default search action
Information Processing and Security Systems 2005
- Khalid Saeed, Jerzy Pejas:
Information Processing and Security Systems. Springer 2005, ISBN 978-0-387-25091-5
Digital Image and Signal Processing
- Eric Berg, Mohamed Mahfouz, Christian Debrunner, Brandon Merkl, William A. Hoff:
Fourier Descritpor-Based Deformable Models for Segmentation of the Distal Femur in CT. 3-12 - Raid Al-Tahir:
Hierarchical Segmentation of Sparse Surface Data Using Energy-Minimization Approach. 13-22 - Mahinda P. Pathegama, Özdemir Göl:
Interactive Real-time Image Analysis System for Distant Operation. 23-31 - Piotr Zubrycki, Alexander A. Petrovsky:
Analysis/Synthesis Speech Model Based on the Pitch-Tracking Periodic-Aperiodic Decomposition. 33-42 - A. Shadevsky, Alexander Petrovsky:
Bio-inspired voice activity detector based on the human speech properties in the modulation domain. 43-54 - Khalid Saeed, Mohammad Kheir Nammous:
A New Step in Arabic Speech Identification: Spoken Digit Recognition. 55-66 - Alexander Petrovsky, Andrzej Sawicki, Alexander Pavlovec:
Split Vector Quantization of Psychoacoustical Modified LSF Coefficients in Speech Coder Based on Pitch-Tracking Periodic-Aperiodic Decomposition. 67-76 - Maciej Frydler, Wojciech S. Mokrzycki:
New results in 3D views of polyhedron generation on view sphere with perspective projection. 77-86 - Mariusz Borawski, Pawel Forczmanski:
Gram-Schmidt Orthonormalization-Based Color Model for Object Detection. 87-94 - Arkadiusz Kogut:
Eyes detection with motion interpretation. 95-102 - Wieslaw Pietruszkiewicz, Leonard Rozenberg:
Financial Distress Prediction Using Different Pattern Recognition Methods. 103-111 - Eugeniusz Zieniuk, Krzysztof Szerszen, Agnieszka Boltuc:
Genetic algorithms applied to optimal arrangement of collocation points in 3D potential boundary-value problems. 113-122
Computer Security and Safety
- Krzysztof Chmiel:
Fast Computation of Approximation Tables. 125-134 - Stefan Berczynski, Yury A. Kravtsov, Jerzy Pejas, Adrian Skrobek:
Cryptographic Properties of Some Cryptosystem with Modulation of the Chaotic Sequence Parameters. 135-148 - Eugeniusz Kuriata:
Keys distribution for asymmetric cryptographic systems. 149-158 - Miroslaw Puczko, V. N. Yarmolik:
Two-pattern test generation with low power consumption based on LFSR. 159-166 - Witold Macków, Jerzy Pejas:
Unauthorized servers for online certificates status verification. 167-174 - Krzysztof Szczypiorski, Aneta Zwierko, Igor Margasinski:
Micropayments with Privacy - a New Proposal for E-commerce. 175-185 - Janusz Górski, Marcin Olszewski:
A model-based approach to analysis of authentication protocols. 187-196 - Tomasz Hebisz, Eugeniusz Kuriata:
Accessibility of information in realtime systems. 197-206 - Jerzy Pejas, Pawel Sukiennik:
Protocol for Certificate Based Access Control Policies Description Language. 207-216 - Bartosz Sokol, Ireneusz Mrozek, Wiaczeslaw Yarmolik:
Impact of the address changing on the detection of pattern sensitive faults. 217-225 - Vyacheslav Yarmolik, Siarhei Partsianka:
Software IP Protection Based on Watermarking Techniques. 227-234 - Jolanta Koszelew:
Probabilistic Analysis of Operational Security for Network Systems. 235-244 - Walenty Oniszczuk:
Quality of Service Requirements in Computer Networks with Blocking. 245-254
Artificial Intelligence-Oriented Trends and Applications
- Witold Pedrycz, Zenon A. Sosnowski:
Genetic BDD-oriented Pattern Classifiers. 257-268 - Gisella Facchinetti, Giovanni Mastroleo:
A fuzzy way to evaluate the qualitative attributes in bank lending creditworthiness. 269-282 - Krzysztof Galkowski, Anton Kummert:
Multidimensional Systems, Signals, Circuits, and Repetitive Processes: Theory, Applications, and Future Trends. 283-302 - Anna Borowska, Wiktor Danko, Joanna Karbowska-Chilinska:
Modelling using probabilistic algorithms. 303-315 - Eugeniusz Zieniuk, Andrzej Kuzelewski:
Fuzzy Parametric Integral Equations System in modelling of polygonal potential boundary problems described by the Laplace equation. 317-326 - Kurosh Madani:
From Integrated Circuits Technology to Silicon Grey Matter: Hardware Implementation of Artificial Neural Networks. 327-351 - Akira Imada:
A Tiny Flat-island in a Huge Lake - How can we search for it if completely flatland elsewhere? 353-364 - Amine Chohra, Nadia Kanaoui, Véronique Amarger:
A Soft Computing Based Approach Using Signal-To-Image Conversion for Computer Aided Medical Diagnosis (CAMD). 365-374 - M. Pankiewicz, Romuald Mosdorf:
The prediction of behaviours of chaotic dynamical systems in 3D state space. 375-388 - Slawomir T. Wierzchon:
Idiotypic Networks as a Metaphor for Data Analysis Algorithms. 389-400 - Marek Kretowski, Marek Grzes:
Global learning of decision trees by an evolutionary algorithm. 401-410 - Roman Smierzchalski:
Ships' domains as collision risk at sea in the evolutionary method of trajectory planning. 411-422 - Izabela Rejer:
Inputs' Significance Analysis with Rough Sets Theory. 423-432 - Wojciech Kadlubowski:
Semi-Markov process in performance evaluation of asynchronous processors. 433-442 - Emma Kushtina, Alexandre Dolgui, Bartlomiej Malachowski:
Organization of the modeling and simulation of the discrete processes. 443-452 - Przemyslaw Klesk:
The Jeep Problem, searching for the best strategy with a genetic algorithm. 453-464 - Henryk Piech, Aleksandra Ptak, Marcin Machura:
Evaluation of operation and state of an object using artificial intelligence tools. 465-475
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.