Filter your results
- 9
- 2
- 9
- 2
- 11
- 8
- 2
- 9
- 1
- 3
- 11
- 11
- 4
- 11
- 1
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges AlgorithmInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.468-478, ⟨10.1007/978-3-642-32498-7_35⟩
Conference papers
hal-01542461v1
|
||
|
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions AccountsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.534-546, ⟨10.1007/978-3-642-32498-7_41⟩
Conference papers
hal-01542426v1
|
||
|
Comprehensive Performance Evaluation of Various Feature Extraction Methods for OCR Purposes14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.411-422, ⟨10.1007/978-3-319-24369-6_34⟩
Conference papers
hal-01444484v1
|
||
|
Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary ArteriesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.460-467, ⟨10.1007/978-3-642-32498-7_34⟩
Conference papers
hal-01542462v1
|
||
|
Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.180-190, ⟨10.1007/978-3-642-33260-9_15⟩
Conference papers
hal-01551742v1
|
||
|
Computer Information Systems and Industrial ManagementSpringer, LNCS-7564, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-33260-9⟩
Books
hal-01551708v1
|
||
|
HTCPNs–Based Modelling and Evaluation of Dynamic Computer Cluster Reconfiguration4th Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2009, Krakow, Poland. pp.97-108, ⟨10.1007/978-3-642-28038-2_8⟩
Conference papers
hal-01527395v1
|
||
|
Verification of ArchiMate Behavioral Elements by Model Checking14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.132-144, ⟨10.1007/978-3-319-24369-6_11⟩
Conference papers
hal-01444460v1
|
||
|
A New Algorithm for Rotation Detection in Iris Pattern Recognition11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.135-145, ⟨10.1007/978-3-642-33260-9_11⟩
Conference papers
hal-01551719v1
|
||
|
Advances in Software Engineering TechniquesSpringer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books
hal-01527391v1
|
||
|
Advances in the Keystroke Dynamics: The Practical Impact of Database Quality11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.203-214, ⟨10.1007/978-3-642-33260-9_17⟩
Conference papers
hal-01551740v1
|