


default search action
13. CISIM 2014: Ho Chi Minh City, Vietnam
- Khalid Saeed, Václav Snásel:

Computer Information Systems and Industrial Management - 13th IFIP TC8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014. Proceedings. Lecture Notes in Computer Science 8838, Springer 2014, ISBN 978-3-662-45236-3
Keynote Papers
- Ngoc Thanh Nguyen:

Processing Collective Knowledge - Conflict Resolution and Integration Aspects - (Keynote Speech). 1-4 - Jaroslav Pokorný:

How to Store and Process Big Data: Are Today's Databases Sufficient? 5-10
Algorithms
- Ammlan Ghosh

, Anubhab Sahin, Anirban Silsarma, Rituparna Chaki:
A New Contention Management Technique for Obstruction Free Transactional Memory. 11-22 - Dariusz Jankowski, Konrad Jackowski:

Evolutionary Algorithm for Decision Tree Induction. 23-32 - Tien Lu, Bay Vo, Hien T. Nguyen, Tzung-Pei Hong

:
A New Method for Mining High Average Utility Itemsets. 33-42 - Malgorzata Lucinska, Slawomir T. Wierzchon:

Spectral Clustering Based on Analysis of Eigenvector Properties. 43-54 - Hieu Ngoc Duong, Quyen Ngoc Thi Nguyen, Long Ta Bui, Hien T. Nguyen, Václav Snásel:

Applying Recurrent Fuzzy Neural Network to Predict the Runoff of Srepok River. 55-66 - Roman Senkerik, Michal Pluhacek, Ivan Zelinka, Donald Davendra, Zuzana Komínková Oplatková

:
Comparison of Chaos Driven PSO and Differential Evolution on the Selected PID Tuning Problem. 67-76 - Vaclav Svaton, Jan Martinovic, Katerina Slaninová, Václav Snásel:

Improving Rule Selection from Robot Soccer Strategy with Substrategies. 77-88 - Loc Hoang Tran, Linh Hoang Tran, Hoang Trang:

Novel Ranking Methods Applied to Complex Membership Determination Problems. 89-99 - Lukás Vojácek, Pavla Drázdilová, Jiri Dvorský:

Combination of Self Organizing Maps and Growing Neural Gas. 100-111
Biometrics and Biometrics Applications
- Tapalina Bhattasali, Khalid Saeed, Nabendu Chaki, Rituparna Chaki:

A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud. 112-121 - Piotr Panasiuk, Marcin Dabrowski, Khalid Saeed, Katarzyna Bochenska-Wlostowska:

On the Comparison of the Keystroke Dynamics Databases. 122-129 - Emil Saeed

, Anna Bartocha, Piotr Wachulec, Khalid Saeed:
Influence of Eye Diseases on the Retina Pattern Recognition. 130-140 - Adam Szczepanski, Krzysztof Misztal

, Khalid Saeed:
Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices. 141-150
Data Analysis and Information Retrieval
- Dariusz Rafal Augustyn:

Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions. 151-164 - Alisa Babskova, Jan Martinovic, Pavla Drázdilová, Katerina Slaninová:

Dynamic Centrality for Directed Co-author Network with Context. 165-174 - Thinh D. Bui, Son T. Nguyen, Quoc B. Ho:

Towards a Conceptual Search for Vietnamese Legal Text. 175-185 - Huu-Thanh Duong, Bao-Quoc Ho:

A Vietnamese Question Answering System in Vietnam's Legal Documents. 186-197 - Ywen Huang, Zhua Jiang, Xde Xiang, Cneng He, Jfeng Liu, Ying Huang:

An Inner-Enterprise Wiki System (IWkS) Integrated with an Expert Finding Mechanism for Lesson-Learned Knowledge Accumulation in Product Design. 198-208 - Worapot Jakkhupan, Supasit Kajkamhaeng:

Movie Recommendation Using OLAP and Multidimensional Data Model. 209-218 - Wladyslaw Homenda, Wojciech Lesinski:

Decision Trees and Their Families in Imbalanced Pattern Recognition: Recognition with and without Rejection. 219-230 - Mai Nhat Vinh, Nguyen Nhat Duy, Ho Thi Hoang Vy, Le Nguyen Hoai Nam:

An Approach for Integrating Multidimensional Database into Context-Aware Recommender System. 231-242 - Hien T. Nguyen, Phuc H. Duong

, Vinh T. Vo:
Vietnamese Sentence Similarity Based on Concepts. 243-253 - Santanu Roy, Ranak Ghosh, Soumya Sen

:
Materialized View Construction Based on Clustering Technique. 254-265 - Petr Saloun, Peter Drábik, Ivan Zelinka, Jaroslav Bucko:

Big Data Spectra Analysis Using Analytical Programming and Random Decision Forests. 266-277 - Ryszard Tadeusiewicz, Adrian Horzyk:

Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification. 278-289
Industrial Management and Other Applications
- Dusan Fedorcák, Tomás Kocyan, Martin Hájek, Daniela Szturcová, Jan Martinovic

:
viaRODOS: Monitoring and Visualisation of Current Traffic Situation on Highways. 290-300 - Stepán Ozana, Martin Pies

