


default search action
12. CISIM 2013: Krakow, Poland
- Khalid Saeed, Rituparna Chaki, Agostino Cortesi

, Slawomir T. Wierzchon
:
Computer Information Systems and Industrial Management - 12th IFIP TC8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013. Proceedings. Lecture Notes in Computer Science 8104, Springer 2013, ISBN 978-3-642-40924-0
Full Keynote Papers
- Mieczyslaw A. Klopotek:

What is the Value of Information - Search Engine's Point of View. 1-12 - Michal Wozniak

:
Application of Combined Classifiers to Data Stream Classification. 13-23
Invited Paper
- Anna Bartkowiak, Radoslaw Zimroz

:
Efficacy of Some Primary Discriminant Functions in Diagnosing Planetary Gearboxes. 24-35
Biometrics and Biometrics Applications
- Anna Plichta, Tomasz Gaciarz, Szymon Szominski:

Identification of Persons by Virtue of Hand Geometry. 36-46 - Marcin Rogowski, Khalid Saeed, Mariusz Rybnik

, Marek Tabedzki
, Marcin Adamski
:
User Authentication for Mobile Devices. 47-58 - Marcin Derlatka

:
Modified kNN Algorithm for Improved Recognition Accuracy of Biometrics System Based on Gait. 59-66 - Dariusz Frejlichowski, Piotr Czapiewski:

An Application of the Curvature Scale Space Shape Descriptor for Forensic Human Identification Based on Orthopantomograms. 67-76 - Pawel Kasprowski

:
The Impact of Temporal Proximity between Samples on Eye Movement Biometric Identification. 77-87 - Marek Penhaker

, Vladimir Kasik, Václav Snásel:
Biomedical Distributed Signal Processing and Analysis. 88-95 - Dorota Duda

, Marek Kretowski
, Johanne Bézy-Wendling:
Effect of Slice Thickness on Texture-Based Classification of Liver Dynamic CT Scans. 96-107 - Izabela Rejer, Pawel Górski:

Independent Component Analysis for EEG Data Preprocessing - Algorithms Comparison. 108-119 - Zoltán Erno Csajbók, Tamás Mihálydeák

, József Ködmön:
An Adequate Representation of Medical Data Based on Partial Set Approximation. 120-128
Pattern Recognition and Image Processing
- Soharab Hossain Shaikh

, Marek Tabedzki
, Nabendu Chaki
, Khalid Saeed:
Bengali Printed Character Recognition - A New Approach. 129-140 - Ömer Faruk Söylemez, Burhan Ergen:

Eye Location and Eye State Detection in Facial Images Using Circular Hough Transform. 141-147 - Pawel Forczmanski

, Piotr Labedz:
Recognition of Occluded Faces Based on Multi-subspace Classification. 148-157 - Krzysztof Misztal

, Jacek Tabor
:
Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing. 158-167 - Magdalena Ladniak, Adam Piórkowski

, Mariusz Mlynarczuk
:
The Data Exploration System for Image Processing Based on Server-Side Operations. 168-176 - Dariusz Borkowski

, Katarzyna Janczak-Borkowska:
Image Restoration Using Anisotropic Stochastic Diffusion Collaborated with Non Local Means. 177-189
Various Aspects of Computer Security
- Tomasz Hyla, Jerzy Pejas:

A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture. 190-205 - Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki

:
Study of Security Issues in Pervasive Environment of Next Generation Internet of Things. 206-217 - Maciej Rostanski

, Taras Mushynskyy:
Security Issues of IPv6 Network Autoconfiguration. 218-228 - Muhammad Kazim

, Rahat Masood
, Muhammad Awais Shibli, Abdul Ghafoor Abbasi:
Security Aspects of Virtualization in Cloud Computing. 229-240 - Michal Dolecki

, Ryszard Kozera
:
Threshold Method of Detecting Long-Time TPM Synchronization. 241-252 - Dariusz Frejlichowski, Katarzyna Gosciewska

