callback( { "result":{ "query":":facetid:toc:\"db/conf/fedcsis/fedcsis2015.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"69.44" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"220", "@dc":"220", "@oc":"220", "@id":"43290688", "text":":facetid:toc:db/conf/fedcsis/fedcsis2015.bht" } }, "hits":{ "@total":"220", "@computed":"220", "@sent":"220", "@first":"0", "hit":[{ "@score":"1", "@id":"3534016", "info":{"authors":{"author":[{"@pid":"117/9791","text":"Miguel Ángel Abad"},{"@pid":"58/1631","text":"Ernestina Menasalvas"}]},"title":"Recurrent drifts: Aapplying fuzzy logic to concept similarity function.","venue":"FedCSIS","pages":"19-29","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/AbadM15","doi":"10.15439/2015F378","ee":"https://doi.org/10.15439/2015F378","url":"https://dblp.org/rec/conf/fedcsis/AbadM15"}, "url":"URL#3534016" }, { "@score":"1", "@id":"3534017", "info":{"authors":{"author":[{"@pid":"166/6627","text":"Krzysztof Adamiak"},{"@pid":"122/1779","text":"Dominik Zurek"},{"@pid":"31/5793","text":"Krzysztof Slot"}]},"title":"Liveness detection in remote biometrics based on gaze direction estimation.","venue":"FedCSIS","pages":"225-230","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/AdamiakZS15","doi":"10.15439/2015F307","ee":"https://doi.org/10.15439/2015F307","url":"https://dblp.org/rec/conf/fedcsis/AdamiakZS15"}, "url":"URL#3534017" }, { "@score":"1", "@id":"3534018", "info":{"authors":{"author":[{"@pid":"95/2060","text":"Radoslaw Adamus"},{"@pid":"52/3437","text":"Tomasz Marek Kowalski"},{"@pid":"67/3284","text":"Jacek Wislicki"}]},"title":"A step towards genuine declarative language-integrated queries.","venue":"FedCSIS","pages":"935-946","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/AdamusKW15","doi":"10.15439/2015F156","ee":"https://doi.org/10.15439/2015F156","url":"https://dblp.org/rec/conf/fedcsis/AdamusKW15"}, "url":"URL#3534018" }, { "@score":"1", "@id":"3534019", "info":{"authors":{"author":[{"@pid":"136/0006-2","text":"Saleh Alghamdi 0002"},{"@pid":"84/7668","text":"Natalia Beloff"}]},"title":"Exploring determinants of adoption and higher utilisation for e-Government: A study from business sector perspective in Saudi Arabia.","venue":"FedCSIS","pages":"1469-1479","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/AlghamdiB15","doi":"10.15439/2015F257","ee":"https://doi.org/10.15439/2015F257","url":"https://dblp.org/rec/conf/fedcsis/AlghamdiB15"}, "url":"URL#3534019" }, { "@score":"1", "@id":"3534020", "info":{"authors":{"author":[{"@pid":"164/2802","text":"Mona A. S. Ali"},{"@pid":"170/6250","text":"Gehad Ismail Sayed"},{"@pid":"05/10880","text":"Tarek Gaber"},{"@pid":"h/AboulEllaHassanien","text":"Aboul Ella Hassanien"},{"@pid":"s/VaclavSnasel","text":"Václav Snásel"},{"@pid":"20/7787","text":"Lincoln F. Silva"}]},"title":"Detection of breast abnormalities of thermograms based on a new segmentation method.","venue":"FedCSIS","pages":"255-261","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/AliSGHSS15","doi":"10.15439/2015F318","ee":"https://doi.org/10.15439/2015F318","url":"https://dblp.org/rec/conf/fedcsis/AliSGHSS15"}, "url":"URL#3534020" }, { "@score":"1", "@id":"3534021", "info":{"authors":{"author":[{"@pid":"120/3068","text":"Moh'd Alsqour"},{"@pid":"29/1114","text":"Mieczyslaw L. Owoc"}]},"title":"Benefits of knowledge acquisition systems for management. An empirical study.","venue":"FedCSIS","pages":"1691-1698","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/AlsqourO15","doi":"10.15439/2015F342","ee":"https://doi.org/10.15439/2015F342","url":"https://dblp.org/rec/conf/fedcsis/AlsqourO15"}, "url":"URL#3534021" }, { "@score":"1", "@id":"3534022", "info":{"authors":{"author":{"@pid":"64/10106","text":"Marcin Amarowicz"}},"title":"Management of requirements for the projects of the diagnostic systems.","venue":"FedCSIS","pages":"1655-1660","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Amarowicz15","doi":"10.15439/2015F175","ee":"https://doi.org/10.15439/2015F175","url":"https://dblp.org/rec/conf/fedcsis/Amarowicz15"}, "url":"URL#3534022" }, { "@score":"1", "@id":"3534023", "info":{"authors":{"author":[{"@pid":"07/9056","text":"Maria Angelova"},{"@pid":"03/6510","text":"Olympia Roeva"},{"@pid":"20/7110","text":"Tania Pencheva"}]},"title":"InterCriteria Analysis of crossover and mutation rates relations in simple genetic algorithm.","venue":"FedCSIS","pages":"419-424","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/AngelovaRP15","doi":"10.15439/2015F178","ee":"https://doi.org/10.15439/2015F178","url":"https://dblp.org/rec/conf/fedcsis/AngelovaRP15"}, "url":"URL#3534023" }, { "@score":"1", "@id":"3534025", "info":{"authors":{"author":{"@pid":"152/5761","text":"Artur Arciuch"}},"title":"Pattern of the global syndrome for multiprocessor system of H4 type for the MM model.","venue":"FedCSIS","pages":"1055-1058","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Arciuch15","doi":"10.15439/2015F36","ee":"https://doi.org/10.15439/2015F36","url":"https://dblp.org/rec/conf/fedcsis/Arciuch15"}, "url":"URL#3534025" }, { "@score":"1", "@id":"3534026", "info":{"authors":{"author":[{"@pid":"74/152","text":"László Aszalós"},{"@pid":"77/9832","text":"Tamás Mihálydeák"}]},"title":"Correlation clustering by contraction.","venue":"FedCSIS","pages":"425-434","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/AszalosM15","doi":"10.15439/2015F137","ee":"https://doi.org/10.15439/2015F137","url":"https://dblp.org/rec/conf/fedcsis/AszalosM15"}, "url":"URL#3534026" }, { "@score":"1", "@id":"3534027", "info":{"authors":{"author":[{"@pid":"120/2979","text":"Mohammad Azad"},{"@pid":"m/MJMoshkov","text":"Mikhail Moshkov"}]},"title":"Classification and optimization of decision trees for inconsistent decision tables represented as MVD tables.","venue":"FedCSIS","pages":"31-38","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/AzadM15","doi":"10.15439/2015F231","ee":"https://doi.org/10.15439/2015F231","url":"https://dblp.org/rec/conf/fedcsis/AzadM15"}, "url":"URL#3534027" }, { "@score":"1", "@id":"3534028", "info":{"authors":{"author":[{"@pid":"54/5092","text":"Marc Baboulin"},{"@pid":"170/6327","text":"Aygul Jamal"},{"@pid":"s/MashaSosonkina","text":"Masha Sosonkina"}]},"title":"Using Random Butterfly Transformations in parallel schur complement-based preconditioning.","venue":"FedCSIS","pages":"649-654","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/BaboulinJS15","doi":"10.15439/2015F177","ee":"https://doi.org/10.15439/2015F177","url":"https://dblp.org/rec/conf/fedcsis/BaboulinJS15"}, "url":"URL#3534028" }, { "@score":"1", "@id":"3534029", "info":{"authors":{"author":[{"@pid":"120/8274","text":"Michaela Bacíková"},{"@pid":"170/6216","text":"Martin Maricak"},{"@pid":"170/6304","text":"Matej Vancik"}]},"title":"Usability of a domain-specific language for a gesture-driven IDE.","venue":"FedCSIS","pages":"909-914","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/BacikovaMV15","doi":"10.15439/2015F274","ee":"https://doi.org/10.15439/2015F274","url":"https://dblp.org/rec/conf/fedcsis/BacikovaMV15"}, "url":"URL#3534029" }, { "@score":"1", "@id":"3534030", "info":{"authors":{"author":[{"@pid":"62/3460","text":"Andrzej Bak"},{"@pid":"73/2384","text":"Piotr Gajowniczek"},{"@pid":"77/6233","text":"Michal Zagozdzon"}]},"title":"Measurement methodology of TCP performance bottlenecks.","venue":"FedCSIS","pages":"1149-1156","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/BakGZ15","doi":"10.15439/2015F284","ee":"https://doi.org/10.15439/2015F284","url":"https://dblp.org/rec/conf/fedcsis/BakGZ15"}, "url":"URL#3534030" }, { "@score":"1", "@id":"3534031", "info":{"authors":{"author":[{"@pid":"170/6343","text":"Abdelkhalek Bakkari"},{"@pid":"04/7535","text":"Anna Fabijanska"}]},"title":"Segmentation of cerebrospinal fluid from 3D CT brain scans using modified Fuzzy C-Means based on super-voxels.","venue":"FedCSIS","pages":"809-818","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/BakkariF15","doi":"10.15439/2015F154","ee":"https://doi.org/10.15439/2015F154","url":"https://dblp.org/rec/conf/fedcsis/BakkariF15"}, "url":"URL#3534031" }, { "@score":"1", "@id":"3534032", "info":{"authors":{"author":[{"@pid":"02/2604","text":"Richard Banach"},{"@pid":"170/6232","text":"Pieter Van Schaik"},{"@pid":"50/868","text":"Eric Verhulst"}]},"title":"Simulation and formal modelling of yaw control in a drive-by-wire application.","venue":"FedCSIS","pages":"731-742","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/BanachSV15","doi":"10.15439/2015F132","ee":"https://doi.org/10.15439/2015F132","url":"https://dblp.org/rec/conf/fedcsis/BanachSV15"}, "url":"URL#3534032" }, { "@score":"1", "@id":"3534033", "info":{"authors":{"author":[{"@pid":"98/11056","text":"Tommy Baumann"},{"@pid":"74/8645","text":"Bernd Pfitzinger"},{"@pid":"71/4268","text":"Dragan Macos"},{"@pid":"75/8645","text":"Thomas Jestädt"}]},"title":"Enhanced simulation performance through parallelization using a synthetic and a real-world simulation model.","venue":"FedCSIS","pages":"1335-1341","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/BaumannPMJ15","doi":"10.15439/2015F226","ee":"https://doi.org/10.15439/2015F226","url":"https://dblp.org/rec/conf/fedcsis/BaumannPMJ15"}, "url":"URL#3534033" }, { "@score":"1", "@id":"3534034", "info":{"authors":{"author":[{"@pid":"133/4764","text":"Ismail Bennis"},{"@pid":"47/3278","text":"Hacène Fouchal"},{"@pid":"37/8654","text":"Ouadoudi Zytoune"},{"@pid":"36/2531","text":"Driss Aboutajdine"}]},"title":"Drip irrigation system using Wireless Sensor Networks.","venue":"FedCSIS","pages":"1297-1302","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/BennisFZA15","doi":"10.15439/2015F299","ee":"https://doi.org/10.15439/2015F299","url":"https://dblp.org/rec/conf/fedcsis/BennisFZA15"}, "url":"URL#3534034" }, { "@score":"1", "@id":"3534035", "info":{"authors":{"author":{"@pid":"69/5629","text":"Andrzej Bialas"}},"title":"Experimentation tool for critical infrastructures risk management.","venue":"FedCSIS","pages":"1099-1106","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Bialas15","doi":"10.15439/2015F77","ee":"https://doi.org/10.15439/2015F77","url":"https://dblp.org/rec/conf/fedcsis/Bialas15"}, "url":"URL#3534035" }, { "@score":"1", "@id":"3534036", "info":{"authors":{"author":[{"@pid":"59/3176","text":"Zane Bicevska"},{"@pid":"05/6279","text":"Janis Bicevskis"},{"@pid":"170/2541","text":"Ivo Oditis"}]},"title":"Smart technologies for improved software maintenance.","venue":"FedCSIS","pages":"1533-1538","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/BicevskaBO15","doi":"10.15439/2015F170","ee":"https://doi.org/10.15439/2015F170","url":"https://dblp.org/rec/conf/fedcsis/BicevskaBO15"}, "url":"URL#3534036" }, { "@score":"1", "@id":"3534037", "info":{"authors":{"author":[{"@pid":"72/877","text":"Halina Bielak"},{"@pid":"170/6269","text":"Kinga Dabrowska"},{"@pid":"170/6264","text":"Katarzyna Wolska"}]},"title":"On the generalized Wiener polarity index for some classes of graphs.","venue":"FedCSIS","pages":"483-487","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/BielakDW15","doi":"10.15439/2015F340","ee":"https://doi.org/10.15439/2015F340","url":"https://dblp.org/rec/conf/fedcsis/BielakDW15"}, "url":"URL#3534037" }, { "@score":"1", "@id":"3534038", "info":{"authors":{"author":[{"@pid":"72/877","text":"Halina Bielak"},{"@pid":"152/5689","text":"Kamil Powroznik"}]},"title":"The density Turán problem for some 3-uniform unihypercyclic linear hypergraphs An efficient testing algorithm.","venue":"FedCSIS","pages":"563-571","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/BielakP15","doi":"10.15439/2015F260","ee":"https://doi.org/10.15439/2015F260","url":"https://dblp.org/rec/conf/fedcsis/BielakP15"}, "url":"URL#3534038" }, { "@score":"1", "@id":"3534039", "info":{"authors":{"author":{"@pid":"51/5138","text":"Anna E. Bobkowska"}},"title":"Information logistics as a paradigm.","venue":"FedCSIS","pages":"1613-1621","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Bobkowska15","doi":"10.15439/2015F215","ee":"https://doi.org/10.15439/2015F215","url":"https://dblp.org/rec/conf/fedcsis/Bobkowska15"}, "url":"URL#3534039" }, { "@score":"1", "@id":"3534041", "info":{"authors":{"author":{"@pid":"94/5206","text":"Marc Boullé"}},"title":"Tagging fireworkers activities from body sensors under distribution drift.","venue":"FedCSIS","pages":"389-396","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Boulle15","doi":"10.15439/2015F423","ee":"https://doi.org/10.15439/2015F423","url":"https://dblp.org/rec/conf/fedcsis/Boulle15"}, "url":"URL#3534041" }, { "@score":"1", "@id":"3534043", "info":{"authors":{"author":[{"@pid":"04/1338","text":"Beata Bylina"},{"@pid":"03/3577","text":"Jaroslaw Bylina"}]},"title":"Strategies of parallelizing nested loops on the multicore architectures on the example of the WZ factorization for the dense matrices.","venue":"FedCSIS","pages":"629-639","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/BylinaB15","doi":"10.15439/2015F354","ee":"https://doi.org/10.15439/2015F354","url":"https://dblp.org/rec/conf/fedcsis/BylinaB15"}, "url":"URL#3534043" }, { "@score":"1", "@id":"3534044", "info":{"authors":{"author":[{"@pid":"170/6221","text":"Huaxiong Cao"},{"@pid":"61/3467","text":"Naijie Gu"},{"@pid":"45/5094","text":"Kaixin Ren"},{"@pid":"59/871","text":"Yi Li"}]},"title":"Performance research and optimization on CPython's interpreter.","venue":"FedCSIS","pages":"435-441","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/CaoGRL15","doi":"10.15439/2015F139","ee":"https://doi.org/10.15439/2015F139","url":"https://dblp.org/rec/conf/fedcsis/CaoGRL15"}, "url":"URL#3534044" }, { "@score":"1", "@id":"3534045", "info":{"authors":{"author":[{"@pid":"37/6254","text":"Giacomo Capizzi"},{"@pid":"145/7243","text":"Grazia Lo Sciuto"},{"@pid":"76/11227","text":"Christian Napoli"},{"@pid":"71/715","text":"Emiliano Tramontana"},{"@pid":"97/8296","text":"Marcin Wozniak"}]},"title":"Automatic classification of fruit defects based on co-occurrence matrix and neural networks.","venue":"FedCSIS","pages":"861-867","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/CapizziSNTW15","doi":"10.15439/2015F258","ee":"https://doi.org/10.15439/2015F258","url":"https://dblp.org/rec/conf/fedcsis/CapizziSNTW15"}, "url":"URL#3534045" }, { "@score":"1", "@id":"3534046", "info":{"authors":{"author":[{"@pid":"71/250","text":"Vincenza