Table of Contents
|
Computer Information Systems and Industrial Management Agostino Cortesi, Nabendu Chaki, Khalid Saeed, Sławomir Wierzchoń (Eds.)
|
Front Matter |
Invited Talks
|
Formalising Security in Ubiquitous and Cloud Scenarios Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti, Chiara Bodei |
1-29 |
Designing Smart Cities: Security Issues Young Cho |
30-40 |
Security, Access Control and Intrusion Detection
|
Certificate-Based Encryption Scheme with General Access Structure Tomasz Hyla, Jerzy Pejaś |
41-55 |
Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks Ekawat Homsirikamol, Paweł Morawiecki, Marcin Rogawski, Marian Srebrny |
56-67 |
Usage Control Model Specification in XACML Policy Language Um E-Ghazia, Rahat Masood, Muhammad Shibli, Muhammad Bilal |
68-79 |
TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks Novarun Deb, Nabendu Chaki |
80-91 |
Intruder Data Classification Using GM-SOM Petr Gajdoš, Pavel Moravec |
92-100 |
Method for Identification of Suitable Persons in Collaborators’ Networks Pavla Dráždilová, Alisa Babskova, Jan Martinovič, Kateřina Slaninová, Štěpán Minks |
101-110 |
A Graph-Based Formalism for Controlling Access to a Digital Library Ontology Subhasis Dasgupta, Aditya Bagchi |
111-122 |
Role Approach in Access Control Development with the Usage Control Concept Aneta Poniszewska-Maranda |
123-134 |
Pattern Recognition and Image Processing
|
A New Algorithm for Rotation Detection in Iris Pattern Recognition Krzysztof Misztal, Jacek Tabor, Khalid Saeed |
135-145 |
Outlier Removal in 2D Leap Frog Algorithm Ryszard Kozera, Jacek Tchórzewski |
146-157 |
Dynamic Signature Recognition Based on Modified Windows Technique Rafal Doroz, Krzysztof Wrobel |
158-167 |
Rigid and Non-rigid Shape Matching for Mechanical Components Retrieval Andrea Albarelli, Filippo Bergamasco, Andrea Torsello |
168-179 |
Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors Bogusław Cyganek |
180-190 |
Biometric Applications
|
DTW and Voting-Based Lip Print Recognition System Piotr Porwik, Tomasz Orczyk |
191-202 |
Advances in the Keystroke Dynamics: The Practical Impact of Database Quality Mariusz Rybnik, Piotr Panasiuk, Khalid Saeed, Marcin Rogowski |
203-214 |
Advanced Intracardial Biosignal Processing Marek Penhaker, Petr Klimes, Jakub Pindor, David Korpas |
215-223 |
Multi-constraints Face Detect-Track System Hazar Mliki, Mohamed Hammami, Hanêne Ben-Abdallah |
224-235 |
Using a Differential Pressure Sensor as Spirometer Martin Augustynek, Ondrej Adamec, David Micanik |
236-241 |
Algorithms and Data Management
|
Hybrid Negative Selection Approach for Anomaly Detection Andrzej Chmielewski, Sławomir Wierzchoń |
242-253 |
Spectral Clustering Based on k-Nearest Neighbor Graph Małgorzata Lucińska, Sławomir Wierzchoń |
254-265 |
A New Scale for Attribute Dependency in Large Database Systems Soumya Sen, Anjan Dutta, Agostino Cortesi, Nabendu Chaki |
266-277 |
Left-Right Oscillate Algorithm for Community Detection Used in E-Learning System Jan Martinovič, Pavla Dráždilová, Kateřina Slaninová, Tomáš Kocyan, Václav Snášel |
278-289 |
Plan and Goal Structure Reconstruction: An Automated and Incremental Method Based on Observation of a Single Agent Bartłomiej Dzieńkowski, Urszula Markowska-Kaczmar |
290-301 |
On Spectral Partitioning of Co-authorship Networks Václav Snášel, Pavel Krömer, Jan Platoš, Miloš Kudělka, Zdeněk Horák |
302-313 |
An Efficient Binary Playfair Algorithm Using a 4×4 Playfair Key Matrix Saswati Mukherjee, Matangini Chattopadhyay, Ayan Lahiri, Samiran Chattopadhyay |
314-325 |
Tuning of a Knowledge-Driven Harmonization Model for Tonal Music Mariusz Rybnik, Wladyslaw Homenda |
326-337 |
Efficient Processing the Braille Music Notation Tomasz Sitarek, Wladyslaw Homenda |
338-350 |
Networking
|
ETSeM: A Energy-Aware, Trust-Based, Selective Multi-path Routing Protocol Manali Chakraborty, Nabendu Chaki |
351-360 |
Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks Soumyabrata Saha, Rituparna Chaki |
361-373 |
System Models and Risk Assessment
|
A Business Process Modeling Notation Extension for Risk Handling Bartosz Marcinkowski, Michal Kuciapski |
374-381 |
Modeling Consumer Decision Making Process with Triangular Norms Agnieszka Jastrzebska, Wladyslaw Homenda |
382-394 |
Neural Network Modeling of a Flexible Manipulator Robot Rahma Boucetta, Mohamed Abdelkrim |
395-404 |
P Systems for Traffic Flow Simulation Jiří Dvorský, Zbyněk Janoška, Lukáš Vojáček |
405-415 |
Using Extended Raster File for Real Time Traffic Information Mining Michal Radecký, Jan Martinovič, Dušan Fedorčák, Radek Tomis, Ivo Vondrák |
416-427 |
A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems Imed Fray |
428-442 |