


default search action
6th MCSS 2013: Kraków, Poland
- Andrzej Dziech, Andrzej Czyzewski

:
Multimedia Communications, Services and Security - 6th International Conference, MCSS 2013, Krakow, Poland, June 6-7, 2013. Proceedings. Communications in Computer and Information Science 368, Springer 2013, ISBN 978-3-642-38558-2 - Mateusz Baran

, Antoni Ligeza
:
Rule-Based Knowledge Management in Social Threat Monitor. 1-12 - Lukasz Beben, Bartlomiej Sniezynski:

Multiagent System for Pattern Searching in Billing Data. 13-24 - Szymon Bobek, Grzegorz J. Nalepa, Weronika T. Adrian

:
Mobile Context-Based Framework for Monitoring Threats in Urban Environment. 25-35 - Vladimír Cipov, L'ubomír Dobos

, Ján Papaj:
Anchor-Free Localization Algorithm with Low-Complexity Method for Node Distance Estimation Enhancement Using ToA. 36-47 - Piotr Dalka, Piotr Bratoszewski:

Visual Detection of People Movement Rules Violation in Crowded Indoor Scenes. 48-58 - Mikolaj Leszczuk

, Joel Dumke
:
Survey of Recent Developments in Quality Assessment for Target Recognition Video. 59-70 - Ahmet Emir Dirik, Nasir D. Memon

:
Selective Robust Image Encryption for Social Networks. 71-81 - Alexandros Gavriilidis, Carsten Stahlschmidt, Jörg Velten, Anton Kummert:

Feature Recycling Cascaded SVM Classifier Based on Feature Selection of HOGs for Pedestrian Detection. 82-94 - Maciej Korczynski, Gilles Berger-Sabbatel, Andrzej Duda

:
Two Methods for Detecting Malware. 95-106 - Józef Kotus, Kuba Lopatka, Andrzej Czyzewski

, Georgis Bogdanis:
Audio-Visual Surveillance System for Application in Bank Operating Room. 107-120 - Aleksander Lamza

, Zygmunt Wróbel
, Andrzej Dziech:
Depth Estimation in Image Sequences in Single-Camera Video Surveillance Systems. 121-129 - Mikolaj Leszczuk

, Tomasz Piwowarczyk, Michal Grega:
Downloading and Analysing Images from the Internet in Order to Detect Special Objects. 130-143 - Aleksandra Maksimova:

Knife Detection Scheme Based on Possibilistic Shell Clustering. 144-152 - Sergey Matyunin, Dmitriy S. Vatolin

:
3D Video Compression Using Depth Map Propagation. 153-166 - Suraj Jung Pandey, Suresh Manandhar, Agnieszka Kleszcz:

Using Sub-sequence Patterns for Detecting Organ Trafficking Websites. 167-180 - Zbigniew Piotrowski

, Michal Ciolek
:
Changing the Voice of a Subscriber on the Example of an Implementation of the PSOLA Algorithm for the iOS and Android Mobile Platforms. 181-193 - Patrik Dubec, Jan Plucar, Lukás Rapant:

Use of the Bio-inspired Algorithms to Find Global Minimum in Force Directed Layout Algorithms. 194-203 - Krzysztof Rusek, Piotr Guzik

:
Neural Network Regression of Eyes Location in Face Images. 204-212 - Carsten Stahlschmidt, Alexandros Gavriilidis, Jörg Velten, Anton Kummert:

People Detection and Tracking from a Top-View Position Using a Time-of-Flight Camera. 213-223 - Maciej Szczodrak, Andrzej Czyzewski

:
Video Analytics-Based Algorithm for Monitoring Egress from Buildings. 224-232 - Piotr Szwed

, Pawel Skrzynski, Pawel Grodniewicz:
Risk Assessment for SWOP Telemonitoring System Based on Fuzzy Cognitive Maps. 233-247 - Piotr Szwed

, Igor Wojnicki, Sebastian Ernst
, Andrzej Glowacz:
Application of New ATAM Tools to Evaluation of the Dynamic Map Architecture. 248-261 - Grzegorz Szwoch

, Maciej Szczodrak:
Detection of Moving Objects in Images Combined from Video and Thermal Cameras. 262-272 - Manuel Urueña, Petr Machník, Marcin Niemiec

, Nikolai T. Stoianov
:
INDECT Security Architecture. 273-287 - Eva Kiktová

, Martin Lojka, Matús Pleva
, Jozef Juhár
, Anton Cizmar:
Comparison of Different Feature Types for Acoustic Event Detection System. 288-297 - Jakob Wassermann:

New Robust Video Watermarking Techniques Based on DWT Transform and Spread Spectrum of Basis Images of 2D Hadamard Transform. 298-308 - Katarzyna Zarnowiec, Pawel Korus

, Andrzej Dziech, Andrzej Glowacz:
Practical Implementation of Visual Hash Functions for CCTV Footage Authentication. 309-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