, Radovan Hájovský:
Computation of Swing-up Signal for Inverted Pendulum Using Dynamic Optimization. 301-314 - Antoni Portero, Stepán Kuchár, Radim Vavrík, Martin Golasowski, Vít Vondrák:

System and Application Scenarios for Disaster Management Processes, the Rainfall-Runoff Model Case Study. 315-326 - Paramita Sarkar, Ditipriya Sinha:

An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse. 327-338 - Seiji Sugiyama, Daisuke Yokozawa, Atsushi Ikuta, Satoshi Hiratsuka, Susumu Saito, Miyuki Shibata, Tohru Matsuura:

Abbreviation Method for Some Jointed Relations in Displaying Genealogy. 339-350 - Muhammad Waseem Anwar

, Farooque Azam:
Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems. 351-362
Modelling and Optimization
- Adrija Bhattacharya, Avirup Das, Sankhayan Choudhury, Nabendu Chaki:

Agent-Based Context Management for Service-Oriented Environments. 363-374 - Ripon Kumar Chakrabortty

, Ruhul Amin Sarker, Daryl Essam:
Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem. 375-386 - Juan Carlos Figueroa García, Emanuel Jonathan Medina-Pinzón, Jannan David Rubio-Espinosa:

Non-cooperative Games Involving Type-2 Fuzzy Uncertainty: An Approach. 387-396 - Wladyslaw Homenda, Agnieszka Jastrzebska, Witold Pedrycz:

Joining Concept's Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling. 397-408 - Wladyslaw Homenda, Agnieszka Jastrzebska, Witold Pedrycz:

Time Series Modeling with Fuzzy Cognitive Maps: Simplification Strategies - The Case of a Posteriori Removal of Nodes and Weights. 409-420 - Hong-Quan Hua, T. Hoang Ngan Le

, Bac Le:
An Effective Initialization for ASM-Based Methods. 421-432 - Phan T. H. Nguyen, Thang H. Bui:

A Multiple Refinement Approach in Abstraction Model Checking. 433-444 - Michal Pluhacek, Roman Senkerik, Ivan Zelinka:

Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation - An Initial Study. 445-454 - Ivan Zelinka, Petr Saloun, Roman Senkerik:

Chaos Powered Grammatical Evolution. 455-464
Networking
- Przemyslaw Berezinski, Marcin Szpyrka, Bartosz Jasiul, Michal Mazur:

Network Anomaly Detection Using Parameterized Entropy. 465-478 - Jan Dvorak, Ondrej Berger, Ondrej Krejcar:

Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts - Case Study on Low Cost Smart Solution. 479-488 - Daniel Oliveira, Diana Oliveira, Nuno M. Garcia

, Graça Esgalhado
:
An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service. 489-500 - Stepán Ozana, Martin Pies

, Radovan Hájovský, Jirí Koziorek
, Ondrej Horácek:
Application of PIL Approach for Automated Transportation Center. 501-513 - Anna Pieta, Michal Lupa, Monika Chuchro

, Adam Piórkowski, Andrzej Lesniak
:
A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring. 514-525 - Chien-Wen Shen, Chin-Jin Kuo:

Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter. 526-534 - Vo Dang Khoa, Tran Vu Pham, Huynh Tuong Nguyen, Tran Van Hoai:

Multi-criteria Route Planning in Bus Network. 535-546
Pattern Recognition and Image Processing
- Nhat-Quan Huynh Nguyen, Thai Hoang Le

:
Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching Weight Set. 547-558 - Przemyslaw Spurek, Alena Chaikouskaya, Jacek Tabor, Elzbieta Zajac:

A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves. 559-570 - Przemyslaw Spurek, Marek Smieja, Krzysztof Misztal

:
Subspaces Clustering Approach to Lossy Image Compression. 571-579 - Jakub Stolfa, Svatopluk Stolfa

, Katerina Slaninová, Jan Martinovic
, Václav Snásel:
An Impact of the User and Time Parameters to Sequence Alignment Methods for Process Mining. 580-591 - Puchong Subpratatsavee, Pramote Kuacharoen:

An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature. 592-601 - Puchong Subpratatsavee, Suchai Tanaiadehawoot:

Grasping Action for Impaired Vision Action Using HC2D Barcode Technology. 602-614
Various Aspects of Computer Security
- Maciej Brzozowski, Andrzej Chmielewski:

Hardware Approach for Generating b-detectors by Immune-Based Algorithms. 615-623 - Feng Xie, Yong Peng, Wei Zhao, Yang Gao, Xuefeng Han:

Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges. 624-635 - Imed El Fray, Tomasz Hyla, Wlodzimierz Chocianowicz:

Protection Profile for Secure Sensitive Information System on Mobile Devices. 636-650 - Tomasz Hyla, Witold Mackow, Jerzy Pejas:

Implicit and Explicit Certificates-Based Encryption Scheme. 651-666 - Bartosz Jasiul, Marcin Szpyrka, Joanna Sliwa:

Malware Behavior Modeling with Colored Petri Nets. 667-679 - Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:

A Proposal of Algorithm for Web Applications Cyber Attack Detection. 680-687 - Nguyen Van Nhuong, Vo Thi Yen Nhi, Nguyen Tan Cam, Phu Xuan Mai

, Cao Dang Tan:
Semantic Set Analysis for Malware Detection. 688-700

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














