaw Cyganek:

Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors. 180-190
Biometric Applications
- Piotr Porwik

, Tomasz Orczyk
:
DTW and Voting-Based Lip Print Recognition System. 191-202 - Mariusz Rybnik, Piotr Panasiuk, Khalid Saeed, Marcin Rogowski

:
Advances in the Keystroke Dynamics: The Practical Impact of Database Quality. 203-214 - Marek Penhaker

, Petr Klimes, Jakub Pindor, David Korpas:
Advanced Intracardial Biosignal Processing. 215-223 - Hazar Mliki

, Mohamed Hammami
, Hanêne Ben-Abdallah
:
Multi-constraints Face Detect-Track System. 224-235 - Martin Augustynek

, Ondrej Adamec, David Micanik:
Using a Differential Pressure Sensor as Spirometer. 236-241
Algorithms and Data Management
- Andrzej Chmielewski, Slawomir T. Wierzchon:

Hybrid Negative Selection Approach for Anomaly Detection. 242-253 - Malgorzata Lucinska, Slawomir T. Wierzchon:

Spectral Clustering Based on k-Nearest Neighbor Graph. 254-265 - Soumya Sen

, Anjan Dutta, Agostino Cortesi
, Nabendu Chaki:
A New Scale for Attribute Dependency in Large Database Systems. 266-277 - Jan Martinovic, Pavla Drázdilová, Katerina Slaninová, Tomás Kocyan, Václav Snásel:

Left-Right Oscillate Algorithm for Community Detection Used in E-Learning System. 278-289 - Bartlomiej Józef Dzienkowski, Urszula Markowska-Kaczmar

:
Plan and Goal Structure Reconstruction: An Automated and Incremental Method Based on Observation of a Single Agent. 290-301 - Václav Snásel, Pavel Krömer, Jan Platos, Milos Kudelka, Zdenek Horak:

On Spectral Partitioning of Co-authorship Networks. 302-313 - Saswati Mukherjee, Matangini Chattopadhyay, Ayan Lahiri, Samiran Chattopadhyay:

An Efficient Binary Playfair Algorithm Using a 4×4 Playfair Key Matrix. 314-325 - Mariusz Rybnik, Wladyslaw Homenda:

Tuning of a Knowledge-Driven Harmonization Model for Tonal Music. 326-337 - Tomasz Sitarek, Wladyslaw Homenda:

Efficient Processing the Braille Music Notation. 338-350
Networking
- Manali Chakraborty, Nabendu Chaki:

ETSeM: A Energy-Aware, Trust-Based, Selective Multi-path Routing Protocol. 351-360 - Soumyabrata Saha

, Rituparna Chaki:
Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks. 361-373
System Models and Risk Assessment
- Bartosz Marcinkowski

, Michal Kuciapski
:
A Business Process Modeling Notation Extension for Risk Handling. 374-381 - Agnieszka Jastrzebska, Wladyslaw Homenda:

Modeling Consumer Decision Making Process with Triangular Norms. 382-394 - Rahma Boucetta, Mohamed Naceur Abdelkrim

:
Neural Network Modeling of a Flexible Manipulator Robot. 395-404 - Jiri Dvorský, Zbynek Janoska

, Lukás Vojácek:
P Systems for Traffic Flow Simulation. 405-415 - Michal Radecký

, Jan Martinovic, Dusan Fedorcák, Radek Tomis, Ivo Vondrák:
Using Extended Raster File for Real Time Traffic Information Mining. 416-427 - Imed El Fray:

A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems. 428-442

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














