Filter your results
- 45
- 4
- 44
- 5
- 49
- 34
- 3
- 4
- 2
- 12
- 14
- 10
- 4
- 49
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 9
- 7
- 5
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions AccountsInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.534-546, ⟨10.1007/978-3-642-32498-7_41⟩
Conference papers
hal-01542426v1
|
||
|
Ensembles of Heterogeneous Concept Drift Detectors - Experimental Study15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.538-549, ⟨10.1007/978-3-319-45378-1_48⟩
Conference papers
hal-01637510v1
|
||
|
Semantic Techniques of Image Retrieval – The Example of a Structural Analysis of Coronary ArteriesInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.460-467, ⟨10.1007/978-3-642-32498-7_34⟩
Conference papers
hal-01542462v1
|
||
|
Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.220-227, ⟨10.1007/978-3-642-23300-5_17⟩
Conference papers
hal-01590386v1
|
||
|
Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.278-289, ⟨10.1007/978-3-662-45237-0_27⟩
Conference papers
hal-01405598v1
|
||
|
Verification of ArchiMate Behavioral Elements by Model Checking14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.132-144, ⟨10.1007/978-3-319-24369-6_11⟩
Conference papers
hal-01444460v1
|
||
|
Telecommunications Networks Risk Assessment with Bayesian Networks12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.277-288, ⟨10.1007/978-3-642-40925-7_26⟩
Conference papers
hal-01496074v1
|
||
|
Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.141-150, ⟨10.1007/978-3-662-45237-0_15⟩
Conference papers
hal-01405572v1
|
||
|
Skull Stripping for MRI Images Using Morphological Operators15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.172-182, ⟨10.1007/978-3-319-45378-1_16⟩
Conference papers
hal-01637463v1
|
||
|
Weighted Approach to Projective Clustering12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.367-378, ⟨10.1007/978-3-642-40925-7_34⟩
Conference papers
hal-01496083v1
|
||
|
Subspaces Clustering Approach to Lossy Image Compression13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.571-579, ⟨10.1007/978-3-662-45237-0_52⟩
Conference papers
hal-01405649v1
|
||
|
Software Innovation Dynamics in CMSs and Its Impact on Enterprise Information Systems Development10th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Dec 2016, Vienna, Austria. pp.309-324, ⟨10.1007/978-3-319-49944-4_23⟩
Conference papers
hal-01630527v1
|
||
|
Mathematical and Implementation Challenges Associated with Testing of the Dynamical Systems25th System Modeling and Optimization (CSMO), Sep 2011, Berlin, Germany. pp.538-546, ⟨10.1007/978-3-642-36062-6_54⟩
Conference papers
hal-01347582v1
|
||
|
Automatic Adaptation of SOA Systems Supported by Machine Learning4th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Apr 2013, Costa de Caparica, Portugal. pp.61-68, ⟨10.1007/978-3-642-37291-9_7⟩
Conference papers
hal-01348736v1
|
||
|
Bengali Printed Character Recognition – A New Approach12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.129-140, ⟨10.1007/978-3-642-40925-7_13⟩
Conference papers
hal-01496058v1
|
||
|
Comprehensive Performance Evaluation of Various Feature Extraction Methods for OCR Purposes14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.411-422, ⟨10.1007/978-3-319-24369-6_34⟩
Conference papers
hal-01444484v1
|
||
|
HTCPNs–Based Tool for Web–Server Clusters Development3rd Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2008, Brno, Czech Republic. pp.131-142, ⟨10.1007/978-3-642-22386-0_10⟩
Conference papers
hal-01572551v1
|
||
|
HTCPNs–Based Modelling and Evaluation of Dynamic Computer Cluster Reconfiguration4th Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2009, Krakow, Poland. pp.97-108, ⟨10.1007/978-3-642-28038-2_8⟩
Conference papers
hal-01527395v1
|
||
|
Computer Information Systems and Industrial ManagementSpringer, LNCS-8838, 2014, Lecture Notes in Computer Science, 978-3-662-45236-3. ⟨10.1007/978-3-662-45237-0⟩
Books
hal-01405673v1
|
||
|
Computer Information Systems and Industrial ManagementSpringer, LNCS-8104, 2013, Lecture Notes in Computer Science, 978-3-642-40924-0. ⟨10.1007/978-3-642-40925-7⟩
Books
hal-01496113v1
|
||
|
Influence of Eye Diseases on the Retina Pattern Recognition13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.130-140, ⟨10.1007/978-3-662-45237-0_14⟩
Conference papers
hal-01405571v1
|
||
|
Advances in the Keystroke Dynamics: The Practical Impact of Database Quality11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.203-214, ⟨10.1007/978-3-642-33260-9_17⟩
Conference papers
hal-01551740v1
|
||
|
User Authentication for Mobile Devices12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.47-58, ⟨10.1007/978-3-642-40925-7_5⟩
Conference papers
hal-01496111v1
|
||
|
Identification of Persons by Virtue of Hand Geometry12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.36-46, ⟨10.1007/978-3-642-40925-7_4⟩
Conference papers
hal-01496097v1
|
||
|
A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.514-525, ⟨10.1007/978-3-662-45237-0_47⟩
Conference papers
hal-01405634v1
|
||
|
On the Comparison of the Keystroke Dynamics Databases13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.122-129, ⟨10.1007/978-3-662-45237-0_13⟩
Conference papers
hal-01405570v1
|
||
|
Learning Web Application Firewall - Benefits and Caveats1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.295-308, ⟨10.1007/978-3-642-23300-5_23⟩
Conference papers
hal-01590402v1
|
||
|
Intelligent UBMSS Systems for Strategic Information Management1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.408-413
Conference papers
hal-01506573v1
|
||
|
Crypto-Biometric Models for Information SecrecyInternational Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.172-178, ⟨10.1007/978-3-319-10975-6_13⟩
Conference papers
hal-01403994v1
|
||
|
Advanced Techniques for Computer Sharing and Management of Strategic Data2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.521-525, ⟨10.1007/978-3-642-55032-4_53⟩
Conference papers
hal-01397266v1
|
- 1
- 2