default search action
IMCSIT 2008: Wisla, Poland
- Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2008, Wisla, Poland, 20-22 October 2008. IEEE 2008, ISBN 978-83-60810-14-9
Workshop on Agent Based Computing V
- Vasile Alaiba, Armand Rotaru:
Agent architecture for building Robocode players with SWI-Prolog. 3-7 - Giacomo Cabri, Letizia Leonardi, Raffaele Quitadamo:
Tackling complexity of distributed systems: Towards an integration of service-oriented computing and agent-oriented programming. 9-15 - Giacomo Cabri, Mariachiara Puviani, Raffaele Quitadamo:
Connecting methodologies and infrastructures in the development of agent systems. 17-23 - Konrad Fuks, Arkadiusz Kawa, Waldemar Wieczerzycki:
Adaptation of extended polymorpohic self-slimming agent model into e-sourcing platform. 25-29 - Maurice Grinberg, Stefan Kostadinov:
The triple model: Combining cutting-edge web technologies with a cognitive model in an ECA. 31-37 - Antonín Komenda, Michal Pechoucek, Jirí Bíba, Jirí Vokrínek:
Planning and re-planning in multi-actors scenarios by means of social commitments. 39-45 - Viliam Lisý, Michal Jakob, Jan Tozicka, Michal Pechoucek:
Utility-based model for classifying adversarial behaviour in multi-agent systems. 47-53 - Martijn Warnier, Reinier J. Timmer, Michel A. Oey, Frances M. T. Brazier, Anja Oskamp:
An agent based system for distributed information management: A case study. 55-61
3rd International Symposium Advances in Artificial Intelligence and Applications
- Sónia M. Almeida-Luz, Miguel Ángel Vega Rodríguez, Juan Antonio Gómez Pulido, Juan Manuel Sánchez-Pérez:
Applying Differential Evolution to the Reporting Cells problem. 65-71 - Dominik Bas, Bartosz Broda, Maciej Piasecki:
Towards Word Sense Disambiguation of Polish. 73-78 - Miroslaw Bedzak:
Usering. Education self-tuning-recommendations in the 8th level of ISO/OSI model. 79-82 - Bartosz Broda, Maciej Piasecki, Stan Szpakowicz:
Sense-based clustering of Polish nouns in the extraction of semantic relatedness. 83-89 - Andrzej Chmielewski, Slawomir T. Wierzchon:
An immune approach to classifying the high-dimensional datasets. 91-96 - Lukasz Ciszak:
Application of clustering and association methods in data cleaning. 97-103 - Sebastian Ernst, Antoni Ligeza:
A rule-based approach to robust granular planning. 105-111 - Amina El Gonnouni, Abdelouahid Lyhyaoui, Soufiane El Jelali, Manel Martínez-Ramón:
Support vector machines with composite kernels for nonlinear systems identification. 113-118 - Piotr Grobelny:
The expert system approach in development of loosely coupled software with use of Domain Specific Language. 119-123 - Wojciech Gruszczyk, Halina Kwasnicka:
Coalition Formation in multi-agent systems - an evolutionary approach. 125-130 - Soufiane El Jelali, Abdelouahid Lyhyaoui, Aníbal R. Figueiras-Vidal:
Applying emphasized soft targets for Gaussian Mixture Model based classification. 131-136 - Anna Jurek, Danuta Zakrzewska:
Improving Naïve Bayes models of insurance risk by unsupervised classification. 137-144 - Witold Kosinski, Wieslaw Piasecki:
On a class of defuzzification functionals. 145-150 - Tamar Kakiashvili, Waldemar W. Koczkodaj, Phyllis Montgomery, Kalpdrum Passi, Ryszard Tadeusiewicz:
Assessing the properties of the World Health Organization's Quality of Life Index. 151-154 - Adam Kalina, Edward Mezyk, Olgierd Unold:
Accuracy boosting induction of fuzzy rules with Artificial Immune Systems. 155-159 - Stefan Kotowski, Witold Kosinski, Zbigniew Michalewicz, Piotr Synak, Lukasz Brocki:
On classification tools for genetic algorithms. 161-164 - Daniel Laszlo Kovacs, Tadeusz P. Dobrowiecki:
Evolution of strategy selection in games by means of natural selection. 165-172 - Juliusz L. Kulikowski:
Image similarity detection in large visual data bases. 173-180 - Roman Kurc, Maciej Piasecki:
Automatic acquisition of wordnet relations by the morpho-syntactic patterns extracted from the corpora in Polish. 181-188 - Konrad Kulakowski, Grzegorz J. Nalepa:
Using UML state diagrams for visual modeling of business rules. 189-194 - Urszula Markowska-Kaczmar, Maciej Dziedzic:
Discovery of technical analysis patterns. 195-200 - Marisa da Silva Maximiano, Miguel A. Vega-Rodríguez, Juan Antonio Gómez Pulido, Juan Manuel Sánchez-Pérez:
A hybrid Differential Evolution algorithm to solve a real-world Frequency Assignment problem. 201-205 - Grzegorz J. Nalepa, Igor Wojnicki:
Hierarchical rule design with HaDEs the HeKatE toolchain. 207-214 - Mariusz Paradowski, Halina Kwasnicka, Martin Tabakov, Jacek Filarski, Marek J. Sasiadek:
On automation of brain CT image analysis. 215-220 - Michal Pryczek:
Neuronal groups and interrelations. 221-227 - Sang Keun Rhee, Jihye Lee, Myon-Woong Park:
Semantic relevance measure between resources based on a graph structure. 229-236 - Marcin Szpyrka:
Exclusion rule-based systems - case study. 237-242 - Michal Szymczak, Grzegorz Frackowiak, Maria Ganzha, Marcin Paprzycki, Sang Keun Rhee, Jihye Lee, Young Tae Sohn, Jae Kwan Kim, Yo-Sub Han, Myon-Woong Park:
Ontological matchmaking in a Duty Trip Support application in a virtual organization. 243-250 - Elzbieta Hudyma, Grzegorz Terlikowski:
Computer-aided detecting of early strokes and its evaluation on the base of CT images. 251-254
Computer Aspects of Numerical Algorithms
- Alexandre Bezen:
A numerical algorithm of solving the forced sine-Gordon equation. 257-261 - Jaroslaw Bylina, Beata Bylina:
Merging Jacobi and Gauss-Seidel methods for solving Markov chains on computer clusters. 263-268 - Janusz Bytnar, Anna Kucaba-Pietal, Zbigniew Walenta:
Influence of molecular models of water on computer simulations of water nanoflows. 269-275 - Sergiy Fialko:
A spare shared-memory multifrontal solver in SCAD software. 277-283 - Pawel Maciol, Krzysztof Banas:
Testing Tesla architecture for scientific computing: The performance of matrix-vector product. 285-291 - Przemyslaw Stpiczynski:
Solving a kind of BVP for second-order ODEs using novel data formats for dense matrices. 293-296 - Vasyl Ustimenko:
On the hidden discrete logarithm for some polynomial stream ciphers. 297-301 - R. Clint Whaley:
Empirically tuning LAPACK's blocking factor for increased performance. 303-310
Computational Linguistics - Applications
- Alexandre Labadié, Violaine Prince:
The impact of corpus quality and type on topic based text segmentation evaluation. 313-319 - Bartosz Rapp:
N-gram language models for Polish language. Basic concepts and applications in automatic speech recognition systems. 321-324 - Pawel Lupkowski, Mariusz Urbanski:
SemCAPTCHA - user-friendly alternative for OCR-based CAPTCHA systems. 325-329 - Farag Ahmed, Andreas Nürnberger:
Arabic/English word translation disambiguation approach based on naive Bayesian classifier. 331-338 - Todor Arnaudov, Ruslan Mitkov:
Smarty-extendable framework for bilingual and multilingual comprehension assistants. 339-344 - Bartosz Broda, Maciej Piasecki:
SuperMatrix: a General tool for lexical semantic knowledge acquisition. 345-352 - Lukasz Degórski, Lukasz Kobylinski, Adam Przepiórkowski:
Definition extraction: Improving Balanced Random Forests. 353-357 - Krzysztof Dyczkowski, Norbert Kordek, Pawel Nowakowski, Krzysztof Stronski:
An application supporting language analysis within the framework of the phonetic grammar. 359-362 - Rauf Fatullayev, Ali M. Abbasov, Abulfat Fatullayev:
Set of active suffix chains and its role in development of the MT system for Azerbaijani. 363-368 - Ali Sebti, Ahmad Abdollahzadeh Barfroush:
A new word sense similarity measure in wordnet. 369-373 - Alexander Troussov, John Judge, Mikhail Sogrin, Amine Akrout, Brian Davis, Siegfried Handschuh:
A linguistic light approach to multilingualism in lexical layers for ontologies. 375-379 - Grazyna Chamielec, Dawid Weiss:
Modeling the frequency of phrasal verbs with search engines. 381-388
8th International Multidisciplinary Conference on e-Commerce and e-Government
- Cene Bavec:
On stimulus for citizens' use of e-government services. 391-395 - Grzegorz Kolaczek, Adam Turowiec, Dominik Kasprzak, Witold Holubowicz:
e-collaboration platform for the development of rural areas and enterprises. 397-401 - Grzegorz Mazurek:
Corporate blogs - innovative communication tool or another internet hype? empirical research study. 403-406 - Costantinos Rougeris, George S. Androulakis:
An examination of factors affecting bidders' choice in electronic auctions. 407-413 - Marek Skokan, Tomas Sabol, Marian Mach, Karol Furdík:
Integration of governmental services in semantically described processes in the Access-eGov system. 415-419 - Magdalena Sroga:
Access-eGov-personal assistant of public services. 421-427 - Jacek Wachowicz, Piotr Drygas:
In search of values in internet shopping-method and preliminary research. 429-432 - Urszula Swierczynska-Kaczor:
V-commerce: The potential of virtual worlds in services. 433-436 - Wojciech Gorka, Michal Socha, Adam Piasecki, Jakub Ganko:
Intermediate information layer. The use of the SKOS ontology to create information about e-resources provided by the public administration. 437-442 - Mohanad Halaweh, Christine Fidler:
Security perception in e-commerce: Conflict between customer and organizational perspectives. 443-449
4th Workshop on Large Scale Computations on Grids
- Jakub Jurkiewicz, Krzysztof Nowinski, Piotr Bala:
Unicore 6 as a platform for desktop grid. 453-457 - Richard Olejnik, Iyad Alshabani, Bernard Toursel, Eryk Laskowski, Marek S. Tudruj:
Load balancing in the SOAJA web service platform. 459-465 - Giuseppe Romanazzi, Peter K. Jimack:
Parallel performance prediction for numerical codes in a multi-cluster environment. 467-474 - Harumasa Tada, Makoto Imase, Masayuki Murata:
On the robustness of the soft state for task scheduling in large-scale distributed computing environment. 475-480
First International Symposium on Multimedia-Applications and Processing
- Ali S. Awad, Hong Man:
Similar neighborhood criterion for edge detection in noisy and noise-free images. 483-486 - Kwansik Cho, Ha Yoon Song, Jun Park:
Accurate localization in short distance based on computer vision for mobile sensors. 487-493 - Miroslaw Miciak:
Character recognition using Radon Transformation and Principal Component Analysis in postal applications. 495-500 - Kazuo Ohzeki, Engyoku Gi:
The quasi-one-way function and its applications to image watermarking. 501-508 - Liana Stanescu, Cosmin Stoica Spahiu, Anca Ion, A. Spahiu:
Question generation for learning evaluation. 509-513
International Conference on Principles of Information Technology and Applications
- Anna Derezinska, Romuald Pilitowski:
Correctness issues of UML class and state machine models in the C# code generation and execution framework. 517-524 - Ahmed Bahaa Farid, Ahmed Sharaf Aldin Ahmed, Y. Mostafa Helmy:
Designing new XML based multidimensional messaging interface for the new XWarehouse architecture. 525-534 - Ka Lok Man:
PAFSV: A process algebraic framework for SystemVerilog. 535-542 - Tadeusz Pankowski, Tomasz Pilka:
Dealing with redundancies and dependencies in normalization of XML data. 543-550 - Adam Przybylek:
