default search action
17th CISIM 2018: Olomouc, Czech Republic
- Khalid Saeed, Wladyslaw Homenda:
Computer Information Systems and Industrial Management - 17th International Conference, CISIM 2018, Olomouc, Czech Republic, September 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11127, Springer 2018, ISBN 978-3-319-99953-1
Biometrics and Pattern Recognition Applications
- Dorota Duda, Noura Azzabou, Jacques D. de Certaines:
Multi-muscle Texture Analysis for Dystrophy Development Identification in Golden Retriever Muscular Dystrophy Dogs. 3-15 - Aneta Górniak, Ewa Skubalska-Rafajlowicz:
Tissue Recognition on Microscopic Images of Histological Sections Using Sequences of Zernike Moments. 16-26 - Lukasz Hamera, Lukasz Wieclaw:
A Study of Friction Ridge Distortion Effect on Automated Fingerprint Identification System - Database Evaluation. 27-36 - Lukasz Jelen, Michal Kulus, Tomasz Jurek:
Pattern Recognition Framework for Histological Slide Segmentation. 37-45 - Vasyl P. Martsenyuk, Dmytro Vakulenko, Ludmyla Vakulenko, Aleksandra Klos-Witkowska, Oksana Kutakova:
Information System of Arterial Oscillography for Primary Diagnostics of Cardiovascular Diseases. 46-56 - Bartosz Miselis, Michal Kulus, Tomasz Jurek, Andrzej Rusiecki, Lukasz Jelen:
Deep Neural Network for Whole Slide Vein Segmentation. 57-67 - Bartlomiej Placzek, Marcin Lewandowski, Rafal J. Buldak, Marek Michalski:
Automated Immunohistochemical Stains Analysis for Computer-Aided Diagnosis of Parathyroid Disease. 68-79 - Maciej Szymkowski, Khalid Saeed:
Finger Veins Feature Extraction Algorithm Based on Image Processing Methods. 80-91 - Magdalena Wiercioch:
On Modeling Objects Using Sequence of Moment Invariants. 92-102
Computer Information Systems
- Marcin Bernas, Jaroslaw Smyla:
Light Sensor Based Vehicle and Pedestrian Detection Method for Wireless Sensor Network. 105-116 - Anasuya Chaudhuri, Shreya Banerjee, Anirban Sarkar:
Behavioral Analysis of Service Oriented Systems Using Event-B. 117-129 - Michal Choras, Agata Gielczyk, Konstantinos P. Demestichas, Damian Puchalski, Rafal Kozik:
Pattern Recognition Solutions for Fake News Detection. 130-139 - Akmaljon Palvanov, Andrey Giyenko, Young Im Cho:
Development of Visibility Expectation System Based on Machine Learning. 140-153 - Ewaryst Rafajlowicz:
Robustness of Raw Images Classifiers Against the Class Imbalance - A Case Study. 154-165 - Ewa Skubalska-Rafajlowicz:
Open-Set Face Classification for Access Monitoring Using Spatially-Organized Random Projections. 166-177
Industrial Management and Other Applications
- Daniela Landinez Lamadrid, Diana Gineth Ramírez Ríos, Dionicio Neira-Rodado, Fernando A. Crespo, Luis Ramirez, Miguel Jimenez, William Manjarres:
Cooperation in Clusters: A Study Case in the Furniture Industry in Colombia. 181-192 - Ivo Martiník:
Workflow Petri Nets with Time Stamps and Their Using in Project Management. 193-206 - Miroslaw Omieljanowicz, Adam Klimowicz, Grzegorz Rubin, Marek Gruszewski, Lukasz Zienkiewicz, Anna Lupinska-Dubicka, Marek Tabedzki, Marcin Adamski, Mariusz Rybnik, Maciej Szymkowski:
Accident Simulation for Extended eCall System Without Integration in Existing Car Onboard Systems. 207-219 - Dominika Rysinska-Wojtasik, Anna Burduk:
Integrated Risk Management in Production Systems. 220-229
Machine Learning and High Performance Computing