Carchiolo"},{"@pid":"13/2464","text":"Alessandro Longheu"},{"@pid":"25/971","text":"Michele Malgeri"},{"@pid":"88/3446","text":"Giuseppe Mangioni"}]},"title":"Multisource agent-based healthcare data gathering.","venue":"FedCSIS","pages":"1723-1729","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/CarchioloLMM15","doi":"10.15439/2015F302","ee":"https://doi.org/10.15439/2015F302","url":"https://dblp.org/rec/conf/fedcsis/CarchioloLMM15"}, "url":"URL#3534046" }, { "@score":"1", "@id":"3534047", "info":{"authors":{"author":[{"@pid":"42/1388","text":"Ufuk Celikkan"},{"@pid":"117/2606","text":"Kaan Kurtel"}]},"title":"A Platform for Context-Aware Application Development: PCAD.","venue":"FedCSIS","pages":"1481-1488","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/CelikkanK15","doi":"10.15439/2015F49","ee":"https://doi.org/10.15439/2015F49","url":"https://dblp.org/rec/conf/fedcsis/CelikkanK15"}, "url":"URL#3534047" }, { "@score":"1", "@id":"3534048", "info":{"authors":{"author":[{"@pid":"138/3769","text":"Cihat Cetinkaya"},{"@pid":"170/6337","text":"Yalcin Ozveren"},{"@pid":"18/8105","text":"Müge Sayit"}]},"title":"An SDN-assisted system design for improving performance of SVC-DASH.","venue":"FedCSIS","pages":"819-826","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/CetinkayaOS15","doi":"10.15439/2015F333","ee":"https://doi.org/10.15439/2015F333","url":"https://dblp.org/rec/conf/fedcsis/CetinkayaOS15"}, "url":"URL#3534048" }, { "@score":"1", "@id":"3534049", "info":{"authors":{"author":[{"@pid":"80/1839","text":"Prodromos D. Chatzoglou"},{"@pid":"11/10752","text":"Dimitrios Chatzoudes"},{"@pid":"168/3398","text":"Symeon Symeonidis"}]},"title":"Factors affecting the intention to use e-Government services.","venue":"FedCSIS","pages":"1489-1498","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ChatzoglouCS15","doi":"10.15439/2015F171","ee":"https://doi.org/10.15439/2015F171","url":"https://dblp.org/rec/conf/fedcsis/ChatzoglouCS15"}, "url":"URL#3534049" }, { "@score":"1", "@id":"3534052", "info":{"authors":{"author":[{"@pid":"39/25","text":"Witold Chmielarz"},{"@pid":"133/5737","text":"Marek Zborowski"}]},"title":"Comparative analysis of electronic banking websites in selected banks in Poland in 2014.","venue":"FedCSIS","pages":"1499-1504","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ChmielarzZ15","doi":"10.15439/2015F43","ee":"https://doi.org/10.15439/2015F43","url":"https://dblp.org/rec/conf/fedcsis/ChmielarzZ15"}, "url":"URL#3534052" }, { "@score":"1", "@id":"3534054", "info":{"authors":{"author":{"@pid":"58/4652","text":"Jacek Chmielewski"}},"title":"Run-time UI adaptation in the context of the Device-Independent Architecture.","venue":"FedCSIS","pages":"1157-1162","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Chmielewski15","doi":"10.15439/2015F259","ee":"https://doi.org/10.15439/2015F259","url":"https://dblp.org/rec/conf/fedcsis/Chmielewski15"}, "url":"URL#3534054" }, { "@score":"1", "@id":"3534056", "info":{"authors":{"author":[{"@pid":"141/6264","text":"Michal Chovanec"},{"@pid":"170/6281","text":"Peter Sarafín"}]},"title":"Real-time schedule for mobile robotics and WSN aplications.","venue":"FedCSIS","pages":"1199-1202","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ChovanecS15","doi":"10.15439/2015F146","ee":"https://doi.org/10.15439/2015F146","url":"https://dblp.org/rec/conf/fedcsis/ChovanecS15"}, "url":"URL#3534056" }, { "@score":"1", "@id":"3534057", "info":{"authors":{"author":[{"@pid":"120/3144","text":"Jan Chudzikiewicz"},{"@pid":"152/5619","text":"Tomasz Malinowski"},{"@pid":"141/6276","text":"Zbigniew Zielinski"}]},"title":"The method for optimal server placement in the hypercube networks.","venue":"FedCSIS","pages":"1163-1169","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ChudzikiewiczMZ15","doi":"10.15439/2015F157","ee":"https://doi.org/10.15439/2015F157","url":"https://dblp.org/rec/conf/fedcsis/ChudzikiewiczMZ15"}, "url":"URL#3534057" }, { "@score":"1", "@id":"3534058", "info":{"authors":{"author":[{"@pid":"44/4467","text":"Franco Cicirelli"},{"@pid":"85/5567","text":"Libero Nigro"}]},"title":"Modelling and verification of starvation-free mutual exclusion algorithms based on weak semaphores.","venue":"FedCSIS","pages":"773-779","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/CicirelliN15","doi":"10.15439/2015F32","ee":"https://doi.org/10.15439/2015F32","url":"https://dblp.org/rec/conf/fedcsis/CicirelliN15"}, "url":"URL#3534058" }, { "@score":"1", "@id":"3534059", "info":{"authors":{"author":[{"@pid":"44/4467","text":"Franco Cicirelli"},{"@pid":"166/5007","text":"Christian Nigro"},{"@pid":"85/5567","text":"Libero Nigro"}]},"title":"Qualitative and quantitative evaluation of stochastic Time Petri Nets.","venue":"FedCSIS","pages":"763-772","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/CicirelliNN15","doi":"10.15439/2015F69","ee":"https://doi.org/10.15439/2015F69","url":"https://dblp.org/rec/conf/fedcsis/CicirelliNN15"}, "url":"URL#3534059" }, { "@score":"1", "@id":"3534061", "info":{"authors":{"author":[{"@pid":"23/5803","text":"Massimo Cossentino"},{"@pid":"41/4762","text":"Carmelo Lodato"},{"@pid":"91/5590","text":"Patrizia Ribino"},{"@pid":"75/6973","text":"Valeria Seidita"}]},"title":"A heuristic for Problem Formalization in Agent Based Simulation studies.","venue":"FedCSIS","pages":"1733-1743","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/CossentinoLRS15","doi":"10.15439/2015F287","ee":"https://doi.org/10.15439/2015F287","url":"https://dblp.org/rec/conf/fedcsis/CossentinoLRS15"}, "url":"URL#3534061" }, { "@score":"1", "@id":"3534062", "info":{"authors":{"author":[{"@pid":"01/7453","text":"Salvatore Cuomo"},{"@pid":"144/7465","text":"Raffaele Farina"},{"@pid":"32/9987","text":"Ardelio Galletti"},{"@pid":"04/10646","text":"Livia Marcellino"}]},"title":"A K-iterated scheme for the first-order Gaussian Recursive Filter with boundary conditions.","venue":"FedCSIS","pages":"641-647","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/CuomoFGM15","doi":"10.15439/2015F286","ee":"https://doi.org/10.15439/2015F286","url":"https://dblp.org/rec/conf/fedcsis/CuomoFGM15"}, "url":"URL#3534062" }, { "@score":"1", "@id":"3534063", "info":{"authors":{"author":[{"@pid":"94/7100","text":"Jacek M. Czerniak"},{"@pid":"151/8582","text":"Wojciech T. Dobrosielski"},{"@pid":"146/0874","text":"Lukasz Apiecionek"},{"@pid":"151/8667","text":"Dawid Ewald"}]},"title":"Representation of a trend in OFN during fuzzy observance of the water level from the Crisis control center.","venue":"FedCSIS","pages":"443-447","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/CzerniakDAE15","doi":"10.15439/2015F217","ee":"https://doi.org/10.15439/2015F217","url":"https://dblp.org/rec/conf/fedcsis/CzerniakDAE15"}, "url":"URL#3534063" }, { "@score":"1", "@id":"3534064", "info":{"authors":{"author":[{"@pid":"94/7100","text":"Jacek M. Czerniak"},{"@pid":"161/9704","text":"Grzegorz Smigielski"},{"@pid":"151/8667","text":"Dawid Ewald"},{"@pid":"23/109","text":"Marcin Paprzycki"},{"@pid":"151/8582","text":"Wojciech T. Dobrosielski"}]},"title":"New proposed implementation of ABC method to optimization of Water Capsule Flight.","venue":"FedCSIS","pages":"489-493","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/CzerniakSEPD15","doi":"10.15439/2015F242","ee":"https://doi.org/10.15439/2015F242","url":"https://dblp.org/rec/conf/fedcsis/CzerniakSEPD15"}, "url":"URL#3534064" }, { "@score":"1", "@id":"3534068", "info":{"authors":{"author":[{"@pid":"08/1837","text":"David Defour"},{"@pid":"251/2068","text":"Caroline Collange"}]},"title":"Reproducible floating-point atomic addition in data-parallel environment.","venue":"FedCSIS","pages":"721-728","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/DefourC15","doi":"10.15439/2015F86","ee":"https://doi.org/10.15439/2015F86","url":"https://dblp.org/rec/conf/fedcsis/DefourC15"}, "url":"URL#3534068" }, { "@score":"1", "@id":"3534069", "info":{"authors":{"author":[{"@pid":"77/5407","text":"Stanislaw Deniziak"},{"@pid":"152/5587","text":"Leszek Ciopinski"}]},"title":"Synthesis of power aware adaptive schedulers for embedded systems using developmental genetic programming.","venue":"FedCSIS","pages":"449-459","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/DeniziakC15","doi":"10.15439/2015F313","ee":"https://doi.org/10.15439/2015F313","url":"https://dblp.org/rec/conf/fedcsis/DeniziakC15"}, "url":"URL#3534069" }, { "@score":"1", "@id":"3534070", "info":{"authors":{"author":[{"@pid":"77/5407","text":"Stanislaw Deniziak"},{"@pid":"170/6289","text":"Tomasz Michno"},{"@pid":"156/6495","text":"Adam Krechowicz"}]},"title":"The scalable distributed two-layer Content Based Image Retrieval data store.","venue":"FedCSIS","pages":"827-832","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/DeniziakMK15","doi":"10.15439/2015F272","ee":"https://doi.org/10.15439/2015F272","url":"https://dblp.org/rec/conf/fedcsis/DeniziakMK15"}, "url":"URL#3534070" }, { "@score":"1", "@id":"3534072", "info":{"authors":{"author":[{"@pid":"152/9570","text":"Ahmed Taki Eddine Dib"},{"@pid":"91/4506","text":"Zaïdi Sahnoun"}]},"title":"Model checking of Multi Agent System architectures using BigMC.","venue":"FedCSIS","pages":"1717-1722","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/DibS15","doi":"10.15439/2015F300","ee":"https://doi.org/10.15439/2015F300","url":"https://dblp.org/rec/conf/fedcsis/DibS15"}, "url":"URL#3534072" }, { "@score":"1", "@id":"3534073", "info":{"authors":{"author":[{"@pid":"157/0366","text":"Alice Dimonte"},{"@pid":"32/7572","text":"Tatiana Berzina"},{"@pid":"19/7571","text":"Victor Erokhin"}]},"title":"Basic transitions of Physarum polycephalum.","venue":"FedCSIS","pages":"599-606","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/DimonteBE15","doi":"10.15439/2015F237","ee":"https://doi.org/10.15439/2015F237","url":"https://dblp.org/rec/conf/fedcsis/DimonteBE15"}, "url":"URL#3534073" }, { "@score":"1", "@id":"3534074", "info":{"authors":{"author":[{"@pid":"73/5209","text":"Vladimir Dobrynin"},{"@pid":"170/6247","text":"Julia Balykina"},{"@pid":"170/6268","text":"Michael Kamalov"},{"@pid":"170/6272","text":"Alexey Kolbin"},{"@pid":"170/6300","text":"Elena Verbitskaya"},{"@pid":"170/6298","text":"Munira Kasimova"}]},"title":"The data retrieval optimization from the perspective of evidence-based medicine.","venue":"FedCSIS","pages":"323-328","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/DobryninBKKVK15","doi":"10.15439/2015F130","ee":"https://doi.org/10.15439/2015F130","url":"https://dblp.org/rec/conf/fedcsis/DobryninBKKVK15"}, "url":"URL#3534074" }, { "@score":"1", "@id":"3534075", "info":{"authors":{"author":[{"@pid":"22/10425","text":"Pawel Drag"},{"@pid":"25/10426","text":"Krystyn Styczen"}]},"title":"Simulated annealing with constraints aggregation for control of the multistage processes.","venue":"FedCSIS","pages":"461-469","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/DragS15","doi":"10.15439/2015F255","ee":"https://doi.org/10.15439/2015F255","url":"https://dblp.org/rec/conf/fedcsis/DragS15"}, "url":"URL#3534075" }, { "@score":"1", "@id":"3534076", "info":{"authors":{"author":[{"@pid":"06/10717","text":"Sylvain Ductor"},{"@pid":"170/6318","text":"Jesus-Javier Gil-Quijano"},{"@pid":"14/10718","text":"Nicolas Stefanovitch"},{"@pid":"170/6244","text":"Pierrick Roger Mele"}]},"title":"GRENAD, a modular and generic Smart-Grid framework.","venue":"FedCSIS","pages":"1781-1792","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/DuctorGSM15","doi":"10.15439/2015F310","ee":"https://doi.org/10.15439/2015F310","url":"https://dblp.org/rec/conf/fedcsis/DuctorGSM15"}, "url":"URL#3534076" }, { "@score":"1", "@id":"3534077", "info":{"authors":{"author":[{"@pid":"116/7515","text":"Helena Dudycz"},{"@pid":"29/1608","text":"Jerzy Korczak 0001"}]},"title":"Conceptual design of financial ontology.","venue":"FedCSIS","pages":"1505-1511","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/DudyczK15","doi":"10.15439/2015F162","ee":"https://doi.org/10.15439/2015F162","url":"https://dblp.org/rec/conf/fedcsis/DudyczK15"}, "url":"URL#3534077" }, { "@score":"1", "@id":"3534079", "info":{"authors":{"author":[{"@pid":"170/6288","text":"Sebastian Dziadzio"},{"@pid":"170/6326","text":"Aleksandra Nabozny"},{"@pid":"157/7699","text":"Aleksander Smywinski-Pohl"},{"@pid":"75/4632","text":"Bartosz Ziólko"}]},"title":"Comparison of language models trained on written texts and speech transcripts in the context of automatic speech recognition.","venue":"FedCSIS","pages":"193-197","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/DziadzioNSZ15","doi":"10.15439/2015F386","ee":"https://doi.org/10.15439/2015F386","url":"https://dblp.org/rec/conf/fedcsis/DziadzioNSZ15"}, "url":"URL#3534079" }, { "@score":"1", "@id":"3534080", "info":{"authors":{"author":[{"@pid":"75/1677","text":"Mateusz Dzida"},{"@pid":"62/3460","text":"Andrzej Bak"}]},"title":"Flow design in photonic data transport network.","venue":"FedCSIS","pages":"471-482","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/DzidaB15","doi":"10.15439/2015F148","ee":"https://doi.org/10.15439/2015F148","url":"https://dblp.org/rec/conf/fedcsis/DzidaB15"}, "url":"URL#3534080" }, { "@score":"1", "@id":"3534081", "info":{"authors":{"author":[{"@pid":"170/6291","text":"Walid Elgenaidi"},{"@pid":"02/3447","text":"Thomas Newe"}]},"title":"Trust security mechanism for marine Wireless Sensor Networks.","venue":"FedCSIS","pages":"1203-1208","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ElgenaidiN15","doi":"10.15439/2015F169","ee":"https://doi.org/10.15439/2015F169","url":"https://dblp.org/rec/conf/fedcsis/ElgenaidiN15"}, "url":"URL#3534081" }, { "@score":"1", "@id":"3534082", "info":{"authors":{"author":[{"@pid":"168/1119","text":"Anna Epishkina"},{"@pid":"168/1225","text":"Konstantin Kogos"}]},"title":"A random traffic padding to limit packet size covert channels.","venue":"FedCSIS","pages":"1107-1111","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/EpishkinaK15","doi":"10.15439/2015F88","ee":"https://doi.org/10.15439/2015F88","url":"https://dblp.org/rec/conf/fedcsis/EpishkinaK15"}, "url":"URL#3534082" }, { "@score":"1", "@id":"3534083", "info":{"authors":{"author":[{"@pid":"06/10698","text":"Marko