Search - IFIP Open Digital Library Access content directly

Filter your results

49 results
Structure: Internal structure identifier : 445585
Image document

Flow-Based Detection of DNS Tunnels

Wendy Ellens , Piotr Żuraniewski , Anna Sperotto , Harm Schotanus , Michel Mandjes , et al.
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.124-135, ⟨10.1007/978-3-642-38998-6_16⟩
Conference papers hal-01489962v1
Image document

Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices

Adam Szczepański , Krzysztof Misztal , Khalid Saeed
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.141-150, ⟨10.1007/978-3-662-45237-0_15⟩
Conference papers hal-01405572v1
Image document

Artificial Intelligence for Knowledge Management with BPMN and Rules

Antoni Ligęza , Tomasz Potempa
1st IFIP International Workshop on Artificial Intelligence for Knowledge Management (AI4KM), Aug 2012, Montpellier, France. pp.19-37, ⟨10.1007/978-3-642-54897-0_2⟩
Conference papers hal-01256584v1
Image document

Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification

Ryszard Tadeusiewicz , Adrian Horzyk
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.278-289, ⟨10.1007/978-3-662-45237-0_27⟩
Conference papers hal-01405598v1
Image document

Network Anomaly Detection Using Parameterized Entropy

Przemysław Bereziński , Marcin Szpyrka , Bartosz Jasiul , Michał Mazur
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.465-478, ⟨10.1007/978-3-662-45237-0_43⟩
Conference papers hal-01405630v1
Image document

Intelligent UBMSS Systems for Strategic Information Management

Lidia Ogiela , Marek R. Ogiela
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.408-413
Conference papers hal-01506573v1
Image document

Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm

Tomasz Hachaj , Marek R. Ogiela
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.468-478, ⟨10.1007/978-3-642-32498-7_35⟩
Conference papers hal-01542461v1
Image document

Emotion Elicitation with Stimuli Datasets in Automatic Affect Recognition Studies – Umbrella Review

Paweł Jemioło , Dawid Storman , Barbara Giżycka , Antoni Ligęza
18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.248-269, ⟨10.1007/978-3-030-85613-7_18⟩
Conference papers hal-04292379v1
Image document

Semantic Modelling of Coronary Vessel Structures in Computer Aided Detection of Pathological Changes

Mirosław Trzupek
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.220-227, ⟨10.1007/978-3-642-23300-5_17⟩
Conference papers hal-01590386v1
Image document

Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection

Tomasz Hachaj , Marek R. Ogiela
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.135-148, ⟨10.1007/978-3-642-23300-5_11⟩
Conference papers hal-01590406v1

Computer Information Systems and Industrial Management

Khalid Saeed , Václav Snášel
Springer, LNCS-8838, 2014, Lecture Notes in Computer Science, 978-3-662-45236-3. ⟨10.1007/978-3-662-45237-0⟩
Books hal-01405673v1
Image document

A New Algorithm for Rotation Detection in Iris Pattern Recognition

Krzysztof Misztal , Jacek Tabor , Khalid Saeed
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.135-145, ⟨10.1007/978-3-642-33260-9_11⟩
Conference papers hal-01551719v1

Computer Information Systems and Industrial Management

Khalid Saeed , Rituparna Chaki , Agostino Cortesi , Sławomir Wierzchoń
Springer, LNCS-8104, 2013, Lecture Notes in Computer Science, 978-3-642-40924-0. ⟨10.1007/978-3-642-40925-7⟩
Books hal-01496113v1
Image document

Computer Science Protecting Human Society Against Epidemics

Aleksander Byrski , Tadeusz Czachórski , Erol Gelenbe , Krzysztof Grochla , Yuko Murayama
Springer International Publishing, AICT-616, 2021, IFIP Advances in Information and Communication Technology, 978-3-030-86581-8. ⟨10.1007/978-3-030-86582-5⟩
Books hal-03746664v1

Advances in Software Engineering Techniques

David Hutchison , Takeo Kanade , Josef Kittler , Jon M. Kleinberg , Friedemann Mattern , et al.
Springer, LNCS-7054, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-28038-2⟩
Books hal-01527391v1
Image document

