Filter your results
- 37
- 4
- 37
- 4
- 41
- 33
- 1
- 3
- 2
- 11
- 11
- 9
- 4
- 41
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 9
- 7
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
41 results
|
|
sorted by
|
|
HTCPNs–Based Tool for Web–Server Clusters Development3rd Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2008, Brno, Czech Republic. pp.131-142, ⟨10.1007/978-3-642-22386-0_10⟩
Conference papers
hal-01572551v1
|
||
|
Learning Web Application Firewall - Benefits and Caveats1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.295-308, ⟨10.1007/978-3-642-23300-5_23⟩
Conference papers
hal-01590402v1
|
||
|
Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.220-227, ⟨10.1007/978-3-642-23300-5_17⟩
Conference papers
hal-01590386v1
|
||
|
Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.135-148, ⟨10.1007/978-3-642-23300-5_11⟩
Conference papers
hal-01590406v1
|
||
|
Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary ArteriesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.460-467, ⟨10.1007/978-3-642-32498-7_34⟩
Conference papers
hal-01542462v1
|
||
|
Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges AlgorithmInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.468-478, ⟨10.1007/978-3-642-32498-7_35⟩
Conference papers
hal-01542461v1
|
||
|
A New Algorithm for Rotation Detection in Iris Pattern Recognition11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.135-145, ⟨10.1007/978-3-642-33260-9_11⟩
Conference papers
hal-01551719v1
|
||
|
Advances in Software Engineering TechniquesSpringer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books
hal-01527391v1
|
||
|
Advances in the Keystroke Dynamics: The Practical Impact of Database Quality11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.203-214, ⟨10.1007/978-3-642-33260-9_17⟩
Conference papers
hal-01551740v1
|
||
|
Computer Information Systems and Industrial ManagementSpringer, LNCS-7564, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-33260-9⟩
Books
hal-01551708v1
|
||
|
HTCPNs–Based Modelling and Evaluation of Dynamic Computer Cluster Reconfiguration4th Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2009, Krakow, Poland. pp.97-108, ⟨10.1007/978-3-642-28038-2_8⟩
Conference papers
hal-01527395v1
|
||
|
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions AccountsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.534-546, ⟨10.1007/978-3-642-32498-7_41⟩
Conference papers
hal-01542426v1
|
||
|
Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.180-190, ⟨10.1007/978-3-642-33260-9_15⟩
Conference papers
hal-01551742v1
|
||
|
Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.158-167, ⟨10.1007/978-3-642-40925-7_16⟩
Conference papers
hal-01496062v1
|
||
|
Weighted Approach to Projective Clustering12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.367-378, ⟨10.1007/978-3-642-40925-7_34⟩
Conference papers
hal-01496083v1
|
||
|
Bengali Printed Character Recognition – A New Approach12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.129-140, ⟨10.1007/978-3-642-40925-7_13⟩
Conference papers
hal-01496058v1
|
||
|
User Authentication for Mobile Devices12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.47-58, ⟨10.1007/978-3-642-40925-7_5⟩
Conference papers
hal-01496111v1
|
||
|
Flow-Based Detection of DNS Tunnels7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.124-135, ⟨10.1007/978-3-642-38998-6_16⟩
Conference papers
hal-01489962v1
|
||
|
Intelligent UBMSS Systems for Strategic Information Management1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.408-413
Conference papers
hal-01506573v1
|
||
|
Identification of Persons by Virtue of Hand Geometry12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.36-46, ⟨10.1007/978-3-642-40925-7_4⟩
Conference papers
hal-01496097v1
|
||
|
Computer Information Systems and Industrial ManagementSpringer, LNCS-8104, 2013, Lecture Notes in Computer Science, 978-3-642-40924-0. ⟨10.1007/978-3-642-40925-7⟩
Books
hal-01496113v1
|
||
|
The Data Exploration System for Image Processing Based on Server-Side Operations12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.168-176, ⟨10.1007/978-3-642-40925-7_17⟩
Conference papers
hal-01496063v1
|
||
|
Telecommunications Networks Risk Assessment with Bayesian Networks12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.277-288, ⟨10.1007/978-3-642-40925-7_26⟩
Conference papers
hal-01496074v1
|
||
|
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.430-441
Conference papers
hal-01506565v1
|
||
|
Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.141-150, ⟨10.1007/978-3-662-45237-0_15⟩
Conference papers
hal-01405572v1
|
||
|
Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.278-289, ⟨10.1007/978-3-662-45237-0_27⟩
Conference papers
hal-01405598v1
|
||
|
Network Anomaly Detection Using Parameterized Entropy13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.465-478, ⟨10.1007/978-3-662-45237-0_43⟩
Conference papers
hal-01405630v1
|
||
|
A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.514-525, ⟨10.1007/978-3-662-45237-0_47⟩
Conference papers
hal-01405634v1
|
||
|
Computer Information Systems and Industrial ManagementSpringer, LNCS-8838, 2014, Lecture Notes in Computer Science, 978-3-662-45236-3. ⟨10.1007/978-3-662-45237-0⟩
Books
hal-01405673v1
|
||
|
Crypto-Biometric Models for Information SecrecyInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.172-178, ⟨10.1007/978-3-319-10975-6_13⟩
Conference papers
hal-01403994v1
|
- 1
- 2