Separation of crosscutting concerns at the design level: An extension to the UML metamodel. 551-557 - Tomasz Rak, Slawomir Samolej:
Distributed Internet systems modeling using TCPNs. 559-566
International Workshop on Real Time Software
- Tanguy Le Berre, Philippe Mauran, Gérard Padiou, Philippe Quéinnec:
Real time behavior of data in distributed embedded systems. 569-575 - Petr Bilik, Ludvik Koval, Jiri Hajduk:
CompactRIO embedded system in Power Quality Analysis. 577-580 - Alécio Pedro Delazari Binotto, Edison Pignaton de Freitas, Carlos Eduardo Pereira, André Stork, Tony Larsson:
Real-time task reconfiguration support applied to an UAV-based surveillance system. 581-588 - Milan Brejl, Jaroslav Necesany:
Student's contest: Self-driven slot car racing. 589-592 - Edison Pignaton de Freitas, Marco A. Wehrmeister, Carlos Eduardo Pereira, Tony Larsson:
Real-time support in adaptable middleware for heterogeneous sensor networks. 593-600 - Angelo Furfaro, Libero Nigro:
Embedded Control Systems Design based on RT-DEVS and temporal analysis using UPPAAL. 601-608 - Jan Galdun, Jean-Marc Thiriet, Jan Ligus:
Study of different load dependencies among shared redundant systems. 609-615 - Laure Gonnord, Jean-Philippe Babau:
Runtime resource assurance and adaptation with Qinna framework: A case study. 617-624 - Wojciech Grega, Adam Pilat:
Real-time control teaching using LEGO® MINDSTORMS® NXT robot. 625-628 - Roman Gumzej, Wolfgang A. Halang:
A safety shell for UML-RT Projects. 629-632 - Thomas B. Hilburn, Andrew J. Kornecki, Jean-Marc Thiriet, Wojciech Grega, Miroslav Svéda:
An RSIC-SE2004 curriculum framework. 633-638 - Michael G. Hinchey, James L. Rash, Walter Truszkowski, Roy Sterritt, Christopher A. Rouff:
You can't get there from here! Problems and potential solutions in developing new classes of complex computer systems. 639-647 - Thomas Kaegi-Trachsel, Jürg Gutknecht:
Minos - the design and implementation of an embedded real-time operating system with a perspective of fault tolerance. 649-656 - Rola Kassem, Mikaël Briday, Jean-Luc Béchennec, Yvon Trinquet, Guillaume Savaton:
Simulator generation using an automaton based pipeline model for timing analysis. 657-664 - Andrew J. Kornecki, Janusz Zalewski:
Software certification for safety-critical systems: A status report. 665-672 - Martin Kot:
Modeling real-time database concurrency control protocol two-phase-locking in Uppaal. 673-678 - Tiberiu Letia, Mihai Hulea, Radu Miron:
Distributed scheduling for real-time railway traffic control. 679-685 - Diego Martínez, Francisco Blanes, José E. Simó, Alfons Crespo:
Wireless Sensor and Actuator Networks: Charecterization and case study for confined spaces healthcare applications. 687-693 - Guido Moritz, Steffen Prüter, Dirk Timmermann, Frank Golatowski:
Real-time service-oriented communication protocols on resource constrained devices. 695-701 - Pavel Moryc, Jindrich Cernohorský:
Task jitter measurement under RTLinux and RTX operating systems, comparison of RTLinux and RTX operating environments. 703-709 - Jae-Young Park, Ha Yoon Song:
Multilevel localization for Mobile Sensor Network platforms. 711-718 - Ondrej Rysavý, Jaroslav Ráb:
A component-based approach to verification of embedded control systems using TLA+. 719-725 - Rauf Kh. Sadykhov, Denis V. Lamovsky:
Algorithm for real time faces detection in 3D space. 727-732 - Igor Schagaev:
Reliability of malfunction tolerance. 733-737 - Grzegorz Skiba, Tomasz Zabinski, Andrzej Bozek:
Rapid control prototyping with Scilab/Scicos/RTAI for PC-based ARM-based platforms. 739-744 - Vilém Srovnal, Jirí Kotzian:
Development of a flight control system for an ultralight airplane. 745-750 - Roy Sterritt, Mike Hinchey:
Towards Self-Managing Real-Time System. 751-756 - Dariusz Rzonca, Jan Sadolewski, Andrzej Stec, Zbigniew Swider, Bartosz Trybus, Leszek Trybus:
IEC structured text programming of a small Distributed Control System. 757-760 - Janusz Zalewski:
Web-based laboratories: How does that affect pedagogy? Thoughts for a panel discussion. 761-762 - Thorsten Zitterell, Christoph Scholl:
Improving energy-efficient real-time scheduling by exploiting code instrumentation. 763-771
3rd International Workshop on Secure Information Systems
- Ali Ahmed, Ning Zhang:
A Context-Risk-Aware Access Control model for Ubiquitous environments. 775-782 - Xun Dong, John A. Clark, Jeremy L. Jacob:
User behaviour based phishing websites detection. 783-790 - Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal:
A new worm propagation threat in BitTorrent: Modeling and analysis. 791-798 - Elaine Hulitt, Rayford B. Vaughn:
Information system security compliance to FISMA standard: A quantitative measure. 799-806 - Przemyslaw Kukielka, Zbigniew Kotulski:
Analysis of different architectures of neural networks for application in Intrusion Detection Systems. 807-811 - Georgios V. Lioudakis, Nikolaos L. Dellas, Eleftherios Koutsoloukas, Georgia M. Kapitsaki, Dimitra I. Kaklamani, Iakovos S. Venieris:
A semantic framework for privacy-aware access control. 813-820 - Aneta Poniszewska-Maranda:
Access control models in heterogeneous information systems: From conception to exploitation. 821-826 - Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili:
A Semantic aware Access Control model with real time constraints on history of accesses. 827-836 - Marta Rybczynska:
Network-level properties of modern anonymity systems. 837-843 - Giacomo Verticale, Paolo Giacomazzi:
Performance evaluation of a machine learning algorithm for early application identification. 845-849
Workshop on Wireless and Unstructured Networking: Taming the Stray
- Nicholas M. Boers, Pawel Gburzynski, Ioanis Nikolaidis, Wladek Olesinski:
Supporting wireless application development via virtual execution. 853-860 - Zdravko Karakehayov:
Wireless ad hoc networks: Where security, real-time and lifetime meet. 861-868 - Ha Yoon Song:
A method of mobile base station placement for High Altitude Platform based network with geographical clustering of mobile ground nodes. 869-876 - Gergely Vakulya, Gyula Simon:
Energy efficient percolation-driven flood routing for large-scale sensor networks. 877-883
Workshop on Computational Optimization
- Stefka Fidanova, Ivan Lirkov:
Ant colony system approach for protein folding. 887-891 - Eleni G. Lisgara, George S. Androulakis:
Estimating time series future optima using a steepest descent methodology as a backtracker. 893-898 - Philippe Michelon, Dominique Quadri, Marcos Negreiros:
On a class of periodic scheduling problems: Models, lower bounds and heuristics. 899-906 - Elina Madetoja, Henri Ruotsalainen, Veli-Matti Mönkkönen, Jari Hämäläinen, Kalyanmoy Deb:
Visualizing multi-dimensional pareto-optimal fronts with a 3D virtual reality system. 907-913 - Chrysa Papagianni, Kostas Papadopoulos, Christos A. Pappas, Nikolaos D. Tselikas, Dimitra I. Kaklamani, Iakovos S. Venieris:
Communication network design using Particle Swarm Optimization. 915-920 - Ahmad H. Shraideh, Hervé G. Camus, Pascal G. M. Yim:
Two stages optimization problem: New variant of Bin Packing Problem for decision making. 921-925 - Josef Tvrdík:
Adaptive differential evolution and exponential crossover. 927-931 - Krzysztof Zmorzynski:
Solving IK problems for open chains using optimization methods. 933-937
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.