Esche"},{"@pid":"158/3161","text":"Florian Thiel"}]},"title":"Software risk assessment for measuring instruments in legal metrology.","venue":"FedCSIS","pages":"1113-1123","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/EscheT15","doi":"10.15439/2015F127","ee":"https://doi.org/10.15439/2015F127","url":"https://dblp.org/rec/conf/fedcsis/EscheT15"}, "url":"URL#3534083" }, { "@score":"1", "@id":"3534084", "info":{"authors":{"author":[{"@pid":"170/6336","text":"Mohamed Eshaftri"},{"@pid":"46/89","text":"Ahmed Yassin Al-Dubai"},{"@pid":"23/3594","text":"Imed Romdhani"},{"@pid":"21/451","text":"Muneer Beni Yassien"}]},"title":"A new energy efficient Cluster Based Protocol for Wireless Sensor Networks.","venue":"FedCSIS","pages":"1209-1214","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/EshaftriARY15","doi":"10.15439/2015F193","ee":"https://doi.org/10.15439/2015F193","url":"https://dblp.org/rec/conf/fedcsis/EshaftriARY15"}, "url":"URL#3534084" }, { "@score":"1", "@id":"3534085", "info":{"authors":{"author":[{"@pid":"11/11387","text":"Aleksander Fafula"},{"@pid":"39/10982","text":"Krzysztof Drelczuk"}]},"title":"Buying stock market winners on Warsaw Stock Exchange - quantitative backtests of a short term trend following strategy.","venue":"FedCSIS","pages":"1361-1366","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/FafulaD15","doi":"10.15439/2015F338","ee":"https://doi.org/10.15439/2015F338","url":"https://dblp.org/rec/conf/fedcsis/FafulaD15"}, "url":"URL#3534085" }, { "@score":"1", "@id":"3534088", "info":{"authors":{"author":[{"@pid":"63/7444","text":"Anna Felkner"},{"@pid":"68/6980","text":"Adam Kozakiewicz"}]},"title":"More practical application of Trust management credentials.","venue":"FedCSIS","pages":"1125-1134","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/FelknerK15","doi":"10.15439/2015F95","ee":"https://doi.org/10.15439/2015F95","url":"https://dblp.org/rec/conf/fedcsis/FelknerK15"}, "url":"URL#3534088" }, { "@score":"1", "@id":"3534089", "info":{"authors":{"author":[{"@pid":"49/10092","text":"Alberto Fernández-Isabel"},{"@pid":"f/RubenFuentes","text":"Rubén Fuentes-Fernández"}]},"title":"Developing an integrative Modelling Language for enhancing road traffic simulations.","venue":"FedCSIS","pages":"1745-1756","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Fernandez-Isabel15","doi":"10.15439/2015F248","ee":"https://doi.org/10.15439/2015F248","url":"https://dblp.org/rec/conf/fedcsis/Fernandez-Isabel15"}, "url":"URL#3534089" }, { "@score":"1", "@id":"3534090", "info":{"authors":{"author":[{"@pid":"120/3054","text":"Sergiy Fialko"},{"@pid":"170/6242","text":"Filip Zeglen"},{"@pid":"170/6322","text":"Tadeusz Kosciuszko"}]},"title":"Block preconditioned conjugate gradient method for extraction of natural vibration frequencies in structural analysis.","venue":"FedCSIS","pages":"655-662","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/FialkoZK15","doi":"10.15439/2015F87","ee":"https://doi.org/10.15439/2015F87","url":"https://dblp.org/rec/conf/fedcsis/FialkoZK15"}, "url":"URL#3534090" }, { "@score":"1", "@id":"3534092", "info":{"authors":{"author":[{"@pid":"85/3468","text":"Luka Fürst"},{"@pid":"91/6561","text":"Uros Cibej"},{"@pid":"48/3835","text":"Jurij Mihelic"}]},"title":"Maximum exploratory equivalence in trees.","venue":"FedCSIS","pages":"507-518","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/FurstCM15","doi":"10.15439/2015F329","ee":"https://doi.org/10.15439/2015F329","url":"https://dblp.org/rec/conf/fedcsis/FurstCM15"}, "url":"URL#3534092" }, { "@score":"1", "@id":"3534093", "info":{"authors":{"author":[{"@pid":"120/3067","text":"Janusz Furtak"},{"@pid":"120/3144","text":"Jan Chudzikiewicz"}]},"title":"Securing transmissions between nodes of WSN using TPM.","venue":"FedCSIS","pages":"1059-1068","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/FurtakC15","doi":"10.15439/2015F144","ee":"https://doi.org/10.15439/2015F144","url":"https://dblp.org/rec/conf/fedcsis/FurtakC15"}, "url":"URL#3534093" }, { "@score":"1", "@id":"3534094", "info":{"authors":{"author":[{"@pid":"152/3390","text":"Krzysztof Gajowniczek"},{"@pid":"30/1752","text":"Tomasz Zabkowski"},{"@pid":"36/678","text":"Arkadiusz Orlowski"}]},"title":"Comparison of decision trees with Rényi and Tsallis entropy applied for imbalanced churn dataset.","venue":"FedCSIS","pages":"39-44","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/GajowniczekZO15","doi":"10.15439/2015F121","ee":"https://doi.org/10.15439/2015F121","url":"https://dblp.org/rec/conf/fedcsis/GajowniczekZO15"}, "url":"URL#3534094" }, { "@score":"1", "@id":"3534095", "info":{"authors":{"author":[{"@pid":"43/10429","text":"Chrysoula Gatsou"},{"@pid":"87/1142","text":"Anastasios Politis"},{"@pid":"02/8336","text":"Dimitrios Zevgolis"}]},"title":"Exploring users' experience with e-reading devices.","venue":"FedCSIS","pages":"833-839","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/GatsouPZ15","doi":"10.15439/2015F197","ee":"https://doi.org/10.15439/2015F197","url":"https://dblp.org/rec/conf/fedcsis/GatsouPZ15"}, "url":"URL#3534095" }, { "@score":"1", "@id":"3534098", "info":{"authors":{"author":{"@pid":"170/6235","text":"Dariusz Glas"}},"title":"Suppression of radio frequency interferences using the adaptive FIR filter based on the Linear Prediction.","venue":"FedCSIS","pages":"663-673","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Glas15","doi":"10.15439/2015F150","ee":"https://doi.org/10.15439/2015F150","url":"https://dblp.org/rec/conf/fedcsis/Glas15"}, "url":"URL#3534098" }, { "@score":"1", "@id":"3534099", "info":{"authors":{"author":[{"@pid":"68/8007","text":"João L. Gomes"},{"@pid":"130/3657","text":"Gonçalo de Jesus"},{"@pid":"139/4100","text":"Joao Rogeiro"},{"@pid":"130/3656","text":"Anabela Oliveira"},{"@pid":"170/6255","text":"Ricardo Tavares da Costa"},{"@pid":"170/6280","text":"André B. Fortunato"}]},"title":"Molines - towards a responsive Web platform for flood forecasting and risk mitigation.","venue":"FedCSIS","pages":"1171-1176","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/GomesJROCF15","doi":"10.15439/2015F265","ee":"https://doi.org/10.15439/2015F265","url":"https://dblp.org/rec/conf/fedcsis/GomesJROCF15"}, "url":"URL#3534099" }, { "@score":"1", "@id":"3534100", "info":{"authors":{"author":[{"@pid":"02/997","text":"Adam Grabowski"},{"@pid":"k/ArturKornilowicz","text":"Artur Kornilowicz"},{"@pid":"31/6489","text":"Christoph Schwarzweller"}]},"title":"Equality in computer proof-assistants.","venue":"FedCSIS","pages":"45-54","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/GrabowskiKS15","doi":"10.15439/2015F229","ee":"https://doi.org/10.15439/2015F229","url":"https://dblp.org/rec/conf/fedcsis/GrabowskiKS15"}, "url":"URL#3534100" }, { "@score":"1", "@id":"3534101", "info":{"authors":{"author":[{"@pid":"37/8120","text":"Wojciech Grega"},{"@pid":"95/4419","text":"Andrew J. Kornecki"}]},"title":"Real-time Cyber-Physical Systems transatlantic engineering curricula framework.","venue":"FedCSIS","pages":"755-762","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/GregaK15","doi":"10.15439/2015F45","ee":"https://doi.org/10.15439/2015F45","url":"https://dblp.org/rec/conf/fedcsis/GregaK15"}, "url":"URL#3534101" }, { "@score":"1", "@id":"3534102", "info":{"authors":{"author":[{"@pid":"148/2240","text":"Marcin Grochowina"},{"@pid":"144/1546","text":"Lucyna Leniowska"}]},"title":"Comparison of SVM and k-NN classifiers in the estimation of the state of the arteriovenous fistula problem.","venue":"FedCSIS","pages":"249-254","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/GrochowinaL15","doi":"10.15439/2015F194","ee":"https://doi.org/10.15439/2015F194","url":"https://dblp.org/rec/conf/fedcsis/GrochowinaL15"}, "url":"URL#3534102" }, { "@score":"1", "@id":"3534103", "info":{"authors":{"author":[{"@pid":"122/1797","text":"Marek Grzegorowski"},{"@pid":"58/8523","text":"Sebastian Stawicki"}]},"title":"Window-based feature extraction framework for multi-sensor data: A posture recognition case study.","venue":"FedCSIS","pages":"397-405","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/GrzegorowskiS15","doi":"10.15439/2015F425","ee":"https://doi.org/10.15439/2015F425","url":"https://dblp.org/rec/conf/fedcsis/GrzegorowskiS15"}, "url":"URL#3534103" }, { "@score":"1", "@id":"3534106", "info":{"authors":{"author":{"@pid":"152/5662","text":"Krzysztof Hauke"}},"title":"Process approach to management knowledge objects managerial expertise for distance learning.","venue":"FedCSIS","pages":"1661-1666","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Hauke15","doi":"10.15439/2015F328","ee":"https://doi.org/10.15439/2015F328","url":"https://dblp.org/rec/conf/fedcsis/Hauke15"}, "url":"URL#3534106" }, { "@score":"1", "@id":"3534108", "info":{"authors":{"author":[{"@pid":"71/331","text":"Marcin Hernes"},{"@pid":"08/4520","text":"Marcin Maleszka"},{"@pid":"n/NgocThanhNguyen","text":"Ngoc Thanh Nguyen 0001"},{"@pid":"163/1048","text":"Andrzej Bytniewski"}]},"title":"The automatic summarization of text documents in the Cognitive Integrated Management Information System.","venue":"FedCSIS","pages":"1387-1396","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/HernesMNB15","doi":"10.15439/2015F188","ee":"https://doi.org/10.15439/2015F188","url":"https://dblp.org/rec/conf/fedcsis/HernesMNB15"}, "url":"URL#3534108" }, { "@score":"1", "@id":"3534109", "info":{"authors":{"author":[{"@pid":"51/8523","text":"Edyta Hetmaniok"},{"@pid":"90/3528","text":"Mariusz Pleszczynski"},{"@pid":"170/6279","text":"Ireneusz Sobstyl"},{"@pid":"58/1517","text":"Roman Witula"}]},"title":"Kaprekar's transformations. Part I - theoretical discussion.","venue":"FedCSIS","pages":"687-692","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/HetmaniokPSW15","doi":"10.15439/2015F16","ee":"https://doi.org/10.15439/2015F16","url":"https://dblp.org/rec/conf/fedcsis/HetmaniokPSW15"}, "url":"URL#3534109" }, { "@score":"1", "@id":"3534111", "info":{"authors":{"author":[{"@pid":"138/3763","text":"Michal Hodon"},{"@pid":"170/6319","text":"Samuel Zák"},{"@pid":"170/6342","text":"Martin Kopkas"},{"@pid":"68/2990","text":"Peter Sevcík"},{"@pid":"152/5521","text":"Martin Hudik"}]},"title":"Application of WSN for smart power metering to avoid cheating on electric power consumption at places with shared power sources.","venue":"FedCSIS","pages":"1215-1221","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/HodonZKSH15","doi":"10.15439/2015F356","ee":"https://doi.org/10.15439/2015F356","url":"https://dblp.org/rec/conf/fedcsis/HodonZKSH15"}, "url":"URL#3534111" }, { "@score":"1", "@id":"3534112", "info":{"authors":{"author":[{"@pid":"81/5569","text":"Frantisek Hunka"},{"@pid":"170/6271","text":"Roman Belunek"}]},"title":"Transaction based business process modeling.","venue":"FedCSIS","pages":"1397-1402","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/HunkaB15","doi":"10.15439/2015F149","ee":"https://doi.org/10.15439/2015F149","url":"https://dblp.org/rec/conf/fedcsis/HunkaB15"}, "url":"URL#3534112" }, { "@score":"1", "@id":"3534114", "info":{"authors":{"author":[{"@pid":"153/0134","text":"Sunday Iliya"},{"@pid":"149/9789","text":"Eric Goodyer"},{"@pid":"125/0087","text":"John A. Gow"},{"@pid":"86/10373","text":"Jethro Shell"},{"@pid":"50/4480","text":"Mario Gongora 0001"}]},"title":"Application of Artificial Neural Network and Support Vector Regression in cognitive radio networks for RF power prediction using compact differential evolution algorithm.","venue":"FedCSIS","pages":"55-66","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/IliyaGGSG15","doi":"10.15439/2015F14","ee":"https://doi.org/10.15439/2015F14","url":"https://dblp.org/rec/conf/fedcsis/IliyaGGSG15"}, "url":"URL#3534114" }, { "@score":"1", "@id":"3534115", "info":{"authors":{"author":[{"@pid":"66/6962","text":"Janina Anna Jakubczyc"},{"@pid":"29/1114","text":"Mieczyslaw L. Owoc"}]},"title":"Support of contextual classifier ensembles design.","venue":"FedCSIS","pages":"1683-1689","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/JakubczycO15","doi":"10.15439/2015F353","ee":"https://doi.org/10.15439/2015F353","url":"https://dblp.org/rec/conf/fedcsis/JakubczycO15"}, "url":"URL#3534115" }, { "@score":"1", "@id":"3534117", "info":{"authors":{"author":[{"@pid":"24/10020","text":"Eva Janousová"},{"@pid":"41/1876","text":"Daniel Schwarz"},{"@pid":"89/449","text":"Giovanni Montana"},{"@pid":"54/3213","text":"Tomás Kaspárek"}]},"title":"Brain image classification based on automated morphometry and penalised linear discriminant analysis with resampling.","venue":"FedCSIS","pages":"263-268","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/JanousovaSMK15","doi":"10.15439/2015F147","ee":"https://doi.org/10.15439/2015F147","url":"https://dblp.org/rec/conf/fedcsis/JanousovaSMK15"}, "url":"URL#3534117" }, { "@score":"1", "@id":"3534118", "info":{"authors":{"author":[{"@pid":"62/1811","text":"Krzysztof Jassem"},{"@pid":"170/6240","text":"Lukasz Pawluczuk"}]},"title":"Automatic summarization of Polish news articles by sentence selection.","venue":"FedCSIS","pages":"337-341","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/JassemP15","doi":"10.15439/2015F186","ee":"https://doi.org/10.15439/2015F186","url":"https://dblp.org/rec/conf/fedcsis/JassemP15"}, "url":"URL#3534118" }, { "@score":"1", "@id":"3534119", "info":{"authors":{"author":[{"@pid":"62/6609","text":"Fabienne Jézéquel"},{"@pid":"23/2132","text":"Jean Luc Lamotte"},{"@pid":"128/5217","text":"Issam Said"}]},"title":"Estimation of numerical reproducibility on CPU and GPU.","venue":"FedCSIS","pages":"675-680","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/JezequelLS15","doi":"10.15439/2015F29","ee":"https://doi.org/10.15439/2015F29","url":"https://dblp.org/rec/conf/fedcsis/JezequelLS15"}, "url":"URL#3534119" }, { "@score":"1", "@id":"3534120", "info":{"authors":{"author":[{"@pid":"170/6302","text":"Ján Juhár"},{"@pid":"89/3384","text":"Liberios Vokorokos"}]},"title":"A review of source code projections in integrated development environments.","venue":"FedCSIS","pages":"923-927","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/JuharV15","doi":"10.15439/2015F289","ee":"https://doi.org/10.15439/2015F289","url":"https://dblp.org/rec/conf/fedcsis/JuharV15"}, "url":"URL#3534120" }, { "@score":"1", "@id":"3534121", "info":{"authors":{"author":{"@pid":"170/6215","text":"Anna