- Katarzyna Borowska, Jaroslaw Stepaniuk:
Granular Computing and Parameters Tuning in Imbalanced Data Preprocessing. 233-245 - Robert Burduk, Andrzej Kasprzak:
The Use of Geometric Mean in the Process of Integration of Three Base Classifiers. 246-253 - Lukasz Gadomer, Zenon A. Sosnowski:
Parallel C-Fuzzy Random Forest. 254-265 - Ekaterina Grakova, Katerina Slaninová, Jan Martinovic, Jan Krenek, Jirí Hanzelka, Václav Svaton:
Waste Collection Vehicle Routing Problem on HPC Infrastructure. 266-278 - Jirí Hanzelka, Michal Beloch, Jan Krenek, Jan Martinovic, Katerina Slaninová:
Betweenness Propagation. 279-287 - Michal Krumnikl, Petr Bainar, Jana Klímová, Jan Kozuszník, Pavel Moravec, Václav Svaton, Pavel Tomancák:
SciJava Interface for Parallel Execution in the ImageJ Ecosystem. 288-299 - Vasyl P. Martsenyuk, Igor Andrushchak, Andrii Sverstiuk, Aleksandra Klos-Witkowska:
On Investigation of Stability and Bifurcation of Neural Network with Discrete and Distributed Delays. 300-313 - Lukás Vojácek, Pavla Drázdilová, Jiri Dvorský:
Growing Neural Gas Based on Data Density. 314-323
Modelling and Optimization
- Durba Chatterjee, Satrap Rathore, Sanghita Bhattacharjee:
Switching Policy Based Energy Aware Routing Algorithm for Maximizing Lifetime in Wireless Sensor Networks. 327-340 - Tomasz Grzes:
Multiple Codes State Assignment and Code Length Reduction for Power Minimization of Finite State Machines. 341-353 - Sukhendu Kanrar:
SME: A New Software Transactional Memory Based Mutual Exclusion Algorithm for Distributed Systems. 354-369 - Adam Klimowicz:
Area Targeted Minimization Method of Finite State Machines for FPGA Devices. 370-379 - Elena Mielcová, Radomír Perzina:
Additivity and Superadditivity in N-Person Cooperative Games with Attanassov Intuitionistic Fuzzy Expectations. 380-391 - Moumita Poddar, Rituparna Chaki, Debdutta Pal:
Congestion Control for IoT Using Channel Trust Based Approach. 392-404 - Valery Salauyou, Irena Bulatowa:
Synthesis of High-Speed ASM Controllers with Moore Outputs by Introducing Additional States. 405-416 - Guillermo Talavera, Antoni Portero, Francky Catthoor:
Impact of Address Generation on Multimedia Embedded VLIW Processors. 417-433 - Dhafer Thabet, Sonia Ayachi Ghannouchi, Henda Hajjami Ben Ghézala:
A Process Mining-Based Solution for Business Process Model Extension with Cost Perspective Context-Based Cost Data Analysis and Case Study. 434-446
Various Aspects of Computer Security
- Mateusz Klos, Imed El Fray:
Model of Secure Data Storage in the Cloud for Mobile Devices. 449-460 - Fabio Mondin, Agostino Cortesi:
MySQL Extension Automatic Porting to PDO for PHP Migration and Security Improvement. 461-473 - Elena Nyemkova, Zynovii Shandra, Aleksandra Klos-Witkowska, Lukasz Wieclaw:
Network Electronic Devices Authentication by Internal Electrical Noise. 474-485 - Sanggyu Shin, Yoichi Seto, Kumi Hasegawa, Ryotaro Nakata:
Proposal for a Privacy Impact Assessment Manual Conforming to ISO/IEC 29134: 2017. 486-498 - Gautam Srivastava, Ashutosh Dhar Dwivedi, Rajani Singh:
PHANTOM Protocol as the New Crypto-Democracy. 499-509 - Vitalii I. Yesin, Maryna V. Yesina, Serhii G. Rassomakhin, Mikolaj P. Karpinski:
Ensuring Database Security with the Universal Basis of Relations. 510-522
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.