Filter your results
- 37
- 4
- 37
- 4
- 41
- 33
- 1
- 3
- 2
- 11
- 11
- 9
- 4
- 41
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 9
- 7
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
41 results
|
|
sorted by
|
|
Weighted Approach to Projective Clustering12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.367-378, ⟨10.1007/978-3-642-40925-7_34⟩
Conference papers
hal-01496083v1
|
||
|
Verification of ArchiMate Behavioral Elements by Model Checking14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.132-144, ⟨10.1007/978-3-319-24369-6_11⟩
Conference papers
hal-01444460v1
|
||
|
User Authentication for Mobile Devices12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.47-58, ⟨10.1007/978-3-642-40925-7_5⟩
Conference papers
hal-01496111v1
|
||
|
The Data Exploration System for Image Processing Based on Server-Side Operations12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.168-176, ⟨10.1007/978-3-642-40925-7_17⟩
Conference papers
hal-01496063v1
|
||
|
Telecommunications Networks Risk Assessment with Bayesian Networks12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.277-288, ⟨10.1007/978-3-642-40925-7_26⟩
Conference papers
hal-01496074v1
|
||
|
Subspaces Clustering Approach to Lossy Image Compression13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.571-579, ⟨10.1007/978-3-662-45237-0_52⟩
Conference papers
hal-01405649v1
|
||
|
Skull Stripping for MRI Images Using Morphological Operators15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.172-182, ⟨10.1007/978-3-319-45378-1_16⟩
Conference papers
hal-01637463v1
|
||
|
Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary ArteriesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.460-467, ⟨10.1007/978-3-642-32498-7_34⟩
Conference papers
hal-01542462v1
|
||
|
Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.220-227, ⟨10.1007/978-3-642-23300-5_17⟩
Conference papers
hal-01590386v1
|
||
|
Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.141-150, ⟨10.1007/978-3-662-45237-0_15⟩
Conference papers
hal-01405572v1
|
||
|
Optimal Ellipse Based Algorithm as an Approximate and Robust Solution of Minimum Volume Covering Ellipse Problem15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.240-250, ⟨10.1007/978-3-319-45378-1_22⟩
Conference papers
hal-01637514v1
|
||
|
On the Comparison of the Keystroke Dynamics Databases13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.122-129, ⟨10.1007/978-3-662-45237-0_13⟩
Conference papers
hal-01405570v1
|
||
|
Network Anomaly Detection Using Parameterized Entropy13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.465-478, ⟨10.1007/978-3-662-45237-0_43⟩
Conference papers
hal-01405630v1
|
||
|
Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.278-289, ⟨10.1007/978-3-662-45237-0_27⟩
Conference papers
hal-01405598v1
|
||
|
Malware Behavior Modeling with Colored Petri Nets13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.667-679, ⟨10.1007/978-3-662-45237-0_60⟩
Conference papers
hal-01405661v1
|
||
|
Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.158-167, ⟨10.1007/978-3-642-40925-7_16⟩
Conference papers
hal-01496062v1
|
||
|
Learning Web Application Firewall - Benefits and Caveats1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.295-308, ⟨10.1007/978-3-642-23300-5_23⟩
Conference papers
hal-01590402v1
|
||
|
Intelligent UBMSS Systems for Strategic Information Management1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.408-413
Conference papers
hal-01506573v1
|
||
|
Influence of Eye Diseases on the Retina Pattern Recognition13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.130-140, ⟨10.1007/978-3-662-45237-0_14⟩
Conference papers
hal-01405571v1
|
||
|
Identification of Persons by Virtue of Hand Geometry12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.36-46, ⟨10.1007/978-3-642-40925-7_4⟩
Conference papers
hal-01496097v1
|
||
|
HTCPNs–Based Tool for Web–Server Clusters Development3rd Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2008, Brno, Czech Republic. pp.131-142, ⟨10.1007/978-3-642-22386-0_10⟩
Conference papers
hal-01572551v1
|
||
|
HTCPNs–Based Modelling and Evaluation of Dynamic Computer Cluster Reconfiguration4th Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2009, Krakow, Poland. pp.97-108, ⟨10.1007/978-3-642-28038-2_8⟩
Conference papers
hal-01527395v1
|
||
|
Flow-Based Detection of DNS Tunnels7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.124-135, ⟨10.1007/978-3-642-38998-6_16⟩
Conference papers
hal-01489962v1
|
||
|
Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges AlgorithmInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.468-478, ⟨10.1007/978-3-642-32498-7_35⟩
Conference papers
hal-01542461v1
|
||
|
Ensembles of Heterogeneous Concept Drift Detectors - Experimental Study15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.538-549, ⟨10.1007/978-3-319-45378-1_48⟩
Conference papers
hal-01637510v1
|
||
|
Emotion Elicitation with Stimuli Datasets in Automatic Affect Recognition Studies – Umbrella Review18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.248-269, ⟨10.1007/978-3-030-85613-7_18⟩
Conference papers
hal-04292379v1
|
||
|
Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.180-190, ⟨10.1007/978-3-642-33260-9_15⟩
Conference papers
hal-01551742v1
|
||
|
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions AccountsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.534-546, ⟨10.1007/978-3-642-32498-7_41⟩
Conference papers
hal-01542426v1
|
||
|
Crypto-Biometric Models for Information SecrecyInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.172-178, ⟨10.1007/978-3-319-10975-6_13⟩
Conference papers
hal-01403994v1
|
||
|
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.430-441
Conference papers
hal-01506565v1
|
- 1
- 2