Kaczorowska"}},"title":"Traditional and agile project management in public sector and ICT.","venue":"FedCSIS","pages":"1521-1531","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Kaczorowska15","doi":"10.15439/2015F279","ee":"https://doi.org/10.15439/2015F279","url":"https://dblp.org/rec/conf/fedcsis/Kaczorowska15"}, "url":"URL#3534121" }, { "@score":"1", "@id":"3534123", "info":{"authors":{"author":{"@pid":"152/5704","text":"Mateusz Kalisch"}},"title":"Supervised context classification methods for an industrial machinery.","venue":"FedCSIS","pages":"1667-1672","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Kalisch15","doi":"10.15439/2015F292","ee":"https://doi.org/10.15439/2015F292","url":"https://dblp.org/rec/conf/fedcsis/Kalisch15"}, "url":"URL#3534123" }, { "@score":"1", "@id":"3534124", "info":{"authors":{"author":[{"@pid":"152/9508","text":"Anne-Lena Kampen"},{"@pid":"74/6402","text":"Knut Øvsthus"},{"@pid":"15/5621","text":"Øivind Kure"}]},"title":"Energy balancing algorithms in Wireless Sensor Networks.","venue":"FedCSIS","pages":"1223-1231","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KampenOK15","doi":"10.15439/2015F67","ee":"https://doi.org/10.15439/2015F67","url":"https://dblp.org/rec/conf/fedcsis/KampenOK15"}, "url":"URL#3534124" }, { "@score":"1", "@id":"3534126", "info":{"authors":{"author":[{"@pid":"23/5720","text":"Andrzej Karbowski"},{"@pid":"156/6565","text":"Przemyslaw Jaskola"}]},"title":"Two approaches to dynamic power management in energy-aware computer networks - methodological considerations.","venue":"FedCSIS","pages":"1177-1182","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KarbowskiJ15","doi":"10.15439/2015F228","ee":"https://doi.org/10.15439/2015F228","url":"https://dblp.org/rec/conf/fedcsis/KarbowskiJ15"}, "url":"URL#3534126" }, { "@score":"1", "@id":"3534129", "info":{"authors":{"author":[{"@pid":"120/3085","text":"Ondrej Karpis"},{"@pid":"23/8115","text":"Juraj Micek"},{"@pid":"170/6345","text":"Veronika Olesnaníková"}]},"title":"Using of compressed sensing in energy sensitive WSN applications.","venue":"FedCSIS","pages":"1233-1238","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KarpisMO15","doi":"10.15439/2015F167","ee":"https://doi.org/10.15439/2015F167","url":"https://dblp.org/rec/conf/fedcsis/KarpisMO15"}, "url":"URL#3534129" }, { "@score":"1", "@id":"3534130", "info":{"authors":{"author":[{"@pid":"170/6262","text":"Dmitriy Kartashov"},{"@pid":"170/6295","text":"Arthur Huletski"},{"@pid":"19/9960","text":"Kirill Krinkin"}]},"title":"Fast artificial landmark detection for indoor mobile robots.","venue":"FedCSIS","pages":"209-214","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KartashovHK15","doi":"10.15439/2015F232","ee":"https://doi.org/10.15439/2015F232","url":"https://dblp.org/rec/conf/fedcsis/KartashovHK15"}, "url":"URL#3534130" }, { "@score":"1", "@id":"3534131", "info":{"authors":{"author":[{"@pid":"143/4894","text":"Andrzej Katunin"},{"@pid":"64/10106","text":"Marcin Amarowicz"},{"@pid":"57/10106","text":"Pawel Chrzanowski"}]},"title":"Faults diagnosis using self-organizing maps: A case study on the DAMADICS Benchmark problem.","venue":"FedCSIS","pages":"1673-1681","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KatuninAC15","doi":"10.15439/2015F26","ee":"https://doi.org/10.15439/2015F26","url":"https://dblp.org/rec/conf/fedcsis/KatuninAC15"}, "url":"URL#3534131" }, { "@score":"1", "@id":"3534132", "info":{"authors":{"author":[{"@pid":"170/6283","text":"Nassima Yamouni Khelifi"},{"@pid":"23/3502","text":"Michal Smialek"},{"@pid":"151/0411","text":"Rachida Mekki"}]},"title":"Generating database access code from domain models.","venue":"FedCSIS","pages":"991-996","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KhelifiSM15","doi":"10.15439/2015F247","ee":"https://doi.org/10.15439/2015F247","url":"https://dblp.org/rec/conf/fedcsis/KhelifiSM15"}, "url":"URL#3534132" }, { "@score":"1", "@id":"3534133", "info":{"authors":{"author":[{"@pid":"98/3798","text":"Krzysztof Kluza"},{"@pid":"34/9935","text":"Krzysztof Kaczor"},{"@pid":"37/873","text":"Grzegorz J. Nalepa"},{"@pid":"154/4207","text":"Mateusz Slazynski"}]},"title":"Opportunities for Business Process semantization in open-source process execution environments.","venue":"FedCSIS","pages":"1307-1314","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KluzaKNS15","doi":"10.15439/2015F250","ee":"https://doi.org/10.15439/2015F250","url":"https://dblp.org/rec/conf/fedcsis/KluzaKNS15"}, "url":"URL#3534133" }, { "@score":"1", "@id":"3534134", "info":{"authors":{"author":{"@pid":"64/5267","text":"Richard Knepper"}},"title":"Research proposal: Barriers to new user and new domain adoption of the XSEDE cyberinfrastructure.","venue":"FedCSIS","pages":"1023-1028","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Knepper15","doi":"10.15439/2015F244","ee":"https://doi.org/10.15439/2015F244","url":"https://dblp.org/rec/conf/fedcsis/Knepper15"}, "url":"URL#3534134" }, { "@score":"1", "@id":"3534135", "info":{"authors":{"author":[{"@pid":"170/6278","text":"Nir Koblenc"},{"@pid":"98/4936","text":"Shmuel S. Tyszberowicz"}]},"title":"Behavior-preserving abstraction of ESTEREL programs.","venue":"FedCSIS","pages":"743-754","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KoblencT15","doi":"10.15439/2015F190","ee":"https://doi.org/10.15439/2015F190","url":"https://dblp.org/rec/conf/fedcsis/KoblencT15"}, "url":"URL#3534135" }, { "@score":"1", "@id":"3534136", "info":{"authors":{"author":[{"@pid":"120/3143","text":"Michal Kochlán"},{"@pid":"170/6319","text":"Samuel Zák"},{"@pid":"23/8115","text":"Juraj Micek"},{"@pid":"170/6257","text":"Jana Milanová"}]},"title":"Control unit for power subsystem of a wireless sensor node.","venue":"FedCSIS","pages":"1239-1246","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KochlanZMM15","doi":"10.15439/2015F355","ee":"https://doi.org/10.15439/2015F355","url":"https://dblp.org/rec/conf/fedcsis/KochlanZMM15"}, "url":"URL#3534136" }, { "@score":"1", "@id":"3534137", "info":{"authors":{"author":[{"@pid":"k/ZKokosinski","text":"Zbigniew Kokosinski"},{"@pid":"170/6285","text":"Lukasz Ochal"}]},"title":"Evaluation of metaheuristics for robust graph coloring problem.","venue":"FedCSIS","pages":"519-524","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KokosinskiO15","doi":"10.15439/2015F293","ee":"https://doi.org/10.15439/2015F293","url":"https://dblp.org/rec/conf/fedcsis/KokosinskiO15"}, "url":"URL#3534137" }, { "@score":"1", "@id":"3534138", "info":{"authors":{"author":{"@pid":"170/6305","text":"Jakub Kolecki"}},"title":"Towards the automatic motion recovery using single-view image sequences acquired from bike.","venue":"FedCSIS","pages":"199-207","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Kolecki15","doi":"10.15439/2015F182","ee":"https://doi.org/10.15439/2015F182","url":"https://dblp.org/rec/conf/fedcsis/Kolecki15"}, "url":"URL#3534138" }, { "@score":"1", "@id":"3534139", "info":{"authors":{"author":[{"@pid":"08/4371","text":"Ján Kollár"},{"@pid":"170/6209","text":"Michal Sicák"},{"@pid":"170/6282","text":"Milan Spisiak"}]},"title":"Towards machine mind evolution.","venue":"FedCSIS","pages":"985-990","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KollarSS15","doi":"10.15439/2015F210","ee":"https://doi.org/10.15439/2015F210","url":"https://dblp.org/rec/conf/fedcsis/KollarSS15"}, "url":"URL#3534139" }, { "@score":"1", "@id":"3534140", "info":{"authors":{"author":{"@pid":"154/9847","text":"Konrad Koniarski"}},"title":"Augmented reality using optical flow.","venue":"FedCSIS","pages":"841-847","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Koniarski15","doi":"10.15439/2015F202","ee":"https://doi.org/10.15439/2015F202","url":"https://dblp.org/rec/conf/fedcsis/Koniarski15"}, "url":"URL#3534140" }, { "@score":"1", "@id":"3534141", "info":{"authors":{"author":[{"@pid":"170/6290","text":"Bartosz Kopczynski"},{"@pid":"80/6270","text":"Pawel Strumillo"},{"@pid":"170/6252","text":"Ewa Niebudek-Bogusz"}]},"title":"Computer based quantification of normal and pathological vocal folds phonatory processes from laryngovideostroboscopy.","venue":"FedCSIS","pages":"269-274","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KopczynskiSN15","doi":"10.15439/2015F276","ee":"https://doi.org/10.15439/2015F276","url":"https://dblp.org/rec/conf/fedcsis/KopczynskiSN15"}, "url":"URL#3534141" }, { "@score":"1", "@id":"3534142", "info":{"authors":{"author":[{"@pid":"29/1608","text":"Jerzy Korczak 0001"},{"@pid":"71/331","text":"Marcin Hernes"},{"@pid":"120/3109","text":"Maciej Bac"}]},"title":"Fuzzy logic in the multi-agent financial decision support system.","venue":"FedCSIS","pages":"1367-1376","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KorczakHB15","doi":"10.15439/2015F155","ee":"https://doi.org/10.15439/2015F155","url":"https://dblp.org/rec/conf/fedcsis/KorczakHB15"}, "url":"URL#3534142" }, { "@score":"1", "@id":"3534144", "info":{"authors":{"author":[{"@pid":"32/3081","text":"Valery I. Korzhik"},{"@pid":"05/4633","text":"Guillermo Morales-Luna"},{"@pid":"120/3139","text":"Ivan Fedyanin"}]},"title":"Using the generalised Viterbi algorithm to achieve a highly effective stegosystem for images.","venue":"FedCSIS","pages":"855-860","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KorzhikMF15","doi":"10.15439/2015F53","ee":"https://doi.org/10.15439/2015F53","url":"https://dblp.org/rec/conf/fedcsis/KorzhikMF15"}, "url":"URL#3534144" }, { "@score":"1", "@id":"3534145", "info":{"authors":{"author":[{"@pid":"05/2899","text":"Gábor Kovács"},{"@pid":"04/11077","text":"Katarzyna Grzybowska"}]},"title":"Supply Chain Coordination between Autonomous Agents - a game theory approach.","venue":"FedCSIS","pages":"1623-1630","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KovacsG15","doi":"10.15439/2015F275","ee":"https://doi.org/10.15439/2015F275","url":"https://dblp.org/rec/conf/fedcsis/KovacsG15"}, "url":"URL#3534145" }, { "@score":"1", "@id":"3534147", "info":{"authors":{"author":[{"@pid":"50/1497","text":"Michal Kozielski"},{"@pid":"98/445","text":"Marek Sikora"},{"@pid":"30/9832","text":"Lukasz Wróbel"}]},"title":"DISESOR - decision support system for mining industry.","venue":"FedCSIS","pages":"67-74","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KozielskiSW15","doi":"10.15439/2015F168","ee":"https://doi.org/10.15439/2015F168","url":"https://dblp.org/rec/conf/fedcsis/KozielskiSW15"}, "url":"URL#3534147" }, { "@score":"1", "@id":"3534148", "info":{"authors":{"author":{"@pid":"170/6214","text":"Krzysztof Krupa"}},"title":"Promoting the understanding of electronic components and circuit parameters by using didactic dynamic pictures - qualitative analysis of research results.","venue":"FedCSIS","pages":"1029-1034","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Krupa15","doi":"10.15439/2015F135","ee":"https://doi.org/10.15439/2015F135","url":"https://dblp.org/rec/conf/fedcsis/Krupa15"}, "url":"URL#3534148" }, { "@score":"1", "@id":"3534149", "info":{"authors":{"author":[{"@pid":"55/8121","text":"Tomasz Kryjak"},{"@pid":"170/6296","text":"Damian Krol"}]},"title":"Shape and colour recognition of dishes for the purpose of customer service process automation in a self-service canteen.","venue":"FedCSIS","pages":"799-808","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/KryjakK15","doi":"10.15439/2015F184","ee":"https://doi.org/10.15439/2015F184","url":"https://dblp.org/rec/conf/fedcsis/KryjakK15"}, "url":"URL#3534149" }, { "@score":"1", "@id":"3534151", "info":{"authors":{"author":{"@pid":"53/773","text":"Pawan Kumar"}},"title":"Fast solvers for nonsmooth optimization problems in phase separation.","venue":"FedCSIS","pages":"589-594","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Kumar15","doi":"10.15439/2015F366","ee":"https://doi.org/10.15439/2015F366","url":"https://dblp.org/rec/conf/fedcsis/Kumar15"}, "url":"URL#3534151" }, { "@score":"1", "@id":"3534152", "info":{"authors":{"author":{"@pid":"85/1109","text":"Agnieszka Landowska"}},"title":"Emotion monitor - concept, construction and lessons learned.","venue":"FedCSIS","pages":"75-80","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Landowska15","doi":"10.15439/2015F264","ee":"https://doi.org/10.15439/2015F264","url":"https://dblp.org/rec/conf/fedcsis/Landowska15"}, "url":"URL#3534152" }, { "@score":"1", "@id":"3534153", "info":{"authors":{"author":[{"@pid":"151/8717","text":"Jan Lasek"},{"@pid":"53/7259","text":"Marek Gagolewski"}]},"title":"The winning solution to the AAIA'15 data mining competition: Tagging Firefighter Activities at a Fire Scene.","venue":"FedCSIS","pages":"375-380","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/LasekG15","doi":"10.15439/2015F418","ee":"https://doi.org/10.15439/2015F418","url":"https://dblp.org/rec/conf/fedcsis/LasekG15"}, "url":"URL#3534153" }, { "@score":"1", "@id":"3534154", "info":{"authors":{"author":{"@pid":"170/6254","text":"Lukasz Laszko"}},"title":"Word detection in recorded speech using textual queries.","venue":"FedCSIS","pages":"849-853","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Laszko15","doi":"10.15439/2015F341","ee":"https://doi.org/10.15439/2015F341","url":"https://dblp.org/rec/conf/fedcsis/Laszko15"}, "url":"URL#3534154" }, { "@score":"1", "@id":"3534155", "info":{"authors":{"author":[{"@pid":"66/10678","text":"Christian Leyh"},{"@pid":"170/6238","text":"Julia Thomschke"}]},"title":"Critical success factors for implementing supply chain management systems - the perspective of selected German enterprises.","venue":"FedCSIS","pages":"1403-1413","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/LeyhT15","doi":"10.15439/2015F245","ee":"https://doi.org/10.15439/2015F245","url":"https://dblp.org/rec/conf/fedcsis/LeyhT15"}, "url":"URL#3534155" }, { "@score":"1", "@id":"3534156", "info":{"authors":{"author":[{"@pid":"135/7696","text":"Karol Lisowski"},{"@pid":"64/1052","text":"Andrzej Czyzewski"}]},"title":"Pawlak's flow graph extensions for video surveillance systems.","venue":"FedCSIS","pages":"81-87","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/LisowskiC15","doi":"10.15439/2015F384","ee":"https://doi.org/10.15439/2015F384","url":"https://dblp.org/rec/conf/fedcsis/LisowskiC15"}, "url":"URL#3534156" }, { "@score":"1", "@id":"3534157", "info":{"authors":{"author":{"@pid":"170/6314","text":"Monika