![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
17th CISIM 2018: Olomouc, Czech Republic
- Khalid Saeed, Wladyslaw Homenda:
Computer Information Systems and Industrial Management - 17th International Conference, CISIM 2018, Olomouc, Czech Republic, September 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11127, Springer 2018, ISBN 978-3-319-99953-1
Biometrics and Pattern Recognition Applications
- Dorota Duda
, Noura Azzabou, Jacques D. de Certaines:
Multi-muscle Texture Analysis for Dystrophy Development Identification in Golden Retriever Muscular Dystrophy Dogs. 3-15 - Aneta Górniak
, Ewa Skubalska-Rafajlowicz
:
Tissue Recognition on Microscopic Images of Histological Sections Using Sequences of Zernike Moments. 16-26 - Lukasz Hamera
, Lukasz Wieclaw:
A Study of Friction Ridge Distortion Effect on Automated Fingerprint Identification System - Database Evaluation. 27-36 - Lukasz Jelen
, Michal Kulus
, Tomasz Jurek
:
Pattern Recognition Framework for Histological Slide Segmentation. 37-45 - Vasyl P. Martsenyuk
, Dmytro Vakulenko
, Ludmyla Vakulenko
, Aleksandra Klos-Witkowska
, Oksana Kutakova
:
Information System of Arterial Oscillography for Primary Diagnostics of Cardiovascular Diseases. 46-56 - Bartosz Miselis, Michal Kulus
, Tomasz Jurek
, Andrzej Rusiecki
, Lukasz Jelen
:
Deep Neural Network for Whole Slide Vein Segmentation. 57-67 - Bartlomiej Placzek, Marcin Lewandowski, Rafal J. Buldak, Marek Michalski
:
Automated Immunohistochemical Stains Analysis for Computer-Aided Diagnosis of Parathyroid Disease. 68-79 - Maciej Szymkowski
, Khalid Saeed:
Finger Veins Feature Extraction Algorithm Based on Image Processing Methods. 80-91 - Magdalena Wiercioch:
On Modeling Objects Using Sequence of Moment Invariants. 92-102
Computer Information Systems
- Marcin Bernas
, Jaroslaw Smyla
:
Light Sensor Based Vehicle and Pedestrian Detection Method for Wireless Sensor Network. 105-116 - Anasuya Chaudhuri, Shreya Banerjee, Anirban Sarkar:
Behavioral Analysis of Service Oriented Systems Using Event-B. 117-129 - Michal Choras, Agata Gielczyk
, Konstantinos P. Demestichas
, Damian Puchalski, Rafal Kozik
:
Pattern Recognition Solutions for Fake News Detection. 130-139 - Akmaljon Palvanov, Andrey Giyenko, Young Im Cho:
Development of Visibility Expectation System Based on Machine Learning. 140-153 - Ewaryst Rafajlowicz:
Robustness of Raw Images Classifiers Against the Class Imbalance - A Case Study. 154-165 - Ewa Skubalska-Rafajlowicz
:
Open-Set Face Classification for Access Monitoring Using Spatially-Organized Random Projections. 166-177
Industrial Management and Other Applications
- Daniela Landinez Lamadrid, Diana Gineth Ramírez Ríos
, Dionicio Neira-Rodado
, Fernando A. Crespo, Luis Ramirez
, Miguel Jimenez, William Manjarres:
Cooperation in Clusters: A Study Case in the Furniture Industry in Colombia. 181-192 - Ivo Martiník
:
Workflow Petri Nets with Time Stamps and Their Using in Project Management. 193-206 - Miroslaw Omieljanowicz
, Adam Klimowicz
, Grzegorz Rubin, Marek Gruszewski, Lukasz Zienkiewicz, Anna Lupinska-Dubicka, Marek Tabedzki
, Marcin Adamski
, Mariusz Rybnik, Maciej Szymkowski
:
Accident Simulation for Extended eCall System Without Integration in Existing Car Onboard Systems. 207-219 - Dominika Rysinska-Wojtasik, Anna Burduk
:
Integrated Risk Management in Production Systems. 220-229
