default search action
6. CISIM 2007: Elk, Poland
- 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007, Elk, Poland, June 28-30, 2007. IEEE Computer Society 2007, ISBN 0-7695-2894-5
Keynote Papers
- Anna Bartkowiak:
Should Normal Distribution be Normal? The Student's T Alternative. 3-8 - Ryszard Tadeusiewicz, Marek R. Ogiela, Lidia Ogiela:
A New Approach to the Computer Support of Strategic Decision Making in Enterprises by Means of a New Class of Understanding Based Management Support Systems. 9-13 - Václav Snásel:
GUI Patterns and Web Semantics. 14-19 - Akira Imada:
Finding a Needle in a Haystack: From Baldwin Effect to Quantum Computation. 20-25 - Ryszard S. Choras:
Iris Image Recognition. 26-30 - Kurosh Madani:
Toward Higher Level Intelligent Systems. 31-36 - Yasufumi Takama:
Introduction of Humatronics--Towards Integration of Web Intelligence and Robotics. 37-44 - Adam Dabrowski, Pawel Pawlowski:
Benchmark problems of Signal Processing and Control for Testing Emergent Architectures and Programming Techniques of DSP's, FASIC's, and PLD's. 45-52
Intelligent Computing and Frameworks
- Péter Fülöp, Sándor Szabó, Tamás Szálka:
Location Prediction Methods with Markovian Approach and Extended Random Walk Model. 53-58 - Christin Groba, Sebastian Cech, Frank Rosenthal, Andreas Gössling:
Architecture of a Predictive Maintenance Framework. 59-64 - Jolanta Koszelew:
The Theoretical Framework of the Optimization of Public Transport Travel. 65-70 - Joanna Karbowska-Chilinska:
Estimation of the Average Time of Computations of Probabilistic Algorithms with Continuous Time Parameter. 71-76 - Lidia Ogiela:
UBMSS (Understanding Based Managing Support Systems) as an Example of the Application of Cognitive Analysis in Data Analysis. 77-80 - Agnieszka Makarec:
Interpretation of Probabilistic Algorithmic Logic in Nondeterministic Algorithmic Logic. 81-86 - Khalid Saeed, Krzysztof Piekarski:
On Toeplitz Matrices Minimal Eigenvalues in Moving Object Description. 87-92 - Bartlomiej Gudowski, Jaroslaw Was:
Some Criteria of Making Decisions in Pedestrian Evacuation Algorithms. 93-96 - Jin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang:
Universally Composable Key-Evolving Signature. 97-102 - Krzysztof Ciesielski, Mieczyslaw A. Klopotek, Slawomir T. Wierzchon:
Histogram-Based Dimensionality Reduction of Term Vector Space. 103-108 - Moustapha Sene, Michel Barret, Kurosh Madani:
Bearing's Behavior Modeling for Mechanical Defects' Detection and Diagnosis. 109-114 - Amine Chohra, Nadia Kanaoui, Kurosh Madani:
Hybrid Intelligent Diagnosis Systems. 115-120 - Maciej Dakowicz, Christopher M. Gold:
Finite Difference Runoff Modelling Using "Voronoi Buckets". 121-124 - Pawel Boguslawski, Christopher M. Gold:
Atomic Operators for Construction and Manipulation of the Augmented Quad-Edge. 125-128 - Rafal Goralski, Christopher M. Gold, Maciej Dakowicz:
Application of the Kinetic Voronoi Diagram to the Real-Time Navigation of Marine Vessels. 129-134 - Zhen-zhi Gong, Kong-fa Hu, Qing-Li Da:
A Grouping Aggregation Algorithm Based on the Dimension Hierarchical Encoding in Data Warehouse. 135-142
Nature Inspired Computing and Problem Solving
- Krzysztof Trojanowski:
B-Cell Algorithm as a Parallel Approach to Optimization of Moving Peaks Benchmark Tasks. 143-148 - Urszula Boryczka:
Ants and Multiple Knapsack Problem. 149-154 - Andrzej Chmielewski, Slawomir T. Wierzchon:
Simple Method of Increasing the Coverage of Nonself Region for Negative Selection Algorithms. 155-160 - Andrzej Domaradzki:
AIS for Trend Change Detection. 161-165 - Shichang Sun, Ajith Abraham, Guiyong Zhang, Hongbo Liu:
A Particle Swarm Optimization Algorithm for Neighbor Selection in Peer-to-Peer Networks. 166-172
Digital Communication and Information Management
- Unai Bilbao, Paul Bustamante, Nagore Guarretxena, J. Santo Domingo:
Wireless Sensor Network for Intravenous Dripping Systems. 173-178 - Rituparna Chaki, Nabendu Chaki:
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. 179-184 - Nabendu Chaki, Rituparna Chaki:
ORRP: Optimal Reactive Routing Protocol for Mobile Ad-Hoc Networks. 185-190 - Péter Fülöp, Benedek Kovács:
Enhanced Mobility Management Modelling Framework. 191-196 - Yuri Grishin:
Spread Spectrum Signals Classification Based on the Wigner-Ville Distribution and Neural Network Probability Density Function Estimation. 197-202 - John Tsiligaridis, Raj Acharya:
An Adaptive Data Broadcasting Model in Mobile Information Systems. 203-208 - Xu Chen, Michael J. O'Grady, Gregory M. P. O'Hare:
Towards a Pervasive Mobile Multimedia Experience. 209-212 - Bartlomiej Ziólkowski, Janusz Stoklosa:
Mobile Agent-Based Digital Rights Management Scheme. 213-218 - Romuald Mosdorf, Bozena Ignatowska:
On Frequency Synchronization of e-Learning Web System Users. 219-224 - Bartosz Oler, Imed El Fray:
Deniable File System--Application of Deniable Storage to Protection of Private Keys. 225-229 - Grzegorz Kurdziel, Halina Kwasnicka:
VCOP--The System of Visual Communication with Computers for Paralyzed Users. 230-238
Image Processing, Recognition, and Biometrics
- Jin Zhou, Yang Liu, Yuehui Chen:
Face Recognition Using Kernel PCA and Hierarchical RBF Network. 239-244 - Jin Zhou, Yang Liu, Yuehui Chen:
ICA Based on KPCA and Hybrid Flexible Neural Tree to Face Recognition. 245-250 - Robert Burduk:
Fuzzy Data in Local Optimal Strategy of Multistage Recognition. 251-254 - P. Andruszkiewicz, Cezary Boldak, Jerzy Jaroszewicz:
Semi-Automatic Segmentation of Fibrous Liver Tissue. 255-260 - Michal Choras:
Image Feature Extraction Methods for Ear Biometrics--A Survey. 261-265 - Halina Kwasnicka, Mariusz Paradowski, Krzysztof Borysewicz:
Capillaroscopy Image Analysis as an Automatic Image Annotation Problem. 266-271 - Pavel Moravec, Václav Snásel, Alexander A. Frolov, Dusan Húsek, Hana Rezanková, Pavel Polyakov:
Image Analysis by Methods of Dimension Reduction. 272-277 - Anna Piwonska, Urszula Grycuk:
Images Reconstruction with Use of a Genetic Algorithm. 278-281 - Piotr Porwik:
The Compact Three Stages Method of the Signature Recognition. 282-287 - Marek Tabedzki, Khalid Saeed:
Modified Word Recognition System--New Performance. 288-293 - Yue-Xiang Yang, Li-Zhi Cheng, Yong Luo, Rui Wang:
Bandelet Union Optimal Matrix Norms Constructing Lossless Watermarking. 294-298 - Dariusz Malyszko, Slawomir T. Wierzchon:
Standard and Genetic k-means Clustering Techniques in Image Segmentation. 299-304 - Ban N. Thanoon:
Using Wavelet Transform, DPCM and Adaptive Run-length Coding to Compress Images. 305-309 - Jaroslaw Kilon, Aida Saeed-Baginska, Jerzy Sienkiewicz, Romuald Mosdorf:
Nonlinear and Frequency Analysis of the Weather in Bialystok. 310-315 - Jerzy Sas, Urszula Markowska-Kaczmar:
Semi-Supervised Handwritten Word Segmentation Using Character Samples Similarity Maximization and Evolutionary Algorithm. 316-321 - Pawel Tadejko, Waldemar Rakowski:
Mathematical Morphology Based ECG Feature Extraction for the Purpose of Heartbeat Classification. 322-327 - Wojciech S. Mokrzycki, Andrzej Salamonczyk:
Using Shaded Views in 3D Multiview Representation of Monotonous Polyhedron. 328-336
Computer System Engineering
- Maciej Brzozowski, Vyacheslav N. Yarmolik:
Obfuscation as Intellectual Rights Protection in VHDL Language. 337-340 - S. V. Yarmolik, Ireneusz Mrozek, Bartosz Sokol:
Address Sequences Generation for Multiple Run Memory Testing. 341-344 - Valery Salauyou, Tomasz Grzes:
FSM State Assignment Methods for Low-Power Design. 345-350
Industrial Management
- Jan Jekielek:
Managing Information on Industrial Automation Projects. 351-356 - Joanna Moczydlowska:
Organizational Knowledge Measurement. 357-363 - Milena Tvrdíková:
Support of Decision Making by Business Intelligence Tools. 364-368 - Anna Zajkowska, Wojciech Zimnoch, Khalid Saeed:
A Study on the Importance of Biometric Technique Selection in the Protection of Company Resources. 369-374 - Anna Strychalska-Rudzewicz:
Cooperation of Enterprises in the Area of Innovative Activity. 375-379 - Marcin Paprzycki, Maria Ganzha:
Adapting Price Negotiations to an E-commerce System Scenario. 380-386
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.