Advances in the Keystroke Dynamics: The Practical Impact of Database Quality

Mariusz Rybnik , Piotr Panasiuk , Khalid Saeed , Marcin Rogowski
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.203-214, ⟨10.1007/978-3-642-33260-9_17⟩
Conference papers hal-01551740v1
Image document

A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring

Anna Pięta , Michał Lupa , Monika Chuchro , Adam Piórkowski , Andrzej Leśniak
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.514-525, ⟨10.1007/978-3-662-45237-0_47⟩
Conference papers hal-01405634v1
Image document

Identification of Persons by Virtue of Hand Geometry

Anna Plichta , Tomasz Gaciarz , Szymon Szomiński
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.36-46, ⟨10.1007/978-3-642-40925-7_4⟩
Conference papers hal-01496097v1
Image document

Learning Web Application Firewall - Benefits and Caveats

Dariusz Pałka , Marek Zachara
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.295-308, ⟨10.1007/978-3-642-23300-5_23⟩
Conference papers hal-01590402v1
Image document

Optimal Ellipse Based Algorithm as an Approximate and Robust Solution of Minimum Volume Covering Ellipse Problem

Krzysztof Misztal , Jacek Tabor , Jakub Hyła
15th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2016, Vilnius, Lithuania. pp.240-250, ⟨10.1007/978-3-319-45378-1_22⟩
Conference papers hal-01637514v1
Image document

Software Innovation Dynamics in CMSs and Its Impact on Enterprise Information Systems Development

Andrzej Skulimowski , Inez Badecka
10th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Dec 2016, Vienna, Austria. pp.309-324, ⟨10.1007/978-3-319-49944-4_23⟩
Conference papers hal-01630527v1
Image document

Bengali Printed Character Recognition – A New Approach

Soharab Hossain Shaikh , Marek Tabedzki , Nabendu Chaki , Khalid Saeed
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.129-140, ⟨10.1007/978-3-642-40925-7_13⟩
Conference papers hal-01496058v1
Image document

Study on Need Assessment of Mechatronics Education in Norway and Poland

Hirpa G. Lemu , Jan Frick , Tadeusz Uhl , Wojciech Lisowski , Piotr Piwowarczyk
International Conference on Advances in Production Management Systems (APMS), Sep 2011, Stavanger, Norway. pp.557-566, ⟨10.1007/978-3-642-33980-6_60⟩
Conference papers hal-01524189v1
Image document

Comprehensive Performance Evaluation of Various Feature Extraction Methods for OCR Purposes

Dawid Sas , Khalid Saeed
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.411-422, ⟨10.1007/978-3-319-24369-6_34⟩
Conference papers hal-01444484v1
Image document

User Authentication for Mobile Devices

Marcin Rogowski , Khalid Saeed , Mariusz Rybnik , Marek Tabedzki , Marcin Adamski
12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.47-58, ⟨10.1007/978-3-642-40925-7_5⟩
Conference papers hal-01496111v1
Image document

Crypto-Biometric Models for Information Secrecy

Marek R. Ogiela , Lidia Ogiela , Urszula Ogiela
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.172-178, ⟨10.1007/978-3-319-10975-6_13⟩
Conference papers hal-01403994v1
Image document

Malware Behavior Modeling with Colored Petri Nets

Bartosz Jasiul , Marcin Szpyrka , Joanna Śliwa
13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.667-679, ⟨10.1007/978-3-662-45237-0_60⟩
Conference papers hal-01405661v1
Image document

HTCPNs–Based Modelling and Evaluation of Dynamic Computer Cluster Reconfiguration

Sławomir Samolej , Tomasz Szmuc
4th Central and East European Conference on Software Engineering Techniques (CEESET), Oct 2009, Krakow, Poland. pp.97-108, ⟨10.1007/978-3-642-28038-2_8⟩
Conference papers hal-01527395v1
Image document

Verification of ArchiMate Behavioral Elements by Model Checking

Piotr Szwed
14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.132-144, ⟨10.1007/978-3-319-24369-6_11⟩
Conference papers hal-01444460v1

Computer Information Systems and Industrial Management

Agostino Cortesi , Nabendu Chaki , Khalid Saeed , Sławomir Wierzchoń
Springer, LNCS-7564, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-33260-9⟩
Books hal-01551708v1