Machine Learning and High Performance Computing
- Katarzyna Borowska
, Jaroslaw Stepaniuk
:
Granular Computing and Parameters Tuning in Imbalanced Data Preprocessing. 233-245 - Robert Burduk, Andrzej Kasprzak:
The Use of Geometric Mean in the Process of Integration of Three Base Classifiers. 246-253 - Lukasz Gadomer, Zenon A. Sosnowski
:
Parallel C-Fuzzy Random Forest. 254-265 - Ekaterina Grakova
, Katerina Slaninová
, Jan Martinovic
, Jan Krenek
, Jirí Hanzelka, Václav Svaton
:
Waste Collection Vehicle Routing Problem on HPC Infrastructure. 266-278 - Jirí Hanzelka, Michal Beloch
, Jan Krenek
, Jan Martinovic
, Katerina Slaninová
:
Betweenness Propagation. 279-287 - Michal Krumnikl
, Petr Bainar
, Jana Klímová
, Jan Kozuszník, Pavel Moravec
, Václav Svaton
, Pavel Tomancák:
SciJava Interface for Parallel Execution in the ImageJ Ecosystem. 288-299 - Vasyl P. Martsenyuk
, Igor Andrushchak
, Andrii Sverstiuk
, Aleksandra Klos-Witkowska
:
On Investigation of Stability and Bifurcation of Neural Network with Discrete and Distributed Delays. 300-313 - Lukás Vojácek
, Pavla Drázdilová, Jiri Dvorský:
Growing Neural Gas Based on Data Density. 314-323
Modelling and Optimization
- Durba Chatterjee, Satrap Rathore, Sanghita Bhattacharjee:
Switching Policy Based Energy Aware Routing Algorithm for Maximizing Lifetime in Wireless Sensor Networks. 327-340 - Tomasz Grzes
:
Multiple Codes State Assignment and Code Length Reduction for Power Minimization of Finite State Machines. 341-353 - Sukhendu Kanrar:
SME: A New Software Transactional Memory Based Mutual Exclusion Algorithm for Distributed Systems. 354-369 - Adam Klimowicz
:
Area Targeted Minimization Method of Finite State Machines for FPGA Devices. 370-379 - Elena Mielcová, Radomír Perzina
:
Additivity and Superadditivity in N-Person Cooperative Games with Attanassov Intuitionistic Fuzzy Expectations. 380-391 - Moumita Poddar, Rituparna Chaki, Debdutta Pal:
Congestion Control for IoT Using Channel Trust Based Approach. 392-404 - Valery Salauyou, Irena Bulatowa
:
Synthesis of High-Speed ASM Controllers with Moore Outputs by Introducing Additional States. 405-416 - Guillermo Talavera
, Antoni Portero
, Francky Catthoor
:
Impact of Address Generation on Multimedia Embedded VLIW Processors. 417-433 - Dhafer Thabet
, Sonia Ayachi Ghannouchi, Henda Hajjami Ben Ghézala
:
A Process Mining-Based Solution for Business Process Model Extension with Cost Perspective Context-Based Cost Data Analysis and Case Study. 434-446
Various Aspects of Computer Security
- Mateusz Klos
, Imed El Fray
:
Model of Secure Data Storage in the Cloud for Mobile Devices. 449-460 - Fabio Mondin, Agostino Cortesi
:
MySQL Extension Automatic Porting to PDO for PHP Migration and Security Improvement. 461-473 - Elena Nyemkova
, Zynovii Shandra
, Aleksandra Klos-Witkowska
, Lukasz Wieclaw:
Network Electronic Devices Authentication by Internal Electrical Noise. 474-485 - Sanggyu Shin, Yoichi Seto, Kumi Hasegawa, Ryotaro Nakata:
Proposal for a Privacy Impact Assessment Manual Conforming to ISO/IEC 29134: 2017. 486-498 - Gautam Srivastava
, Ashutosh Dhar Dwivedi
, Rajani Singh:
PHANTOM Protocol as the New Crypto-Democracy. 499-509 - Vitalii I. Yesin
, Maryna V. Yesina
, Serhii G. Rassomakhin
, Mikolaj P. Karpinski
:
Ensuring Database Security with the Universal Basis of Relations. 510-522
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.