Lobaziewicz"}},"title":"Integration of B2B system that supports the management of construction processes with ERP systems.","venue":"FedCSIS","pages":"1461-1466","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Lobaziewicz15","doi":"10.15439/2015F303","ee":"https://doi.org/10.15439/2015F303","url":"https://dblp.org/rec/conf/fedcsis/Lobaziewicz15"}, "url":"URL#3534157" }, { "@score":"1", "@id":"3534158", "info":{"authors":{"author":{"@pid":"170/6339","text":"Andrzej Lodzinski"}},"title":"Multicriteria support of choosing a group decision.","venue":"FedCSIS","pages":"1597-1602","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Lodzinski15","doi":"10.15439/2015F58","ee":"https://doi.org/10.15439/2015F58","url":"https://dblp.org/rec/conf/fedcsis/Lodzinski15"}, "url":"URL#3534158" }, { "@score":"1", "@id":"3534159", "info":{"authors":{"author":{"@pid":"55/625","text":"Roussanka Loukanova"}},"title":"Representing parametric concepts with Situation Theory.","venue":"FedCSIS","pages":"89-100","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Loukanova15","doi":"10.15439/2015F409","ee":"https://doi.org/10.15439/2015F409","url":"https://dblp.org/rec/conf/fedcsis/Loukanova15"}, "url":"URL#3534159" }, { "@score":"1", "@id":"3534160", "info":{"authors":{"author":[{"@pid":"170/6243","text":"Richard Ludvigh"},{"@pid":"21/3869","text":"Tomás Rebok"},{"@pid":"170/6341","text":"Vaclav Tunka"},{"@pid":"23/10427","text":"Filip Nguyen"}]},"title":"Ruby benchmark tool using docker.","venue":"FedCSIS","pages":"947-952","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/LudvighRTN15","doi":"10.15439/2015F99","ee":"https://doi.org/10.15439/2015F99","url":"https://dblp.org/rec/conf/fedcsis/LudvighRTN15"}, "url":"URL#3534160" }, { "@score":"1", "@id":"3534161", "info":{"authors":{"author":[{"@pid":"155/5346","text":"Jari Luomala"},{"@pid":"78/3723","text":"Ismo Hakala"}]},"title":"Effects of temperature and humidity on radio signal strength in outdoor wireless sensor networks.","venue":"FedCSIS","pages":"1247-1255","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/LuomalaH15","doi":"10.15439/2015F241","ee":"https://doi.org/10.15439/2015F241","url":"https://dblp.org/rec/conf/fedcsis/LuomalaH15"}, "url":"URL#3534161" }, { "@score":"1", "@id":"3534162", "info":{"authors":{"author":[{"@pid":"120/2943","text":"Maria Mach-Król"},{"@pid":"60/7616-1","text":"Krzysztof Michalik 0001"}]},"title":"Validation and verification of temporal knowledge as an important aspect of implementing a temporal knowledge base system supporting organizational creativity.","venue":"FedCSIS","pages":"1315-1320","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Mach-KrolM15","doi":"10.15439/2015F78","ee":"https://doi.org/10.15439/2015F78","url":"https://dblp.org/rec/conf/fedcsis/Mach-KrolM15"}, "url":"URL#3534162" }, { "@score":"1", "@id":"3534163", "info":{"authors":{"author":[{"@pid":"163/1054","text":"Jaroslav Majerník"},{"@pid":"170/6286","text":"Miriam Dziakova"},{"@pid":"164/7544","text":"Jozef Zivcák"}]},"title":"Utilization of single whole body vibration training unit in rehabilitation of elderly patients with neurological disorders.","venue":"FedCSIS","pages":"275-279","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/MajernikDZ15","doi":"10.15439/2015F304","ee":"https://doi.org/10.15439/2015F304","url":"https://dblp.org/rec/conf/fedcsis/MajernikDZ15"}, "url":"URL#3534163" }, { "@score":"1", "@id":"3534164", "info":{"authors":{"author":[{"@pid":"97/1879","text":"Apostolos Malatras"},{"@pid":"155/3269","text":"Laurent Beslay"}]},"title":"A generic framework to support participatory surveillance through crowdsensing.","venue":"FedCSIS","pages":"1135-1146","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/MalatrasB15","doi":"10.15439/2015F359","ee":"https://doi.org/10.15439/2015F359","url":"https://dblp.org/rec/conf/fedcsis/MalatrasB15"}, "url":"URL#3534164" }, { "@score":"1", "@id":"3534165", "info":{"authors":{"author":[{"@pid":"135/5202","text":"Michal Meina"},{"@pid":"148/1682","text":"Bartosz Celmer"},{"@pid":"54/10568","text":"Krzysztof Rykaczewski"}]},"title":"Lessons learnt from designing indoor positioning system using 868 MHz radios and neural networks.","venue":"FedCSIS","pages":"101-107","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/MeinaCR15","doi":"10.15439/2015F283","ee":"https://doi.org/10.15439/2015F283","url":"https://dblp.org/rec/conf/fedcsis/MeinaCR15"}, "url":"URL#3534165" }, { "@score":"1", "@id":"3534166", "info":{"authors":{"author":[{"@pid":"135/5202","text":"Michal Meina"},{"@pid":"02/2713","text":"Andrzej Janusz"},{"@pid":"54/10568","text":"Krzysztof Rykaczewski"},{"@pid":"53/3187","text":"Dominik Slezak"},{"@pid":"148/1682","text":"Bartosz Celmer"},{"@pid":"117/3289","text":"Adam Krasuski"}]},"title":"Tagging Firefighter Activities at the emergency scene: Summary of AAIA'15 data mining competition at knowledge pit.","venue":"FedCSIS","pages":"367-373","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/MeinaJRSCK15","doi":"10.15439/2015F426","ee":"https://doi.org/10.15439/2015F426","url":"https://dblp.org/rec/conf/fedcsis/MeinaJRSCK15"}, "url":"URL#3534166" }, { "@score":"1", "@id":"3534167", "info":{"authors":{"author":{"@pid":"10/4546","text":"Eunika Mercier-Laurent"}},"title":"What technology for efficient support of sustainable development?","venue":"FedCSIS","pages":"1651-1654","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Mercier-Laurent15","doi":"10.15439/2015F010","ee":"https://doi.org/10.15439/2015F010","url":"https://dblp.org/rec/conf/fedcsis/Mercier-Laurent15"}, "url":"URL#3534167" }, { "@score":"1", "@id":"3534168", "info":{"authors":{"author":[{"@pid":"62/482","text":"Silja Meyer-Nieberg"},{"@pid":"95/9097","text":"Erik Kropat"}]},"title":"Small populations, high-dimensional spaces: Sparse covariance matrix adaptation.","venue":"FedCSIS","pages":"525-535","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Meyer-NiebergK15","doi":"10.15439/2015F261","ee":"https://doi.org/10.15439/2015F261","url":"https://dblp.org/rec/conf/fedcsis/Meyer-NiebergK15"}, "url":"URL#3534168" }, { "@score":"1", "@id":"3534169", "info":{"authors":{"author":[{"@pid":"44/3005","text":"Marcin Michalak 0001"},{"@pid":"98/445","text":"Marek Sikora"},{"@pid":"30/9832","text":"Lukasz Wróbel"}]},"title":"Rule quality measures settings in a sequential covering rule induction algorithm - an empirical approach.","venue":"FedCSIS","pages":"109-118","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/MichalakSW15","doi":"10.15439/2015F388","ee":"https://doi.org/10.15439/2015F388","url":"https://dblp.org/rec/conf/fedcsis/MichalakSW15"}, "url":"URL#3534169" }, { "@score":"1", "@id":"3534170", "info":{"authors":{"author":[{"@pid":"170/6297","text":"Riham Moharam"},{"@pid":"87/5169","text":"Ehab Morsy"},{"@pid":"66/6372","text":"Ismail A. Ismail"}]},"title":"Genetic algorithms for balanced spanning tree problem.","venue":"FedCSIS","pages":"537-545","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/MoharamMI15","doi":"10.15439/2015F249","ee":"https://doi.org/10.15439/2015F249","url":"https://dblp.org/rec/conf/fedcsis/MoharamMI15"}, "url":"URL#3534170" }, { "@score":"1", "@id":"3534171", "info":{"authors":{"author":[{"@pid":"97/2797","text":"Antonio Mucherino"},{"@pid":"25/5440","text":"Stefka Fidanova"},{"@pid":"06/3321","text":"Maria Ganzha"}]},"title":"Ant Colony Optimization with environment changes: An application to GPS surveying.","venue":"FedCSIS","pages":"495-500","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/MucherinoFG15","doi":"10.15439/2015F33","ee":"https://doi.org/10.15439/2015F33","url":"https://dblp.org/rec/conf/fedcsis/MucherinoFG15"}, "url":"URL#3534171" }, { "@score":"1", "@id":"3534172", "info":{"authors":{"author":[{"@pid":"84/192","text":"Pawel B. Myszkowski"},{"@pid":"17/2452","text":"Michal Przewozniczek"},{"@pid":"46/3760","text":"Marek Skowronski"}]},"title":"Constructive heuristics for technology-driven Resource Constrained Scheduling Problem.","venue":"FedCSIS","pages":"119-127","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/MyszkowskiPS15","doi":"10.15439/2015F389","ee":"https://doi.org/10.15439/2015F389","url":"https://dblp.org/rec/conf/fedcsis/MyszkowskiPS15"}, "url":"URL#3534172" }, { "@score":"1", "@id":"3534173", "info":{"authors":{"author":[{"@pid":"84/192","text":"Pawel B. Myszkowski"},{"@pid":"46/3760","text":"Marek E. Skowronski"},{"@pid":"170/6294","text":"Krzysztof Sikora"}]},"title":"A new benchmark dataset for Multi-Skill Resource-Constrained Project Scheduling Problem.","venue":"FedCSIS","pages":"129-138","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/MyszkowskiSS15","doi":"10.15439/2015F273","ee":"https://doi.org/10.15439/2015F273","url":"https://dblp.org/rec/conf/fedcsis/MyszkowskiSS15"}, "url":"URL#3534173" }, { "@score":"1", "@id":"3534174", "info":{"authors":{"author":[{"@pid":"37/873","text":"Grzegorz J. Nalepa"},{"@pid":"154/4207","text":"Mateusz Slazynski"},{"@pid":"136/7182","text":"Krzysztof Kutt"},{"@pid":"97/10106","text":"Edyta Kucharska"},{"@pid":"84/2513","text":"Adam Luszpaj"}]},"title":"Unifying business concepts for SMEs with Prosecco ontology.","venue":"FedCSIS","pages":"1321-1326","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/NalepaSKKL15","doi":"10.15439/2015F323","ee":"https://doi.org/10.15439/2015F323","url":"https://dblp.org/rec/conf/fedcsis/NalepaSKKL15"}, "url":"URL#3534174" }, { "@score":"1", "@id":"3534175", "info":{"authors":{"author":[{"@pid":"41/7718","text":"Piotr Nawrocki"},{"@pid":"170/6249","text":"Mikolaj Jakubowski"},{"@pid":"170/6212","text":"Tomasz Godzik"}]},"title":"Analysis of notification methods with respect to mobile system characteristics.","venue":"FedCSIS","pages":"1183-1189","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/NawrockiJG15","doi":"10.15439/2015F6","ee":"https://doi.org/10.15439/2015F6","url":"https://dblp.org/rec/conf/fedcsis/NawrockiJG15"}, "url":"URL#3534175" }, { "@score":"1", "@id":"3534176", "info":{"authors":{"author":{"@pid":"170/6330","text":"Radek Nemec"}},"title":"Assessment of query execution performance using selected Business Intelligence tools and experimental agile oriented data modeling approach.","venue":"FedCSIS","pages":"1327-1333","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Nemec15","doi":"10.15439/2015F267","ee":"https://doi.org/10.15439/2015F267","url":"https://dblp.org/rec/conf/fedcsis/Nemec15"}, "url":"URL#3534176" }, { "@score":"1", "@id":"3534177", "info":{"authors":{"author":[{"@pid":"120/8294","text":"Milan Nosál"},{"@pid":"170/6263","text":"Matús Sulír"},{"@pid":"170/6302","text":"Ján Juhár"}]},"title":"Source code annotations as formal languages.","venue":"FedCSIS","pages":"953-964","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/NosalSJ15","doi":"10.15439/2015F173","ee":"https://doi.org/10.15439/2015F173","url":"https://dblp.org/rec/conf/fedcsis/NosalSJ15"}, "url":"URL#3534177" }, { "@score":"1", "@id":"3534178", "info":{"authors":{"author":[{"@pid":"170/6213","text":"Artur Nowosielski"},{"@pid":"67/6458","text":"Piotr A. Kowalski"},{"@pid":"74/4974","text":"Piotr Kulczycki"}]},"title":"The column-oriented database partitioning optimization based on the natural computing algorithms.","venue":"FedCSIS","pages":"1035-1041","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/NowosielskiKK15","doi":"10.15439/2015F262","ee":"https://doi.org/10.15439/2015F262","url":"https://dblp.org/rec/conf/fedcsis/NowosielskiKK15"}, "url":"URL#3534178" }, { "@score":"1", "@id":"3534179", "info":{"authors":{"author":[{"@pid":"06/1673","text":"Kazuo Ohzeki"},{"@pid":"170/6321","text":"Ryota Aoyama"},{"@pid":"81/6995","text":"Yutaka Hirakawa"}]},"title":"Minimum variance method to obtain the best shot in video for face recognition.","venue":"FedCSIS","pages":"869-874","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/OhzekiAH15","doi":"10.15439/2015F398","ee":"https://doi.org/10.15439/2015F398","url":"https://dblp.org/rec/conf/fedcsis/OhzekiAH15"}, "url":"URL#3534179" }, { "@score":"1", "@id":"3534180", "info":{"authors":{"author":[{"@pid":"27/3079","text":"Veslava Osinska"},{"@pid":"71/859","text":"Adam Józwik"},{"@pid":"152/7613","text":"Grzegorz Osinski"}]},"title":"Mapping evaluation for semantic browsing.","venue":"FedCSIS","pages":"329-335","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/OsinskaJO15","doi":"10.15439/2015F50","ee":"https://doi.org/10.15439/2015F50","url":"https://dblp.org/rec/conf/fedcsis/OsinskaJO15"}, "url":"URL#3534180" }, { "@score":"1", "@id":"3534181", "info":{"authors":{"author":[{"@pid":"170/6251","text":"Lukasz Osuszek"},{"@pid":"66/1843","text":"Stanislaw Stanek"}]},"title":"Knowledge management and decision support in adaptive case management platforms.","venue":"FedCSIS","pages":"1539-1549","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/OsuszekS15","doi":"10.15439/2015F60","ee":"https://doi.org/10.15439/2015F60","url":"https://dblp.org/rec/conf/fedcsis/OsuszekS15"}, "url":"URL#3534181" }, { "@score":"1", "@id":"3534184", "info":{"authors":{"author":[{"@pid":"170/6273","text":"Katarzyna Oswiecinska"},{"@pid":"69/2015","text":"Jaroslaw Legierski"}]},"title":"Open Data collection using mobile phones based on CKAN platform.","venue":"FedCSIS","pages":"1191-1196","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/OswiecinskaL15","doi":"10.15439/2015F128","ee":"https://doi.org/10.15439/2015F128","url":"https://dblp.org/rec/conf/fedcsis/OswiecinskaL15"}, "url":"URL#3534184" }, { "@score":"1", "@id":"3534185", "info":{"authors":{"author":[{"@pid":"170/6228","text":"Mateusz Owczarek"},{"@pid":"16/11078","text":"Przemyslaw Baranski"},{"@pid":"80/6270","text":"Pawel Strumillo"}]},"title":"Pedestrian tracking in video sequences: A particle filtering approach.","venue":"FedCSIS","pages":"875-881","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/OwczarekBS15","doi":"10.15439/2015F158","ee":"https://doi.org/10.15439/2015F158","url":"https://dblp.org/rec/conf/fedcsis/OwczarekBS15"}, "url":"URL#3534185" }, { "@score":"1", "@id":"3534186", "info":{"authors":{"author":[{"@pid":"94/4859","text":"Jan W. Owsinski"},{"@pid":"198/2835","text":"Jaroslaw Tomasz Stanczak"},{"@pid":"170/6239","text":"Aleksy Barski"},{"@pid":"20/3077","text":"Krzysztof