


default search action
17th CISIM 2018: Olomouc, Czech Republic
- Khalid Saeed, Wladyslaw Homenda:

Computer Information Systems and Industrial Management - 17th International Conference, CISIM 2018, Olomouc, Czech Republic, September 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11127, Springer 2018, ISBN 978-3-319-99953-1
Biometrics and Pattern Recognition Applications
- Dorota Duda

, Noura Azzabou, Jacques D. de Certaines:
Multi-muscle Texture Analysis for Dystrophy Development Identification in Golden Retriever Muscular Dystrophy Dogs. 3-15 - Aneta Górniak

, Ewa Skubalska-Rafajlowicz
:
Tissue Recognition on Microscopic Images of Histological Sections Using Sequences of Zernike Moments. 16-26 - Lukasz Hamera

, Lukasz Wieclaw:
A Study of Friction Ridge Distortion Effect on Automated Fingerprint Identification System - Database Evaluation. 27-36 - Lukasz Jelen

, Michal Kulus
, Tomasz Jurek
:
Pattern Recognition Framework for Histological Slide Segmentation. 37-45 - Vasyl P. Martsenyuk

, Dmytro Vakulenko
, Ludmyla Vakulenko
, Aleksandra Klos-Witkowska
, Oksana Kutakova
:
Information System of Arterial Oscillography for Primary Diagnostics of Cardiovascular Diseases. 46-56 - Bartosz Miselis, Michal Kulus

, Tomasz Jurek
, Andrzej Rusiecki
, Lukasz Jelen
:
Deep Neural Network for Whole Slide Vein Segmentation. 57-67 - Bartlomiej Placzek, Marcin Lewandowski, Rafal J. Buldak, Marek Michalski

:
Automated Immunohistochemical Stains Analysis for Computer-Aided Diagnosis of Parathyroid Disease. 68-79 - Maciej Szymkowski

, Khalid Saeed:
Finger Veins Feature Extraction Algorithm Based on Image Processing Methods. 80-91 - Magdalena Wiercioch:

On Modeling Objects Using Sequence of Moment Invariants. 92-102
Computer Information Systems
- Marcin Bernas

, Jaroslaw Smyla
:
Light Sensor Based Vehicle and Pedestrian Detection Method for Wireless Sensor Network. 105-116 - Anasuya Chaudhuri, Shreya Banerjee, Anirban Sarkar:

Behavioral Analysis of Service Oriented Systems Using Event-B. 117-129 - Michal Choras, Agata Gielczyk

, Konstantinos P. Demestichas
, Damian Puchalski, Rafal Kozik
:
Pattern Recognition Solutions for Fake News Detection. 130-139 - Akmaljon Palvanov, Andrey Giyenko, Young Im Cho:

Development of Visibility Expectation System Based on Machine Learning. 140-153 - Ewaryst Rafajlowicz:

Robustness of Raw Images Classifiers Against the Class Imbalance - A Case Study. 154-165 - Ewa Skubalska-Rafajlowicz

:
Open-Set Face Classification for Access Monitoring Using Spatially-Organized Random Projections. 166-177
Industrial Management and Other Applications
- Daniela Landinez Lamadrid, Diana Gineth Ramírez Ríos

, Dionicio Neira-Rodado
, Fernando A. Crespo, Luis Ramirez
, Miguel Jimenez, William Manjarres:
Cooperation in Clusters: A Study Case in the Furniture Industry in Colombia. 181-192 - Ivo Martiník

:
Workflow Petri Nets with Time Stamps and Their Using in Project Management. 193-206 - Miroslaw Omieljanowicz

, Adam Klimowicz
, Grzegorz Rubin, Marek Gruszewski, Lukasz Zienkiewicz, Anna Lupinska-Dubicka, Marek Tabedzki
, Marcin Adamski
, Mariusz Rybnik, Maciej Szymkowski
:
Accident Simulation for Extended eCall System Without Integration in Existing Car Onboard Systems. 207-219 - Dominika Rysinska-Wojtasik, Anna Burduk

:
Integrated Risk Management in Production Systems. 220-229
Machine Learning and High Performance Computing
- Katarzyna Borowska

