Filter your results
- 45
- 4
- 44
- 5
- 49
- 34
- 3
- 4
- 2
- 12
- 14
- 10
- 4
- 49
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 9
- 7
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Advances in Software Engineering TechniquesSpringer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books
hal-01527391v1
|
||
|
Advances in the Keystroke Dynamics: The Practical Impact of Database Quality11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.203-214, ⟨10.1007/978-3-642-33260-9_17⟩
Conference papers
hal-01551740v1
|
||
|
Computer Information Systems and Industrial ManagementSpringer, LNCS-7564, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-33260-9⟩
Books
hal-01551708v1
|
||
|
Crypto-Biometric Models for Information SecrecyInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.172-178, ⟨10.1007/978-3-319-10975-6_13⟩
Conference papers
hal-01403994v1
|
||
|
Malware Behavior Modeling with Colored Petri Nets13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.667-679, ⟨10.1007/978-3-662-45237-0_60⟩
Conference papers
hal-01405661v1
|
||
|
HTCPNs–Based Modelling and Evaluation of Dynamic Computer Cluster Reconfiguration4th Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2009, Krakow, Poland. pp.97-108, ⟨10.1007/978-3-642-28038-2_8⟩
Conference papers
hal-01527395v1
|
||
|
Verification of ArchiMate Behavioral Elements by Model Checking14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.132-144, ⟨10.1007/978-3-319-24369-6_11⟩
Conference papers
hal-01444460v1
|
||
|
The Data Exploration System for Image Processing Based on Server-Side Operations12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.168-176, ⟨10.1007/978-3-642-40925-7_17⟩
Conference papers
hal-01496063v1
|
||
|
Automatic Adaptation of SOA Systems Supported by Machine Learning4th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Apr 2013, Costa de Caparica, Portugal. pp.61-68, ⟨10.1007/978-3-642-37291-9_7⟩
Conference papers
hal-01348736v1
|
||
|
Influence of Eye Diseases on the Retina Pattern Recognition13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.130-140, ⟨10.1007/978-3-662-45237-0_14⟩
Conference papers
hal-01405571v1
|
||
|
Telecommunications Networks Risk Assessment with Bayesian Networks12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.277-288, ⟨10.1007/978-3-642-40925-7_26⟩
Conference papers
hal-01496074v1
|
||
|
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions AccountsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.534-546, ⟨10.1007/978-3-642-32498-7_41⟩
Conference papers
hal-01542426v1
|
||
|
Ensembles of Heterogeneous Concept Drift Detectors - Experimental Study15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.538-549, ⟨10.1007/978-3-319-45378-1_48⟩
Conference papers
hal-01637510v1
|
||
|
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.430-441
Conference papers
hal-01506565v1
|
||
|
Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.180-190, ⟨10.1007/978-3-642-33260-9_15⟩
Conference papers
hal-01551742v1
|
||
|
Advanced Techniques for Computer Sharing and Management of Strategic Data2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.521-525, ⟨10.1007/978-3-642-55032-4_53⟩
Conference papers
hal-01397266v1
|
||
|
On the Comparison of the Keystroke Dynamics Databases13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.122-129, ⟨10.1007/978-3-662-45237-0_13⟩
Conference papers
hal-01405570v1
|
||
|
Subspaces Clustering Approach to Lossy Image Compression13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.571-579, ⟨10.1007/978-3-662-45237-0_52⟩
Conference papers
hal-01405649v1
|
||
|
Using a Semantic-Based Support System for Merging Knowledge from Process Participants7th IFIP International Workshop on Artificial Intelligence for Knowledge Management (AI4KM), Aug 2019, Macao, China. pp.1-16, ⟨10.1007/978-3-030-85001-2_1⟩
Conference papers
hal-03637465v1
|
- 1
- 2