Sep"},{"@pid":"71/6344","text":"Piotr Sapiecha"}]},"title":"Graph based approach to the minimum hub problem in transportation network.","venue":"FedCSIS","pages":"1641-1648","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/OwsinskiSBSS15","doi":"10.15439/2015F218","ee":"https://doi.org/10.15439/2015F218","url":"https://dblp.org/rec/conf/fedcsis/OwsinskiSBSS15"}, "url":"URL#3534186" }, { "@score":"1", "@id":"3534187", "info":{"authors":{"author":{"@pid":"88/428","text":"Wieslaw Paja"}},"title":"Medical diagnosis support and accuracy improvement by application of total scoring from feature selection approach.","venue":"FedCSIS","pages":"281-286","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Paja15","doi":"10.15439/2015F361","ee":"https://doi.org/10.15439/2015F361","url":"https://dblp.org/rec/conf/fedcsis/Paja15"}, "url":"URL#3534187" }, { "@score":"1", "@id":"3534188", "info":{"authors":{"author":[{"@pid":"46/1116","text":"Marek Palkowski"},{"@pid":"25/8877","text":"Tomasz Klimek"},{"@pid":"68/640","text":"Wlodzimierz Bielecki"}]},"title":"TRACO: An automatic loop nest parallelizer for numerical applications.","venue":"FedCSIS","pages":"681-686","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PalkowskiKB15","doi":"10.15439/2015F34","ee":"https://doi.org/10.15439/2015F34","url":"https://dblp.org/rec/conf/fedcsis/PalkowskiKB15"}, "url":"URL#3534188" }, { "@score":"1", "@id":"3534189", "info":{"authors":{"author":[{"@pid":"138/3708","text":"Tomasz Palys"},{"@pid":"44/2450","text":"Witold Zorski"}]},"title":"Enhanced movement tracking with Kinect supported by high-precision sensors.","venue":"FedCSIS","pages":"883-888","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PalysZ15","doi":"10.15439/2015F166","ee":"https://doi.org/10.15439/2015F166","url":"https://dblp.org/rec/conf/fedcsis/PalysZ15"}, "url":"URL#3534189" }, { "@score":"1", "@id":"3534190", "info":{"authors":{"author":[{"@pid":"170/6241","text":"Cristina Panait"},{"@pid":"78/9704","text":"Dan Dragomir"}]},"title":"Measuring the performance and energy consumption of AES in wireless sensor networks.","venue":"FedCSIS","pages":"1261-1266","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PanaitD15","doi":"10.15439/2015F322","ee":"https://doi.org/10.15439/2015F322","url":"https://dblp.org/rec/conf/fedcsis/PanaitD15"}, "url":"URL#3534190" }, { "@score":"1", "@id":"3534192", "info":{"authors":{"author":[{"@pid":"96/8483","text":"Przemyslaw Wiktor Pardel"},{"@pid":"73/685","text":"Jan G. Bazan"},{"@pid":"161/9717","text":"Jacek Zarychta"},{"@pid":"55/5821","text":"Stanislawa Bazan-Socha"}]},"title":"A two-level classifier for automatic medical objects classification.","venue":"FedCSIS","pages":"139-143","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PardelBZB15","doi":"10.15439/2015F407","ee":"https://doi.org/10.15439/2015F407","url":"https://dblp.org/rec/conf/fedcsis/PardelBZB15"}, "url":"URL#3534192" }, { "@score":"1", "@id":"3534193", "info":{"authors":{"author":{"@pid":"152/5554","text":"Ilona Paweloszek"}},"title":"Approach to analysis and assessment of ERP system. A software vendor's perspective.","venue":"FedCSIS","pages":"1415-1426","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Paweloszek15","doi":"10.15439/2015F251","ee":"https://doi.org/10.15439/2015F251","url":"https://dblp.org/rec/conf/fedcsis/Paweloszek15"}, "url":"URL#3534193" }, { "@score":"1", "@id":"3534195", "info":{"authors":{"author":[{"@pid":"152/5554","text":"Ilona Paweloszek"},{"@pid":"120/3141","text":"Jedrzej Wieczorkowski"}]},"title":"Big data as a business opportunity: An educational perspective.","venue":"FedCSIS","pages":"1563-1568","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PaweloszekW15","doi":"10.15439/2015F365","ee":"https://doi.org/10.15439/2015F365","url":"https://dblp.org/rec/conf/fedcsis/PaweloszekW15"}, "url":"URL#3534195" }, { "@score":"1", "@id":"3534196", "info":{"authors":{"author":[{"@pid":"170/6218","text":"Rafael Pax"},{"@pid":"56/876","text":"Juan Pavón"}]},"title":"Multi-Agent System Simulation of Indoor Scenarios.","venue":"FedCSIS","pages":"1757-1763","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PaxP15","doi":"10.15439/2015F213","ee":"https://doi.org/10.15439/2015F213","url":"https://dblp.org/rec/conf/fedcsis/PaxP15"}, "url":"URL#3534196" }, { "@score":"1", "@id":"3534197", "info":{"authors":{"author":[{"@pid":"24/10425","text":"Emília Pietriková"},{"@pid":"01/10428","text":"Sergej Chodarev"}]},"title":"Profile-driven source code exploration.","venue":"FedCSIS","pages":"929-934","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PietrikovaC15","doi":"10.15439/2015F238","ee":"https://doi.org/10.15439/2015F238","url":"https://dblp.org/rec/conf/fedcsis/PietrikovaC15"}, "url":"URL#3534197" }, { "@score":"1", "@id":"3534198", "info":{"authors":{"author":[{"@pid":"170/6245","text":"Peter Pigula"},{"@pid":"120/8294","text":"Milan Nosál"}]},"title":"Unified compile-time and runtime java annotation processing.","venue":"FedCSIS","pages":"965-975","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PigulaN15","doi":"10.15439/2015F179","ee":"https://doi.org/10.15439/2015F179","url":"https://dblp.org/rec/conf/fedcsis/PigulaN15"}, "url":"URL#3534198" }, { "@score":"1", "@id":"3534199", "info":{"authors":{"author":[{"@pid":"150/8679","text":"Katarzyna Poczeta"},{"@pid":"67/3983","text":"Alexander Yastrebov"},{"@pid":"17/7297","text":"Elpiniki I. Papageorgiou"}]},"title":"Learning fuzzy cognitive maps using Structure Optimization Genetic Algorithm.","venue":"FedCSIS","pages":"547-554","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PoczetaYP15","doi":"10.15439/2015F296","ee":"https://doi.org/10.15439/2015F296","url":"https://dblp.org/rec/conf/fedcsis/PoczetaYP15"}, "url":"URL#3534199" }, { "@score":"1", "@id":"3534200", "info":{"authors":{"author":[{"@pid":"148/1767","text":"Radomír Polách"},{"@pid":"48/10425","text":"Jan Travnicek"},{"@pid":"21/1027","text":"Jan Janousek"},{"@pid":"78/5300","text":"Borivoj Melichar"}]},"title":"A new algorithm for the determinisation of visibly pushdown automata.","venue":"FedCSIS","pages":"915-922","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PolachTJM15","doi":"10.15439/2015F325","ee":"https://doi.org/10.15439/2015F325","url":"https://dblp.org/rec/conf/fedcsis/PolachTJM15"}, "url":"URL#3534200" }, { "@score":"1", "@id":"3534201", "info":{"authors":{"author":[{"@pid":"170/6308","text":"Edward Polrolniczak"},{"@pid":"170/6274","text":"Michal Kramarczyk"}]},"title":"Analysis of the sound attack in context of computer evaluation of the singing voice quality.","venue":"FedCSIS","pages":"889-894","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PolrolniczakK15","doi":"10.15439/2015F240","ee":"https://doi.org/10.15439/2015F240","url":"https://dblp.org/rec/conf/fedcsis/PolrolniczakK15"}, "url":"URL#3534201" }, { "@score":"1", "@id":"3534202", "info":{"authors":{"author":{"@pid":"138/3862","text":"Maciej Pondel"}},"title":"A concept of enterprise Big Data and BI workflow driven platform.","venue":"FedCSIS","pages":"1699-1704","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Pondel15","doi":"10.15439/2015F343","ee":"https://doi.org/10.15439/2015F343","url":"https://dblp.org/rec/conf/fedcsis/Pondel15"}, "url":"URL#3534202" }, { "@score":"1", "@id":"3534203", "info":{"authors":{"author":[{"@pid":"53/1567","text":"Aneta Poniszewska-Maranda"},{"@pid":"170/6316","text":"Daniel Kaczmarek"}]},"title":"Selected methods of artificial intelligence for Internet of Things conception.","venue":"FedCSIS","pages":"1343-1348","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Poniszewska-Maranda15","doi":"10.15439/2015F161","ee":"https://doi.org/10.15439/2015F161","url":"https://dblp.org/rec/conf/fedcsis/Poniszewska-Maranda15"}, "url":"URL#3534203" }, { "@score":"1", "@id":"3534204", "info":{"authors":{"author":{"@pid":"170/6346","text":"Mariusz Postól"}},"title":"Object Oriented Internet.","venue":"FedCSIS","pages":"1069-1080","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Postol15","doi":"10.15439/2015F160","ee":"https://doi.org/10.15439/2015F160","url":"https://dblp.org/rec/conf/fedcsis/Postol15"}, "url":"URL#3534204" }, { "@score":"1", "@id":"3534205", "info":{"authors":{"author":[{"@pid":"170/6260","text":"Artem Potebnia"},{"@pid":"170/6222","text":"Sergiy Pogorilyy"}]},"title":"Innovative GPU accelerated algorithm for fast minimum convex hulls computation.","venue":"FedCSIS","pages":"555-561","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PotebniaP15","doi":"10.15439/2015F305","ee":"https://doi.org/10.15439/2015F305","url":"https://dblp.org/rec/conf/fedcsis/PotebniaP15"}, "url":"URL#3534205" }, { "@score":"1", "@id":"3534206", "info":{"authors":{"author":[{"@pid":"85/10894","text":"Thomas Preisler"},{"@pid":"152/0813","text":"Tim Dethlefs"},{"@pid":"23/3149","text":"Wolfgang Renz"}]},"title":"Simulation as a service: A design approach for large-scale energy network simulations.","venue":"FedCSIS","pages":"1765-1772","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PreislerDR15","doi":"10.15439/2015F116","ee":"https://doi.org/10.15439/2015F116","url":"https://dblp.org/rec/conf/fedcsis/PreislerDR15"}, "url":"URL#3534206" }, { "@score":"1", "@id":"3534207", "info":{"authors":{"author":[{"@pid":"07/11063","text":"Evgeny Pyshkin"},{"@pid":"50/11063","text":"Andrey Kuznetsov"}]},"title":"Approach to building a web-based expert system interface and its application for software provisioning in clouds.","venue":"FedCSIS","pages":"343-354","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PyshkinK15","doi":"10.15439/2015F142","ee":"https://doi.org/10.15439/2015F142","url":"https://dblp.org/rec/conf/fedcsis/PyshkinK15"}, "url":"URL#3534207" }, { "@score":"1", "@id":"3534208", "info":{"authors":{"author":[{"@pid":"84/8213","text":"Krzysztof Pytel"},{"@pid":"66/8212","text":"Tadeusz Nawarycz"},{"@pid":"27/11227","text":"Lidia Ostrowska-Nawarycz"},{"@pid":"138/3714","text":"Wojciech Drygas"}]},"title":"Anthropometric predictors and Artificial Neural Networks in the diagnosis of hypertension.","venue":"FedCSIS","pages":"287-290","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/PytelNOD15","doi":"10.15439/2015F246","ee":"https://doi.org/10.15439/2015F246","url":"https://dblp.org/rec/conf/fedcsis/PytelNOD15"}, "url":"URL#3534208" }, { "@score":"1", "@id":"3534210", "info":{"authors":{"author":[{"@pid":"03/11387","text":"Tomas Rasymas"},{"@pid":"66/1983","text":"Vytautas Rudzionis"}]},"title":"Evaluation of methods to combine different speech recognizers.","venue":"FedCSIS","pages":"1043-1047","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/RasymasR15","doi":"10.15439/2015F62","ee":"https://doi.org/10.15439/2015F62","url":"https://dblp.org/rec/conf/fedcsis/RasymasR15"}, "url":"URL#3534210" }, { "@score":"1", "@id":"3534211", "info":{"authors":{"author":[{"@pid":"92/2179","text":"Sonja Ristic"},{"@pid":"166/7559","text":"Slavica Kordic"},{"@pid":"53/8504","text":"Milan Celikovic"},{"@pid":"138/3690","text":"Vladimir Dimitrieski"},{"@pid":"42/1001","text":"Ivan Lukovic"}]},"title":"A model-driven approach to data structure conceptualization.","venue":"FedCSIS","pages":"977-984","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/RisticKCDL15","doi":"10.15439/2015F224","ee":"https://doi.org/10.15439/2015F224","url":"https://dblp.org/rec/conf/fedcsis/RisticKCDL15"}, "url":"URL#3534211" }, { "@score":"1", "@id":"3534213", "info":{"authors":{"author":[{"@pid":"03/6510","text":"Olympia Roeva"},{"@pid":"120/5226","text":"Peter Vassilev"},{"@pid":"25/5440","text":"Stefka Fidanova"},{"@pid":"14/4638","text":"Pawel Gepner"}]},"title":"InterCriteria Analysis of a model parameters identification using genetic algorithm.","venue":"FedCSIS","pages":"501-506","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/RoevaVFG15","doi":"10.15439/2015F223","ee":"https://doi.org/10.15439/2015F223","url":"https://dblp.org/rec/conf/fedcsis/RoevaVFG15"}, "url":"URL#3534213" }, { "@score":"1", "@id":"3534214", "info":{"authors":{"author":[{"@pid":"134/9481","text":"Maciej Rostanski"},{"@pid":"170/6324","text":"Pawel Buchwald"},{"@pid":"63/3589","text":"Krystian Maczka"},{"@pid":"80/3995","text":"Pawel Kostka"},{"@pid":"167/3774","text":"Zbigniew Nawrat"}]},"title":"The development of internetwork channel emulation platform for surgical robot telemanipulation control system (INSeRT).","venue":"FedCSIS","pages":"1081-1085","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/RostanskiBMKN15","doi":"10.15439/2015F239","ee":"https://doi.org/10.15439/2015F239","url":"https://dblp.org/rec/conf/fedcsis/RostanskiBMKN15"}, "url":"URL#3534214" }, { "@score":"1", "@id":"3534215", "info":{"authors":{"author":[{"@pid":"170/6309","text":"Lukasz Roszkowiak"},{"@pid":"72/3258","text":"Anna Korzynska"},{"@pid":"44/6332","text":"Dorota G. Pijanowska"}]},"title":"Short survey: Adaptive threshold methods used to segment immunonegative cells from simulated images of follicular lymphoma stained with 3, 3′-Diaminobenzidine&Haematoxylin.","venue":"FedCSIS","pages":"291-295","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/RoszkowiakKP15","doi":"10.15439/2015F263","ee":"https://doi.org/10.15439/2015F263","url":"https://dblp.org/rec/conf/fedcsis/RoszkowiakKP15"}, "url":"URL#3534215" }, { "@score":"1", "@id":"3534217", "info":{"authors":{"author":[{"@pid":"170/6237","text":"Rajpirathap S"},{"@pid":"170/6311","text":"Sheeyam S"},{"@pid":"170/6270","text":"Umasuthan K"},{"@pid":"170/6219","text":"Amalraj Chelvarajah"}]},"title":"Real-time direct translation system for Sinhala and Tamil languages.","venue":"FedCSIS","pages":"1437-1443","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SSKC15","doi":"10.15439/2015F113","ee":"https://doi.org/10.15439/2015F113","url":"https://dblp.org/rec/conf/fedcsis/SSKC15"}, "url":"URL#3534217" }, { "@score":"1", "@id":"3534218", "info":{"authors":{"author":{"@pid":"170/6233","text":"Omer Sakarya"}},"title":"Applying Fuzzy clustering method to color image segmentation.","venue":"FedCSIS","pages":"1049-1054","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Sakarya15","doi":"10.15439/2015F222","ee":"https://doi.org/10.15439/2015F222","url":"https://dblp.org/rec/conf/fedcsis/Sakarya15"}, "url":"URL#3534218" }, { "@score":"1", "@id":"3534219", "info":{"authors":{"author":[{"@pid":"22/10100","text":"Marwa