


default search action
15. CISIM 2017: Bialystok, Poland
- Khalid Saeed, Wladyslaw Homenda, Rituparna Chaki:

Computer Information Systems and Industrial Management - 16th IFIP TC8 International Conference, CISIM 2017, Bialystok, Poland, June 16-18, 2017, Proceedings. Lecture Notes in Computer Science 10244, Springer 2017, ISBN 978-3-319-59104-9
Algorithms
- Agnieszka Jastrzebska

, Rafael Toro Sluzhenko:
Pattern Classification with Rejection Using Cellular Automata-Based Filtering. 3-14 - Artur Malinowski

, Pawel Czarnul
:
Distributed NVRAM Cache - Optimization and Evaluation with Power of Adjacency Matrix. 15-26 - Ireneusz Mrozek

, Vyacheslav N. Yarmolik:
Optimal Controlled Random Tests. 27-38 - Kamil Musial, Joanna Kotowska, Dagmara Górnicka

, Anna Burduk
:
Tabu Search and Greedy Algorithm Adaptation to Logistic Task. 39-49 - Krzysztof Ostrowski

:
Evolutionary Algorithm for the Time-Dependent Orienteering Problem. 50-62 - Lukás Vojácek

, Pavla Drázdilová, Jiri Dvorský:
Optimalization of Parallel GNG by Neurons Assigned to Processes. 63-72 - Lamia Zouhaier, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:

Methodology for the Development of Accessible User Interfaces Based on Meta-Model Transformations: The Case of Blind Users. 73-84
Biometrics and Pattern Recognition Applications
- Monika Drewnik, Zbigniew Pasternak-Winiarski:

SVM Kernel Configuration and Optimization for the Handwritten Digit Recognition. 87-98 - Aneta Górniak

, Ewa Skubalska-Rafajlowicz
:
Object Classification Using Sequences of Zernike Moments. 99-109 - Milan Jicínský, Jaroslav Marek

:
New Year's Day Speeches of Czech Presidents: Phonetic Analysis and Text Analysis. 110-121 - Izabela Rejer

, Robert Burduk:
Classifier Selection for Motor Imagery Brain Computer Interface. 122-130 - Maciej Szymkowski

, Khalid Saeed:
A Multimodal Face and Fingerprint Recognition Biometrics System. 131-140 - Tomasz Emanuel Wesolowski

, Rafal Doroz
, Krzysztof Wrobel
, Hossein Safaverdi:
Keystroke Dynamics and Finger Knuckle Imaging Fusion for Continuous User Verification. 141-152
Data Analysis and Information Retrieval
- Anna M. Bartkowiak

, Jerzy Liebhart:
NMF in Screening Some Spirometric Data, an Insight into 12-Dimensional Data Space. 155-166 - Lukasz Gadomer, Marcin Skoczylas

:
Gesture Recognition in 3D Space Using Dimensionally Reduced Set of Features. 167-179 - Lukasz Gadomer, Zenon A. Sosnowski

:
Using Cluster-Context Fuzzy Decision Trees in Fuzzy Random Forest. 180-192 - Krzysztof Hajto, Konrad Kamieniecki, Krzysztof Misztal

, Przemyslaw Spurek:
Split-and-merge Tweak in Cross Entropy Clustering. 193-204 - Ladislav Marsik

, Martin Rusek
, Katerina Slaninová
, Jan Martinovic
, Jaroslav Pokorný:
Evaluation of Chord and Chroma Features and Dynamic Time Warping Scores on Cover Song Identification Task. 205-217 - Janusz Rafalko

:
Algorithms for Automatic Selection of Allophones to the Acoustic Units Database. 218-226
Engineering of Enterprise Software Products
- Malik Khurram Awan, Agostino Cortesi

:
Blockchain Transaction Analysis Using Dominant Sets. 229-239 - Shreya Banerjee, Anirban Sarkar:

Ontology Driven Conceptualization of Context-Dependent Data Streams and Streaming Databases. 240-252 - Sukriti Bhattacharya, Prasun Banerjee

:
Towards the Exploitation of Statistical Language Models for Sentiment Analysis of Twitter Posts. 253-263 - Manali Chakraborty, Novarun Deb

, Nabendu Chaki
:
POMSec: Pseudo-Opportunistic, Multipath Secured Routing Protocol for Communications in Smart Grid. 264-276 - Priyanka Chakraborty

, Anirban Sarkar:
Context Driven Approach for Enterprise Architecture Framework. 277-289 - Ayan Kumar Das, Rituparna Chaki:

Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network. 290-302 - Martin Golasowski, João Bispo

, Jan Martinovic
, Katerina Slaninová
, João M. P. Cardoso
:
Expressing and Applying C++ Code Transformations for the HDF5 API Through a DSL. 303-314 - Marcin Luckner, Aneta Roslan, Izabela Krzeminska

, Jaroslaw Legierski, Robert Kunicki:
Clustering of Mobile Subscriber's Location Statistics for Travel Demand Zones Diversity. 315-326 - Giridhar Maji

, Soumya Sen
, Amitrajit Sarkar:
Share Market Sectoral Indices Movement Forecast with Lagged Correlation and Association Rule Mining. 327-340 - Atanu Majumder, Sangeet Saha, Amlan Chakrabarti

