Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

41 results
Image document

HTCPNs–Based Tool for Web–Server Clusters Development

Slawomir Samolej , Tomasz Szmuc
3rd Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2008, Brno, Czech Republic. pp.131-142, ⟨10.1007/978-3-642-22386-0_10⟩
Conference papers hal-01572551v1
Image document

Learning Web Application Firewall - Benefits and Caveats

Dariusz Pałka , Marek Zachara
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.295-308, ⟨10.1007/978-3-642-23300-5_23⟩
Conference papers hal-01590402v1
Image document

Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes

Mirosław Trzupek
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.220-227, ⟨10.1007/978-3-642-23300-5_17⟩
Conference papers hal-01590386v1
Image document

Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection

Tomasz Hachaj , Marek R. Ogiela
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.135-148, ⟨10.1007/978-3-642-23300-5_11⟩
Conference papers hal-01590406v1
Image document

Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary Arteries

Mirosław Trzupek , Marek R. Ogiela
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.460-467, ⟨10.1007/978-3-642-32498-7_34⟩
Conference papers hal-01542462v1
Image document

Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm

Tomasz Hachaj , Marek R. Ogiela
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.468-478, ⟨10.1007/978-3-642-32498-7_35⟩
Conference papers hal-01542461v1
Image document

A New Algorithm for Rotation Detection in Iris Pattern Recognition

Krzysztof Misztal , Jacek Tabor , Khalid Saeed
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.135-145, ⟨10.1007/978-3-642-33260-9_11⟩
Conference papers hal-01551719v1

Advances in Software Engineering Techniques

David Hutchison , Takeo Kanade , Josef Kittler , Jon M. Kleinberg , Friedemann Mattern , et al.
Springer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books hal-01527391v1
Image document

Advances in the Keystroke Dynamics: The Practical Impact of Database Quality

Mariusz Rybnik , Piotr Panasiuk , Khalid Saeed , Marcin Rogowski
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.203-214, ⟨10.1007/978-3-642-33260-9_17⟩
Conference papers hal-01551740v1

Computer Information Systems and Industrial Management

Agostino Cortesi , Nabendu Chaki , Khalid Saeed , Sławomir Wierzchoń
Springer, LNCS-7564, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-33260-9⟩
Books hal-01551708v1
Image document

HTCPNs–Based Modelling and Evaluation of Dynamic Computer Cluster Reconfiguration

Sławomir Samolej , Tomasz Szmuc
4th Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2009, Krakow, Poland. pp.97-108, ⟨10.1007/978-3-642-28038-2_8⟩
Conference papers hal-01527395v1
Image document

Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts

Marek Zachara , Dariusz Pałka
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.534-546, ⟨10.1007/978-3-642-32498-7_41⟩
Conference papers hal-01542426v1
Image document

Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors

Bogusław Cyganek
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.180-190, ⟨10.1007/978-3-642-33260-9_15⟩
Conference papers hal-01551742v1
Image document

Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing

Krzysztof Misztal , Jacek Tabor
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.158-167, ⟨10.1007/978-3-642-40925-7_16⟩
Conference papers hal-01496062v1
Image document

Weighted Approach to Projective Clustering

Przemysław Spurek , Jacek Tabor , Krzysztof Misztal
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.367-378, ⟨10.1007/978-3-642-40925-7_34⟩
Conference papers hal-01496083v1
Image document

Bengali Printed Character Recognition – A New Approach

Soharab Hossain Shaikh , Marek Tabedzki , Nabendu Chaki , Khalid Saeed
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.129-140, ⟨10.1007/978-3-642-40925-7_13⟩
Conference papers hal-01496058v1
Image document

User Authentication for Mobile Devices

Marcin Rogowski , Khalid Saeed , Mariusz Rybnik , Marek Tabedzki , Marcin Adamski
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.47-58, ⟨10.1007/978-3-642-40925-7_5⟩
Conference papers hal-01496111v1
Image document

Flow-Based Detection of DNS Tunnels

Wendy Ellens , Piotr Żuraniewski , Anna Sperotto , Harm Schotanus , Michel Mandjes , et al.
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.124-135, ⟨10.1007/978-3-642-38998-6_16⟩
Conference papers hal-01489962v1
Image document

Intelligent UBMSS Systems for Strategic Information Management

Lidia Ogiela , Marek R. Ogiela
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.408-413
Conference papers hal-01506573v1
Image document

Identification of Persons by Virtue of Hand Geometry

Anna Plichta , Tomasz Gaciarz , Szymon Szomiński
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.36-46, ⟨10.1007/978-3-642-40925-7_4⟩
Conference papers hal-01496097v1

Computer Information Systems and Industrial Management

Khalid Saeed , Rituparna Chaki , Agostino Cortesi , Sławomir Wierzchoń
Springer, LNCS-8104, 2013, Lecture Notes in Computer Science, 978-3-642-40924-0. ⟨10.1007/978-3-642-40925-7⟩
Books hal-01496113v1
Image document

The Data Exploration System for Image Processing Based on Server-Side Operations

Magdalena Ładniak , Adam Piórkowski , Mariusz Młynarczuk
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.168-176, ⟨10.1007/978-3-642-40925-7_17⟩
Conference papers hal-01496063v1
Image document

Telecommunications Networks Risk Assessment with Bayesian Networks

Marcin Szpyrka , Bartosz Jasiul , Konrad Wrona , Filip Dziedzic
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.277-288, ⟨10.1007/978-3-642-40925-7_26⟩
Conference papers hal-01496074v1
Image document

Computer Karate Trainer in Tasks of Personal and Homeland Security Defense

Tomasz Hachaj , Marek R. Ogiela
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.430-441
Conference papers hal-01506565v1
Image document

Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices

Adam Szczepański , Krzysztof Misztal , Khalid Saeed
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.141-150, ⟨10.1007/978-3-662-45237-0_15⟩
Conference papers hal-01405572v1
Image document

Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification

Ryszard Tadeusiewicz , Adrian Horzyk
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.278-289, ⟨10.1007/978-3-662-45237-0_27⟩
Conference papers hal-01405598v1
Image document

Network Anomaly Detection Using Parameterized Entropy

Przemysław Bereziński , Marcin Szpyrka , Bartosz Jasiul , Michał Mazur
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.465-478, ⟨10.1007/978-3-662-45237-0_43⟩
Conference papers hal-01405630v1
Image document

A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring

Anna Pięta , Michał Lupa , Monika Chuchro , Adam Piórkowski , Andrzej Leśniak
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.514-525, ⟨10.1007/978-3-662-45237-0_47⟩
Conference papers hal-01405634v1

Computer Information Systems and Industrial Management

Khalid Saeed , Václav Snášel
Springer, LNCS-8838, 2014, Lecture Notes in Computer Science, 978-3-662-45236-3. ⟨10.1007/978-3-662-45237-0⟩
Books hal-01405673v1
Image document

Crypto-Biometric Models for Information Secrecy

Marek R. Ogiela , Lidia Ogiela , Urszula Ogiela
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.172-178, ⟨10.1007/978-3-319-10975-6_13⟩
Conference papers hal-01403994v1