Salayma"},{"@pid":"46/89","text":"Ahmed Yassin Al-Dubai"},{"@pid":"23/3594","text":"Imed Romdhani"},{"@pid":"21/451","text":"Muneer O. Bani Yassein"}]},"title":"Battery aware beacon enabled IEEE 802.15.4: An adaptive and cross-layer approach.","venue":"FedCSIS","pages":"1267-1272","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SalaymaARY15","doi":"10.15439/2015F118","ee":"https://doi.org/10.15439/2015F118","url":"https://dblp.org/rec/conf/fedcsis/SalaymaARY15"}, "url":"URL#3534219" }, { "@score":"1", "@id":"3534220", "info":{"authors":{"author":{"@pid":"04/2799","text":"Christer Samuelsson"}},"title":"Comparative evaluation of the stochastic simplex bisection algorithm and the SciPy.Optimize module.","venue":"FedCSIS","pages":"573-578","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Samuelsson15","doi":"10.15439/2015F47","ee":"https://doi.org/10.15439/2015F47","url":"https://dblp.org/rec/conf/fedcsis/Samuelsson15"}, "url":"URL#3534220" }, { "@score":"1", "@id":"3534221", "info":{"authors":{"author":[{"@pid":"62/1681","text":"Jerzy Sas"},{"@pid":"01/1537","text":"Urszula Markowska-Kaczmar"}]},"title":"Logical structure recognition of diagram images.","venue":"FedCSIS","pages":"215-224","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SasM15","doi":"10.15439/2015F383","ee":"https://doi.org/10.15439/2015F383","url":"https://dblp.org/rec/conf/fedcsis/SasM15"}, "url":"URL#3534221" }, { "@score":"1", "@id":"3534223", "info":{"authors":{"author":{"@pid":"38/4656","text":"Andrew Schumann"}},"title":"Go games on plasmodia of physarum polycephalum.","venue":"FedCSIS","pages":"615-626","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Schumann15","doi":"10.15439/2015F236","ee":"https://doi.org/10.15439/2015F236","url":"https://dblp.org/rec/conf/fedcsis/Schumann15"}, "url":"URL#3534223" }, { "@score":"1", "@id":"3534224", "info":{"authors":{"author":[{"@pid":"38/4656","text":"Andrew Schumann"},{"@pid":"93/6308","text":"Krzysztof Pancerz"}]},"title":"PhysarumSoft - a software tool for programming Physarum machines and simulating Physarum games.","venue":"FedCSIS","pages":"607-614","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SchumannP15","doi":"10.15439/2015F199","ee":"https://doi.org/10.15439/2015F199","url":"https://dblp.org/rec/conf/fedcsis/SchumannP15"}, "url":"URL#3534224" }, { "@score":"1", "@id":"3534225", "info":{"authors":{"author":[{"@pid":"64/7659","text":"Mathijs Schuts"},{"@pid":"h/JozefHooman","text":"Jozef Hooman"}]},"title":"Using Domain Specific Languages to improve the development of a power control unit.","venue":"FedCSIS","pages":"781-788","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SchutsH15","doi":"10.15439/2015F46","ee":"https://doi.org/10.15439/2015F46","url":"https://dblp.org/rec/conf/fedcsis/SchutsH15"}, "url":"URL#3534225" }, { "@score":"1", "@id":"3534226", "info":{"authors":{"author":[{"@pid":"120/3029","text":"Björn Schwarzbach"},{"@pid":"145/4949","text":"Michael Glöckner"},{"@pid":"170/6325","text":"Alexander Pirogov"},{"@pid":"170/6225","text":"Martin Max Röhling"},{"@pid":"38/3891","text":"Bogdan Franczyk"}]},"title":"Secure service interaction for collaborative business processes in the inter-cloud.","venue":"FedCSIS","pages":"1377-1386","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SchwarzbachGPRF15","doi":"10.15439/2015F282","ee":"https://doi.org/10.15439/2015F282","url":"https://dblp.org/rec/conf/fedcsis/SchwarzbachGPRF15"}, "url":"URL#3534226" }, { "@score":"1", "@id":"3534227", "info":{"authors":{"author":[{"@pid":"153/6733","text":"Shreeya Sengupta"},{"@pid":"39/721-1","text":"Hui Wang 0001"},{"@pid":"36/3766","text":"William Blackburn"},{"@pid":"00/1436","text":"Piyush Ojha"}]},"title":"Spatial information in classification of activity videos.","venue":"FedCSIS","pages":"145-153","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Sengupta0BO15","doi":"10.15439/2015F382","ee":"https://doi.org/10.15439/2015F382","url":"https://dblp.org/rec/conf/fedcsis/Sengupta0BO15"}, "url":"URL#3534227" }, { "@score":"1", "@id":"3534230", "info":{"authors":{"author":[{"@pid":"42/1514","text":"Andrzej Sikora"},{"@pid":"37/4232","text":"Ewa Niewiadomska-Szynkiewicz"},{"@pid":"167/7585","text":"Mateusz Krzyszton"}]},"title":"Simulation of mobile wireless ad hoc networks for emergency situation awareness.","venue":"FedCSIS","pages":"1087-1095","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SikoraNK15","doi":"10.15439/2015F52","ee":"https://doi.org/10.15439/2015F52","url":"https://dblp.org/rec/conf/fedcsis/SikoraNK15"}, "url":"URL#3534230" }, { "@score":"1", "@id":"3534231", "info":{"authors":{"author":{"@pid":"58/1429","text":"Pawel Sitek"}},"title":"A hybrid multi-objective programming framework for modeling and optimization of supply chain problems.","venue":"FedCSIS","pages":"1631-1640","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Sitek15","doi":"10.15439/2015F83","ee":"https://doi.org/10.15439/2015F83","url":"https://dblp.org/rec/conf/fedcsis/Sitek15"}, "url":"URL#3534231" }, { "@score":"1", "@id":"3534232", "info":{"authors":{"author":[{"@pid":"115/4403","text":"Pavle Skocir"},{"@pid":"97/3388","text":"Mario Kusek"},{"@pid":"25/6957","text":"Gordan Jezic"}]},"title":"Influence of on-device measurement analysis on energy efficiency in Machine-to-Machine systems.","venue":"FedCSIS","pages":"1273-1278","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SkocirKJ15","doi":"10.15439/2015F306","ee":"https://doi.org/10.15439/2015F306","url":"https://dblp.org/rec/conf/fedcsis/SkocirKJ15"}, "url":"URL#3534232" }, { "@score":"1", "@id":"3534234", "info":{"authors":{"author":[{"@pid":"170/6340","text":"Artur Skowronski"},{"@pid":"38/8706","text":"Jan Werewka"}]},"title":"A quality attributes approach to defining reactive systems solution applied to cloud of sensors.","venue":"FedCSIS","pages":"789-795","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SkowronskiW15","doi":"10.15439/2015F117","ee":"https://doi.org/10.15439/2015F117","url":"https://dblp.org/rec/conf/fedcsis/SkowronskiW15"}, "url":"URL#3534234" }, { "@score":"1", "@id":"3534235", "info":{"authors":{"author":[{"@pid":"170/6217","text":"Michal Skuza"},{"@pid":"32/175","text":"Andrzej Romanowski"}]},"title":"Sentiment analysis of Twitter data within big data distributed environment for stock prediction.","venue":"FedCSIS","pages":"1349-1354","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SkuzaR15","doi":"10.15439/2015F230","ee":"https://doi.org/10.15439/2015F230","url":"https://dblp.org/rec/conf/fedcsis/SkuzaR15"}, "url":"URL#3534235" }, { "@score":"1", "@id":"3534236", "info":{"authors":{"author":{"@pid":"10/323","text":"Andrzej Sluzek"}},"title":"Visual detection of objects by mobile agents using CBVIR techniques of low complexity.","venue":"FedCSIS","pages":"241-246","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Sluzek15","doi":"10.15439/2015F85","ee":"https://doi.org/10.15439/2015F85","url":"https://dblp.org/rec/conf/fedcsis/Sluzek15"}, "url":"URL#3534236" }, { "@score":"1", "@id":"3534237", "info":{"authors":{"author":{"@pid":"s/JohnFSowa","text":"John F. Sowa"}},"title":"The cognitive cycle.","venue":"FedCSIS","pages":"11-16","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Sowa15","doi":"10.15439/2015F003","ee":"https://doi.org/10.15439/2015F003","url":"https://dblp.org/rec/conf/fedcsis/Sowa15"}, "url":"URL#3534237" }, { "@score":"1", "@id":"3534238", "info":{"authors":{"author":[{"@pid":"92/8325","text":"Denis Spirjakin"},{"@pid":"44/10875","text":"Alexander M. Baranov"},{"@pid":"170/6307","text":"Vladimir Sleptsov"}]},"title":"Design of smart dust sensor node for combustible gas leakage monitoring.","venue":"FedCSIS","pages":"1279-1283","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SpirjakinBS15","doi":"10.15439/2015F172","ee":"https://doi.org/10.15439/2015F172","url":"https://dblp.org/rec/conf/fedcsis/SpirjakinBS15"}, "url":"URL#3534238" }, { "@score":"1", "@id":"3534239", "info":{"authors":{"author":[{"@pid":"136/6729","text":"Cezary Stepniak"},{"@pid":"136/6620","text":"Tomasz Turek"}]},"title":"Levels of the use of electronic communities in the management of regions.","venue":"FedCSIS","pages":"1551-1556","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/StepniakT15","doi":"10.15439/2015F277","ee":"https://doi.org/10.15439/2015F277","url":"https://dblp.org/rec/conf/fedcsis/StepniakT15"}, "url":"URL#3534239" }, { "@score":"1", "@id":"3534240", "info":{"authors":{"author":[{"@pid":"170/6224","text":"Anna Strzezek"},{"@pid":"170/6293","text":"Ludwik Trammer"},{"@pid":"94/2648","text":"Marcin Sydow"}]},"title":"DiverGene: Experiments on controlling population diversity in genetic algorithm with a dispersion operator.","venue":"FedCSIS","pages":"155-162","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/StrzezekTS15","doi":"10.15439/2015F411","ee":"https://doi.org/10.15439/2015F411","url":"https://dblp.org/rec/conf/fedcsis/StrzezekTS15"}, "url":"URL#3534240" }, { "@score":"1", "@id":"3534241", "info":{"authors":{"author":[{"@pid":"170/6263","text":"Matús Sulír"},{"@pid":"120/8294","text":"Milan Nosál"}]},"title":"Sharing developers' mental models through source code annotations.","venue":"FedCSIS","pages":"997-1006","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SulirN15","doi":"10.15439/2015F301","ee":"https://doi.org/10.15439/2015F301","url":"https://dblp.org/rec/conf/fedcsis/SulirN15"}, "url":"URL#3534241" }, { "@score":"1", "@id":"3534242", "info":{"authors":{"author":[{"@pid":"79/3776","text":"Jerzy Surma"},{"@pid":"07/2448","text":"Luvai Motiwalla"}]},"title":"Towards explaining publishing activity in Facebook.","venue":"FedCSIS","pages":"1355-1358","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SurmaM15","doi":"10.15439/2015F51","ee":"https://doi.org/10.15439/2015F51","url":"https://dblp.org/rec/conf/fedcsis/SurmaM15"}, "url":"URL#3534242" }, { "@score":"1", "@id":"3534244", "info":{"authors":{"author":[{"@pid":"121/0686","text":"Roland Szabó"},{"@pid":"97/9867","text":"Aurel Gontean"}]},"title":"Robotic arm detection in space with image recognition made in Linux with the Hough circles method.","venue":"FedCSIS","pages":"895-900","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SzaboG15","doi":"10.15439/2015F10","ee":"https://doi.org/10.15439/2015F10","url":"https://dblp.org/rec/conf/fedcsis/SzaboG15"}, "url":"URL#3534244" }, { "@score":"1", "@id":"3534245", "info":{"authors":{"author":{"@pid":"120/3102","text":"Zbigniew Szadkowski"}},"title":"DCT trigger for a detection of very inclined showers in the Pierre Auger surface detector engineering array in the new high-resolution Front-End based on the Cyclone V FPGA.","venue":"FedCSIS","pages":"701-708","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Szadkowski15","doi":"10.15439/2015F159","ee":"https://doi.org/10.15439/2015F159","url":"https://dblp.org/rec/conf/fedcsis/Szadkowski15"}, "url":"URL#3534245" }, { "@score":"1", "@id":"3534246", "info":{"authors":{"author":[{"@pid":"120/3102","text":"Zbigniew Szadkowski"},{"@pid":"84/8213","text":"Krzysztof Pytel"}]},"title":"Trigger based on the artificial neural network implemented in the cyclone V FPGA for a detection of neutrino-origin showers in the Pierre Auger surface detector.","venue":"FedCSIS","pages":"693-700","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SzadkowskiP15","doi":"10.15439/2015F208","ee":"https://doi.org/10.15439/2015F208","url":"https://dblp.org/rec/conf/fedcsis/SzadkowskiP15"}, "url":"URL#3534246" }, { "@score":"1", "@id":"3534247", "info":{"authors":{"author":[{"@pid":"166/6532","text":"Michal Szkudlarek"},{"@pid":"30/8484","text":"Maria Pietruszka"}]},"title":"Fast GPU and CPU computing for head position estimation.","venue":"FedCSIS","pages":"231-240","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/SzkudlarekP15","doi":"10.15439/2015F410","ee":"https://doi.org/10.15439/2015F410","url":"https://dblp.org/rec/conf/fedcsis/SzkudlarekP15"}, "url":"URL#3534247" }, { "@score":"1", "@id":"3534248", "info":{"authors":{"author":{"@pid":"69/10106","text":"Piotr Szwed"}},"title":"Concepts extraction from unstructured Polish texts: A rule based approach.","venue":"FedCSIS","pages":"355-364","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Szwed15","doi":"10.15439/2015F280","ee":"https://doi.org/10.15439/2015F280","url":"https://dblp.org/rec/conf/fedcsis/Szwed15"}, "url":"URL#3534248" }, { "@score":"1", "@id":"3534249", "info":{"authors":{"author":{"@pid":"69/10106","text":"Piotr Szwed"}},"title":"Efficiency of formal verification of ArchiMate business processes with NuSMV model checker.","venue":"FedCSIS","pages":"1427-1436","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Szwed15a","doi":"10.15439/2015F44","ee":"https://doi.org/10.15439/2015F44","url":"https://dblp.org/rec/conf/fedcsis/Szwed15a"}, "url":"URL#3534249" }, { "@score":"1", "@id":"3534251", "info":{"authors":{"author":[{"@pid":"170/6306","text":"Roman Taborsky"},{"@pid":"36/2462","text":"Valentino Vranic"}]},"title":"Feature model driven generation of software artifacts.","venue":"FedCSIS","pages":"1007-1018","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/TaborskyV15","doi":"10.15439/2015F364","ee":"https://doi.org/10.15439/2015F364","url":"https://dblp.org/rec/conf/fedcsis/TaborskyV15"}, "url":"URL#3534251" }, { "@score":"1", "@id":"3534252", "info":{"authors":{"author":[{"@pid":"170/6234","text":"Md. Hasan Tareque"},{"@pid":"51/2132","text":"Md. Shohrab Hossain"},{"@pid":"a/MAtiquzzaman","text":"Mohammed Atiquzzaman"}]},"title":"On the routing in Flying Ad Hoc Networks.","venue":"FedCSIS","pages":"1-9","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/TarequeHA15","doi":"10.15439/2015F002","ee":"https://doi.org/10.15439/2015F002","url":"https://dblp.org/rec/conf/fedcsis/TarequeHA15"}, "url":"URL#3534252" }, { "@score":"1", "@id":"3534253", "info":{"authors":{"author":{"@pid":"73/1768","text":"Giacomo di Tollo"}},"title":"Hybrid metaheuristic for Portfolio Selection: Comparison with an exact solver and search space analysis.","venue":"FedCSIS","pages":"579-588","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Tollo15","doi":"10.15439/2015F7","ee":"https://doi.org/10.15439/2015F7","url":"https://dblp.org/rec/conf/fedcsis/Tollo15"}, "url":"URL#3534253" }, { "@score":"1", "@id":"3534254", "info":{"authors":{"author":[{"@pid":"138/3679","text":"Rafal