, Jaroslaw Stepaniuk
:
Granular Computing and Parameters Tuning in Imbalanced Data Preprocessing. 233-245 - Robert Burduk, Andrzej Kasprzak:

The Use of Geometric Mean in the Process of Integration of Three Base Classifiers. 246-253 - Lukasz Gadomer, Zenon A. Sosnowski

:
Parallel C-Fuzzy Random Forest. 254-265 - Ekaterina Grakova

, Katerina Slaninová
, Jan Martinovic
, Jan Krenek
, Jirí Hanzelka, Václav Svaton
:
Waste Collection Vehicle Routing Problem on HPC Infrastructure. 266-278 - Jirí Hanzelka, Michal Beloch

, Jan Krenek
, Jan Martinovic
, Katerina Slaninová
:
Betweenness Propagation. 279-287 - Michal Krumnikl

, Petr Bainar
, Jana Klímová
, Jan Kozuszník, Pavel Moravec
, Václav Svaton
, Pavel Tomancák:
SciJava Interface for Parallel Execution in the ImageJ Ecosystem. 288-299 - Vasyl P. Martsenyuk

, Igor Andrushchak
, Andrii Sverstiuk
, Aleksandra Klos-Witkowska
:
On Investigation of Stability and Bifurcation of Neural Network with Discrete and Distributed Delays. 300-313 - Lukás Vojácek

, Pavla Drázdilová, Jiri Dvorský:
Growing Neural Gas Based on Data Density. 314-323
Modelling and Optimization
- Durba Chatterjee, Satrap Rathore, Sanghita Bhattacharjee:

Switching Policy Based Energy Aware Routing Algorithm for Maximizing Lifetime in Wireless Sensor Networks. 327-340 - Tomasz Grzes

:
Multiple Codes State Assignment and Code Length Reduction for Power Minimization of Finite State Machines. 341-353 - Sukhendu Kanrar:

SME: A New Software Transactional Memory Based Mutual Exclusion Algorithm for Distributed Systems. 354-369 - Adam Klimowicz

:
Area Targeted Minimization Method of Finite State Machines for FPGA Devices. 370-379 - Elena Mielcová, Radomír Perzina

:
Additivity and Superadditivity in N-Person Cooperative Games with Attanassov Intuitionistic Fuzzy Expectations. 380-391 - Moumita Poddar, Rituparna Chaki, Debdutta Pal:

Congestion Control for IoT Using Channel Trust Based Approach. 392-404 - Valery Salauyou, Irena Bulatowa

:
Synthesis of High-Speed ASM Controllers with Moore Outputs by Introducing Additional States. 405-416 - Guillermo Talavera

, Antoni Portero
, Francky Catthoor
:
Impact of Address Generation on Multimedia Embedded VLIW Processors. 417-433 - Dhafer Thabet

, Sonia Ayachi Ghannouchi, Henda Hajjami Ben Ghézala
:
A Process Mining-Based Solution for Business Process Model Extension with Cost Perspective Context-Based Cost Data Analysis and Case Study. 434-446
Various Aspects of Computer Security
- Mateusz Klos

, Imed El Fray
:
Model of Secure Data Storage in the Cloud for Mobile Devices. 449-460 - Fabio Mondin, Agostino Cortesi

:
MySQL Extension Automatic Porting to PDO for PHP Migration and Security Improvement. 461-473 - Elena Nyemkova

, Zynovii Shandra
, Aleksandra Klos-Witkowska
, Lukasz Wieclaw:
Network Electronic Devices Authentication by Internal Electrical Noise. 474-485 - Sanggyu Shin, Yoichi Seto, Kumi Hasegawa, Ryotaro Nakata:

Proposal for a Privacy Impact Assessment Manual Conforming to ISO/IEC 29134: 2017. 486-498 - Gautam Srivastava

, Ashutosh Dhar Dwivedi
, Rajani Singh:
PHANTOM Protocol as the New Crypto-Democracy. 499-509 - Vitalii I. Yesin

, Maryna V. Yesina
, Serhii G. Rassomakhin
, Mikolaj P. Karpinski
:
Ensuring Database Security with the Universal Basis of Relations. 510-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