:
Task Allocation Strategies for FPGA Based Heterogeneous System on Chip. 341-353 - Tadeusz Nowicki

, Robert Waszkowski
:
Productivity Oriented Cooperative Approach to Scheduling IT Project Tasks. 354-365 - Shivani Saini, Sunil Saumya

, Jyoti Prakash Singh
:
Sequential Purchase Recommendation System for E-Commerce Sites. 366-375
Industrial Management and Other Applications
- Anna Burduk

, Damian Krenczyk
:
Risk Assessment in a Parallel Production System with the Use of FMEA Method and Linguistic Variables. 379-390 - Olfa Chebbi, Ezzeddine Fatnassi:

The Multi Depot One-to-One Pickup and Delivery Problem with Distance Constraints: Real World Application and Heuristic Solution Approach. 391-401 - Michal Kruk

, Bartosz Swiderski
, Katarzyna Smietanska
, Jaroslaw Kurek
, Leszek J. Chmielewski
, Jaroslaw Górski, Arkadiusz Orlowski
:
Detection of 'Orange Skin' Type Surface Defects in Furniture Elements with the Use of Textural Features. 402-411 - Batyrkhan Omarov

, Aigerim Bakatkaliyevna Altayeva
, Young Im Cho:
Smart Building Climate Control Considering Indoor and Outdoor Parameters. 412-422 - Walenty Oniszczuk:

Service Strategies in Two-Server Tandem Configurations - Modeling and Investigation. 423-435 - Ewaryst Rafajlowicz, Wojciech Rafajlowicz:

Image-Driven Decision Making with Application to Control Gas Burners. 436-446 - Ewa Skubalska-Rafajlowicz

:
Sparse Random Projections of Camera Images for Monitoring of a Combustion Process in a Gas Burner. 447-456
Modelling and Optimization
- Katarzyna Borowska

, Jaroslaw Stepaniuk
:
Rough Sets in Imbalanced Data Problem: Improving Re-sampling Process. 459-469 - Germanas Budnikas

:
A Model of Machine Learning Based Interactive E-business Website. 470-480 - Sankhadeep Chatterjee

, Rhitaban Nag, Soumya Sen
, Amitrajit Sarkar:
Towards Golden Rule of Capital Accumulation: A Genetic Algorithm Approach. 481-491 - Ezzeddine Fatnassi, Hadhami Kaabi:

A Multi-agent System Model for the Personal Rapid Transit System. 492-501 - Wiktor Jakowluk

:
Fractional-Order Linear Systems Modeling in Time and Frequency Domains. 502-513 - Joanna Karbowska-Chilinska

, Pawel Zabielski
:
Maximization of Attractiveness EV Tourist Routes. 514-525 - Adam Klimowicz

:
Synthesis Method of Finite State Machines Based on State Minimization for Low Power Design. 526-535 - Marcin Lewandowski, Bartlomiej Placzek, Marcin Bernas

:
Self-organizing Traffic Signal Control with Prioritization Strategy Aided by Vehicular Sensor Network. 536-547 - Shibendu Mahata, Suman Kumar Saha, Rajib Kar, Durbadal Mandal:

Infinite Impulse Response Approximations to the Non-integer Order Integrator Using Cuckoo Search Algorithm. 548-556 - Kamil Mielcarek

, Alexander Barkalov, Larisa Titarenko:
Designing Moore FSM with Transformation of State Codes. 557-568 - Tomasz Ozanski:

Efficient Simulation of Interacting Particle Systems in Continuous Space and Time. 569-579 - Pawel Rajba

, Mieczyslaw Wodecki
:
Sampling Method for the Flow Shop with Uncertain Parameters. 580-591 - Valery Salauyou, Michal Ostapczuk:

State Assignment of Finite-State Machines by Using the Values of Input Variables. 592-603 - Tatjana Sidekerskiene

, Marcin Wozniak
, Robertas Damasevicius:
Nonnegative Matrix Factorization Based Decomposition for Time Series Modelling. 604-613
Various Aspects of Computer Security
- Kamil Brenski, Maciej Choluj, Marcin Luckner:

Evil-AP - Mobile Man-in-the-Middle Threat. 617-627 - Mohanad Halaweh

:
Intention to Adopt the Cash on Delivery (COD) Payment Model for E-commerce Transactions: An Empirical Study. 628-637 - Tomasz Hyla

, Jerzy Pejas
:
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack. 638-651 - Rafal Kozik

, Robert Mlodzikowski, Michal Choras:
Netflow-Based Malware Detection and Data Visualisation System. 652-660 - Marcin Luckner, Bartosz Topolski, Magdalena Mazurek:

Application of XGBoost Algorithm in Fingerprinting Localisation Task. 661-671 - Pavel Moravec

, Michal Krumnikl
:
Developing Countermeasures against Cloning of Identity Tokens in Legacy Systems. 672-684 - Sanggyu Shin, Yoichi Seto, Mayumi Sasaki, Kei Sakamoto:

Analysis of Specific Personal Information Protection Assessment in the Social Security and Tax Number System of Local Governments in Japan. 685-696 - Gerard Wawrzyniak

, Imed El Fray
:
The Implementation of Electronic Document in Transaction Execution. 697-708

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