Trójczak"},{"@pid":"01/58","text":"Robert Trypuz"},{"@pid":"170/6328","text":"Anna Mazurek"},{"@pid":"87/7337","text":"Piotr Kulicki"}]},"title":"Knowledge transfer from agri-food scientific papers to a knowledge base.","venue":"FedCSIS","pages":"1705-1712","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/TrojczakTMK15","doi":"10.15439/2015F209","ee":"https://doi.org/10.15439/2015F209","url":"https://dblp.org/rec/conf/fedcsis/TrojczakTMK15"}, "url":"URL#3534254" }, { "@score":"1", "@id":"3534255", "info":{"authors":{"author":[{"@pid":"87/3564","text":"Michal Turek"},{"@pid":"38/8706","text":"Jan Werewka"},{"@pid":"170/6329","text":"Kamil Sztandera"},{"@pid":"53/2788","text":"Grzegorz Rogus"}]},"title":"Assessment of software system presentation layers based on an ECORAM reference architecture model.","venue":"FedCSIS","pages":"901-906","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/TurekWSR15","doi":"10.15439/2015F131","ee":"https://doi.org/10.15439/2015F131","url":"https://dblp.org/rec/conf/fedcsis/TurekWSR15"}, "url":"URL#3534255" }, { "@score":"1", "@id":"3534256", "info":{"authors":{"author":{"@pid":"51/8762","text":"Apoloniusz Tyszka"}},"title":"A hypothetical way to compute an upper bound for the heights of solutions of a Diophantine equation with a finite number of solutions.","venue":"FedCSIS","pages":"709-716","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Tyszka15","doi":"10.15439/2015F41","ee":"https://doi.org/10.15439/2015F41","url":"https://dblp.org/rec/conf/fedcsis/Tyszka15"}, "url":"URL#3534256" }, { "@score":"1", "@id":"3534257", "info":{"authors":{"author":[{"@pid":"152/1079","text":"Andy Vesa"},{"@pid":"73/1659","text":"Florin Alexa"},{"@pid":"43/10427","text":"Horia Balta"}]},"title":"Comparisons between 2D and 3D uniform array antennas.","venue":"FedCSIS","pages":"1285-1290","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/VesaAB15","doi":"10.15439/2015F266","ee":"https://doi.org/10.15439/2015F266","url":"https://dblp.org/rec/conf/fedcsis/VesaAB15"}, "url":"URL#3534257" }, { "@score":"1", "@id":"3534258", "info":{"authors":{"author":[{"@pid":"120/3147","text":"Peter Vestenický"},{"@pid":"170/6310","text":"Tomas Mravec"},{"@pid":"154/7031","text":"Martin Vestenický"}]},"title":"Analysis of inductively coupled RFID marker localization methods.","venue":"FedCSIS","pages":"1291-1295","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/VestenickyMV15","doi":"10.15439/2015F298","ee":"https://doi.org/10.15439/2015F298","url":"https://dblp.org/rec/conf/fedcsis/VestenickyMV15"}, "url":"URL#3534258" }, { "@score":"1", "@id":"3534259", "info":{"authors":{"author":[{"@pid":"135/7672","text":"Martin Víta"},{"@pid":"121/5183","text":"Martin Komenda"},{"@pid":"170/6266","text":"Andrea Pokorná"}]},"title":"Exploring medical curricula using social network analysis methods.","venue":"FedCSIS","pages":"297-302","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/VitaKP15","doi":"10.15439/2015F312","ee":"https://doi.org/10.15439/2015F312","url":"https://dblp.org/rec/conf/fedcsis/VitaKP15"}, "url":"URL#3534259" }, { "@score":"1", "@id":"3534260", "info":{"authors":{"author":[{"@pid":"170/6246","text":"Marina Vugalter"},{"@pid":"28/6373","text":"Adir Even"}]},"title":"Organizational impacts of enhancing a BI-supported Performance Measurement System on the Israeli police.","venue":"FedCSIS","pages":"1513-1519","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/VugalterE15","doi":"10.15439/2015F221","ee":"https://doi.org/10.15439/2015F221","url":"https://dblp.org/rec/conf/fedcsis/VugalterE15"}, "url":"URL#3534260" }, { "@score":"1", "@id":"3534262", "info":{"authors":{"author":{"@pid":"138/8514","text":"Bartosz Wachnik"}},"title":"Moral hazard in IT project completion. A multiplestudy analysis case.","venue":"FedCSIS","pages":"1557-1562","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Wachnik15","doi":"10.15439/2015F68","ee":"https://doi.org/10.15439/2015F68","url":"https://dblp.org/rec/conf/fedcsis/Wachnik15"}, "url":"URL#3534262" }, { "@score":"1", "@id":"3534264", "info":{"authors":{"author":[{"@pid":"19/9685","text":"Jaroslaw Watróbski"},{"@pid":"26/9686","text":"Jaroslaw Jankowski"}]},"title":"Knowledge management in MCDA domain.","venue":"FedCSIS","pages":"1445-1450","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/WatrobskiJ15","doi":"10.15439/2015F295","ee":"https://doi.org/10.15439/2015F295","url":"https://dblp.org/rec/conf/fedcsis/WatrobskiJ15"}, "url":"URL#3534264" }, { "@score":"1", "@id":"3534265", "info":{"authors":{"author":[{"@pid":"19/9685","text":"Jaroslaw Watróbski"},{"@pid":"150/2784","text":"Pawel Ziemba"},{"@pid":"170/6227","text":"Waldemar Wolski"}]},"title":"Methodological aspects of Decision Support System for the location of renewable energy sources.","venue":"FedCSIS","pages":"1451-1459","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/WatrobskiZW15","doi":"10.15439/2015F294","ee":"https://doi.org/10.15439/2015F294","url":"https://dblp.org/rec/conf/fedcsis/WatrobskiZW15"}, "url":"URL#3534265" }, { "@score":"1", "@id":"3534266", "info":{"authors":{"author":[{"@pid":"170/6261","text":"Szymon Wawrzyniak"},{"@pid":"77/5778","text":"Wojciech Niemiro"}]},"title":"Clustering approach to the problem of human activity recognition using motion data.","venue":"FedCSIS","pages":"411-416","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/WawrzyniakN15","doi":"10.15439/2015F424","ee":"https://doi.org/10.15439/2015F424","url":"https://dblp.org/rec/conf/fedcsis/WawrzyniakN15"}, "url":"URL#3534266" }, { "@score":"1", "@id":"3534267", "info":{"authors":{"author":{"@pid":"98/5456","text":"Janusz Wielki"}},"title":"An analysis of the opportunities and challenges connected with utilization of the cloud computing model and the most important aspects of the migration strategy.","venue":"FedCSIS","pages":"1569-1574","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Wielki15","doi":"10.15439/2015F93","ee":"https://doi.org/10.15439/2015F93","url":"https://dblp.org/rec/conf/fedcsis/Wielki15"}, "url":"URL#3534267" }, { "@score":"1", "@id":"3534269", "info":{"authors":{"author":[{"@pid":"152/5664","text":"Agnieszka Wosiak"},{"@pid":"40/1566","text":"Danuta Zakrzewska"}]},"title":"On integrating clustering and statistical analysis for supporting cardiovascular disease diagnosis.","venue":"FedCSIS","pages":"303-310","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/WosiakZ15","doi":"10.15439/2015F151","ee":"https://doi.org/10.15439/2015F151","url":"https://dblp.org/rec/conf/fedcsis/WosiakZ15"}, "url":"URL#3534269" }, { "@score":"1", "@id":"3534270", "info":{"authors":{"author":[{"@pid":"70/5776","text":"Amine Aït Younes"},{"@pid":"18/3922","text":"Frédéric Blanchard"},{"@pid":"h/MichelHerbin","text":"Michel Herbin"}]},"title":"New similarity index based on the aggregation of membership functions through OWA operator.","venue":"FedCSIS","pages":"163-168","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/YounesBH15","doi":"10.15439/2015F174","ee":"https://doi.org/10.15439/2015F174","url":"https://dblp.org/rec/conf/fedcsis/YounesBH15"}, "url":"URL#3534270" }, { "@score":"1", "@id":"3534271", "info":{"authors":{"author":{"@pid":"98/2878","text":"Adam Zagorecki"}},"title":"A versatile approach to classification of multivariate time series data.","venue":"FedCSIS","pages":"407-410","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/Zagorecki15","doi":"10.15439/2015F419","ee":"https://doi.org/10.15439/2015F419","url":"https://dblp.org/rec/conf/fedcsis/Zagorecki15"}, "url":"URL#3534271" }, { "@score":"1", "@id":"3534272", "info":{"authors":{"author":[{"@pid":"65/5151","text":"Elena N. Zaitseva"},{"@pid":"138/2702","text":"Miroslav Kvassay"},{"@pid":"33/6797","text":"Vitaly G. Levashenko"},{"@pid":"138/2994","text":"Jozef Kostolny"}]},"title":"Introduction to knowledge discovery in medical databases and use of reliability analysis in data mining.","venue":"FedCSIS","pages":"311-320","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ZaitsevaKLK15","doi":"10.15439/2015F327","ee":"https://doi.org/10.15439/2015F327","url":"https://dblp.org/rec/conf/fedcsis/ZaitsevaKLK15"}, "url":"URL#3534272" }, { "@score":"1", "@id":"3534274", "info":{"authors":{"author":[{"@pid":"170/6299","text":"Róbert Zalman"},{"@pid":"170/6345","text":"Veronika Olesnaníková"},{"@pid":"68/2990","text":"Peter Sevcík"},{"@pid":"170/6281","text":"Peter Sarafín"}]},"title":"Monitoring of CO2 amount in closed objects via WSN.","venue":"FedCSIS","pages":"1257-1260","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ZalmanOSS15","doi":"10.15439/2015F332","ee":"https://doi.org/10.15439/2015F332","url":"https://dblp.org/rec/conf/fedcsis/ZalmanOSS15"}, "url":"URL#3534274" }, { "@score":"1", "@id":"3534275", "info":{"authors":{"author":[{"@pid":"00/10118","text":"Eftim Zdravevski"},{"@pid":"22/10118","text":"Petre Lameski"},{"@pid":"30/993","text":"Andrea Kulakov"},{"@pid":"99/5297","text":"Sonja Filiposka"},{"@pid":"66/6484","text":"Dimitar Trajanov"},{"@pid":"68/58","text":"Boro Jakimovski"}]},"title":"Parallel computation of information gain using Hadoop and MapReduce.","venue":"FedCSIS","pages":"181-192","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ZdravevskiLKFTJ15","doi":"10.15439/2015F89","ee":"https://doi.org/10.15439/2015F89","url":"https://dblp.org/rec/conf/fedcsis/ZdravevskiLKFTJ15"}, "url":"URL#3534275" }, { "@score":"1", "@id":"3534276", "info":{"authors":{"author":[{"@pid":"00/10118","text":"Eftim Zdravevski"},{"@pid":"22/10118","text":"Petre Lameski"},{"@pid":"30/993","text":"Andrea Kulakov"},{"@pid":"29/964","text":"Slobodan Kalajdziski"}]},"title":"Transformation of nominal features into numeric in supervised multi-class problems based on the weight of evidence parameter.","venue":"FedCSIS","pages":"169-179","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ZdravevskiLKK15","doi":"10.15439/2015F90","ee":"https://doi.org/10.15439/2015F90","url":"https://dblp.org/rec/conf/fedcsis/ZdravevskiLKK15"}, "url":"URL#3534276" }, { "@score":"1", "@id":"3534277", "info":{"authors":{"author":[{"@pid":"00/10118","text":"Eftim Zdravevski"},{"@pid":"22/10118","text":"Petre Lameski"},{"@pid":"170/6320","text":"Riste Mingov"},{"@pid":"30/993","text":"Andrea Kulakov"},{"@pid":"07/7935","text":"Dejan Gjorgjevikj"}]},"title":"Robust histogram-based feature engineering of time series data.","venue":"FedCSIS","pages":"381-388","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ZdravevskiLMKG15","doi":"10.15439/2015F420","ee":"https://doi.org/10.15439/2015F420","url":"https://dblp.org/rec/conf/fedcsis/ZdravevskiLMKG15"}, "url":"URL#3534277" }, { "@score":"1", "@id":"3534278", "info":{"authors":{"author":[{"@pid":"152/5690","text":"Ouarda Zedadra"},{"@pid":"57/5383","text":"Hamid Seridi"},{"@pid":"18/3003","text":"Nicolas Jouandeau"},{"@pid":"f/GiancarloFortino","text":"Giancarlo Fortino"}]},"title":"Energy expenditure in multi-agent foraging: An empirical analysis.","venue":"FedCSIS","pages":"1773-1778","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ZedadraSJF15","doi":"10.15439/2015F200","ee":"https://doi.org/10.15439/2015F200","url":"https://dblp.org/rec/conf/fedcsis/ZedadraSJF15"}, "url":"URL#3534278" }, { "@score":"1", "@id":"3534279", "info":{"authors":{"author":[{"@pid":"161/9693","text":"Hafed Zghidi"},{"@pid":"170/6338","text":"Maksym Walczak"},{"@pid":"170/6211","text":"Tomasz Blachowicz"},{"@pid":"170/6287","text":"Krzysztof Domino"},{"@pid":"170/6284","text":"Andrea Ehrmann"}]},"title":"Image processing and analysis of textile fibers by virtual random walk.","venue":"FedCSIS","pages":"717-720","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ZghidiWBDE15","doi":"10.15439/2015F40","ee":"https://doi.org/10.15439/2015F40","url":"https://dblp.org/rec/conf/fedcsis/ZghidiWBDE15"}, "url":"URL#3534279" }, { "@score":"1", "@id":"3534280", "info":{"authors":{"author":[{"@pid":"150/2784","text":"Pawel Ziemba"},{"@pid":"26/9686","text":"Jaroslaw Jankowski"},{"@pid":"19/9685","text":"Jaroslaw Watróbski"},{"@pid":"170/6227","text":"Waldemar Wolski"},{"@pid":"167/7376","text":"Jaroslaw Becker"}]},"title":"Integration of domain ontologies in the repository of website evaluation methods.","venue":"FedCSIS","pages":"1585-1595","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ZiembaJWWB15","doi":"10.15439/2015F297","ee":"https://doi.org/10.15439/2015F297","url":"https://dblp.org/rec/conf/fedcsis/ZiembaJWWB15"}, "url":"URL#3534280" }, { "@score":"1", "@id":"3534281", "info":{"authors":{"author":[{"@pid":"120/2933","text":"Ewa Ziemba"},{"@pid":"170/6267","text":"Iwona Kolasa"}]},"title":"Risk factors framework for information systems projects in public organizations - insight from Poland.","venue":"FedCSIS","pages":"1575-1583","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ZiembaK15","doi":"10.15439/2015F110","ee":"https://doi.org/10.15439/2015F110","url":"https://dblp.org/rec/conf/fedcsis/ZiembaK15"}, "url":"URL#3534281" }, { "@score":"1", "@id":"3534285", "info":{"authors":{"author":[{"@pid":"136/1248","text":"Mariusz Zytniewski"},{"@pid":"138/3884","text":"Andrzej Soltysik"},{"@pid":"154/0438","text":"Anna Soltysik-Piorunkiewicz"},{"@pid":"170/6317","text":"Bartosz Kopka"}]},"title":"Modeling of software agents' societies in knowledge-based organizations. The results of the study.","venue":"FedCSIS","pages":"1603-1610","year":"2015","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/fedcsis/ZytniewskiSSK15","doi":"10.15439/2015F216","ee":"https://doi.org/10.15439/2015F216","url":"https://dblp.org/rec/conf/fedcsis/ZytniewskiSSK15"}, "url":"URL#3534285" }, { "@score":"1", "@id":"3647246", "info":{"authors":{"author":[{"@pid":"06/3321","text":"Maria Ganzha"},{"@pid":"m/LAMaciaszek","text":"Leszek A. Maciaszek"},{"@pid":"23/109","text":"Marcin Paprzycki"}]},"title":"2015 Federated Conference on Computer Science and Information Systems, FedCSIS 2015, Lódz, Poland, September 13-16, 2015","venue":["FedCSIS","Annals of Computer Science and Information Systems"],"volume":"5","publisher":"IEEE","year":"2015","type":"Editorship","key":"conf/fedcsis/2015","doi":"10.15439/978-83-60810-66-8","ee":"https://doi.org/10.15439/978-83-60810-66-8","url":"https://dblp.org/rec/conf/fedcsis/2015"}, "url":"URL#3647246" } ] } } } )