, Pawel Forczmanski
, Adam Nowosielski
, Radoslaw Hofman:
The Removal of False Detections from Foreground Regions Extracted Using Adaptive Background Modelling for a Visual Surveillance System. 253-264 - Miroslaw Kurkowski

, Olga Siedlecka-Lamch
, Pawel Dudek:
Using Backward Induction Techniques in (Timed) Security Protocols Verification. 265-276 - Marcin Szpyrka, Bartosz Jasiul, Konrad S. Wrona

, Filip Dziedzic:
Telecommunications Networks Risk Assessment with Bayesian Networks. 277-288
Networking
- Ayan Kumar Das, Rituparna Chaki, Atreyee Biswas:

Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network. 289-300 - Saswati Mukherjee

, Matangini Chattopadhyay, Samiran Chattopadhyay
, Debarshi Kumar Sanyal, Roshni Neogy, Samanwita Pal:
A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network. 301-312 - Stepan Kuchar, Jan Martinovic

, Pavla Drázdilová, Katerina Slaninová
:
Synthetic Social Network Based on Competency-Based Description of Human Resources. 313-324 - Seiji Sugiyama, Atsushi Ikuta, Daisuke Yokozawa, Miyuki Shibata, Tohru Matsuura:

Displaying Genealogy with Adoptions and Multiple Remarriages Using the WHIteBasE. 325-336 - R. Latha, R. Nadarajan:

User Relevance for Item-Based Collaborative Filtering. 337-347 - Katerina Slaninová

, Jan Martinovic
, Roman Sperka
, Pavla Drázdilová:
Extraction of Agent Groups with Similar Behaviour Based on Agent Profiles. 348-357
Algorithms
- Krzysztof Gdawiec

:
Aesthetic Patterns from the Perturbed Orbits of Discrete Dynamical Systems. 358-366 - Przemyslaw Spurek, Jacek Tabor

, Krzysztof Misztal
:
Weighted Approach to Projective Clustering. 367-378 - Wojciech M. Czarnecki

, Igor T. Podolak:
Machine Learning with Known Input Data Uncertainty Measure. 379-388 - Ilona Bluemke

, Marcin Tarka:
Learning Algorithms in the Detection of Unused Functionalities in SOA Systems. 389-400 - Robert Burduk, Pawel Trajdos:

Construction of Sequential Classifier Using Confusion Matrix. 401-407 - Lukás Vojácek

, Jiri Dvorský:
Growing Neural Gas - A Parallel Approach. 408-419 - Robert Krupinski

:
Modified Moment Method Estimator for the Shape Parameter of Generalized Gaussian Distribution for a Small Sample Size. 420-429 - Ryszard Kozera

, Lyle Noakes, Piotr Szmielew:
Trajectory Estimation for Exponential Parameterization and Different Samplings. 430-441 - Wladyslaw Homenda, Mariusz Rybnik

:
Searching in the Structured Space of the Braille Music. 442-452
Industrial Applications
- Michal Holis, Lenka Skanderová

, Martin Placek, Jiri Dvorský, Ivan Zelinka:
Solving Steel Alloying Using Differential Evolution and SOMA. 453-464 - Tomasz Chlebus:

The Cost Estimation of Production Orders. 465-475 - Marcin Juszczynski, Arkadiusz Kowalski

:
Achieving Desired Cycle Times by Modelling Production Systems. 476-486 - Anna Burduk:

Artificial Neural Networks as Tools for Controlling Production Systems and Ensuring Their Stability. 487-498 - Rahma Boucetta:

Generalized Predictive Control for a Flexible Single-Link Manipulator. 499-510 - Sanjoy Kumar Paul

, Ruhul A. Sarker
, Daryl Essam
:
A Disruption Recovery Model in a Production-Inventory System with Demand Uncertainty and Process Reliability. 511-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














