Filter your results
- 10
- 1
- 10
- 1
- 11
- 9
- 11
- 1
- 3
- 2
- 11
- 9
- 4
- 11
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Telecommunications Networks Risk Assessment with Bayesian Networks12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.277-288, ⟨10.1007/978-3-642-40925-7_26⟩
Conference papers
hal-01496074v1
|
||
|
Weighted Approach to Projective Clustering12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.367-378, ⟨10.1007/978-3-642-40925-7_34⟩
Conference papers
hal-01496083v1
|
||
|
Bengali Printed Character Recognition – A New Approach12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.129-140, ⟨10.1007/978-3-642-40925-7_13⟩
Conference papers
hal-01496058v1
|
||
|
Computer Information Systems and Industrial ManagementSpringer, LNCS-8104, 2013, Lecture Notes in Computer Science, 978-3-642-40924-0. ⟨10.1007/978-3-642-40925-7⟩
Books
hal-01496113v1
|
||
|
User Authentication for Mobile Devices12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.47-58, ⟨10.1007/978-3-642-40925-7_5⟩
Conference papers
hal-01496111v1
|
||
|
Identification of Persons by Virtue of Hand Geometry12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.36-46, ⟨10.1007/978-3-642-40925-7_4⟩
Conference papers
hal-01496097v1
|
||
|
Intelligent UBMSS Systems for Strategic Information Management1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.408-413
Conference papers
hal-01506573v1
|
||
|
Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.158-167, ⟨10.1007/978-3-642-40925-7_16⟩
Conference papers
hal-01496062v1
|
||
|
The Data Exploration System for Image Processing Based on Server-Side Operations12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.168-176, ⟨10.1007/978-3-642-40925-7_17⟩
Conference papers
hal-01496063v1
|
||
|
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.430-441
Conference papers
hal-01506565v1
|
||
|
Flow-Based Detection of DNS Tunnels7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.124-135, ⟨10.1007/978-3-642-38998-6_16⟩
Conference papers
hal-01489962v1
|