


default search action
15. CISIM 2017: Bialystok, Poland
- Khalid Saeed, Wladyslaw Homenda, Rituparna Chaki:
Computer Information Systems and Industrial Management - 16th IFIP TC8 International Conference, CISIM 2017, Bialystok, Poland, June 16-18, 2017, Proceedings. Lecture Notes in Computer Science 10244, Springer 2017, ISBN 978-3-319-59104-9
Algorithms
- Agnieszka Jastrzebska, Rafael Toro Sluzhenko:
Pattern Classification with Rejection Using Cellular Automata-Based Filtering. 3-14 - Artur Malinowski
, Pawel Czarnul
:
Distributed NVRAM Cache - Optimization and Evaluation with Power of Adjacency Matrix. 15-26 - Ireneusz Mrozek
, Vyacheslav N. Yarmolik:
Optimal Controlled Random Tests. 27-38 - Kamil Musial, Joanna Kotowska, Dagmara Górnicka, Anna Burduk
:
Tabu Search and Greedy Algorithm Adaptation to Logistic Task. 39-49 - Krzysztof Ostrowski
:
Evolutionary Algorithm for the Time-Dependent Orienteering Problem. 50-62 - Lukás Vojácek
, Pavla Drázdilová, Jiri Dvorský:
Optimalization of Parallel GNG by Neurons Assigned to Processes. 63-72 - Lamia Zouhaier, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Methodology for the Development of Accessible User Interfaces Based on Meta-Model Transformations: The Case of Blind Users. 73-84
Biometrics and Pattern Recognition Applications
- Monika Drewnik, Zbigniew Pasternak-Winiarski:
SVM Kernel Configuration and Optimization for the Handwritten Digit Recognition. 87-98 - Aneta Górniak
, Ewa Skubalska-Rafajlowicz
:
Object Classification Using Sequences of Zernike Moments. 99-109 - Milan Jicínský, Jaroslav Marek
:
New Year's Day Speeches of Czech Presidents: Phonetic Analysis and Text Analysis. 110-121 - Izabela Rejer
, Robert Burduk:
Classifier Selection for Motor Imagery Brain Computer Interface. 122-130 - Maciej Szymkowski
, Khalid Saeed:
A Multimodal Face and Fingerprint Recognition Biometrics System. 131-140 - Tomasz Emanuel Wesolowski
, Rafal Doroz
, Krzysztof Wrobel
, Hossein Safaverdi:
Keystroke Dynamics and Finger Knuckle Imaging Fusion for Continuous User Verification. 141-152
Data Analysis and Information Retrieval
- Anna M. Bartkowiak
, Jerzy Liebhart:
NMF in Screening Some Spirometric Data, an Insight into 12-Dimensional Data Space. 155-166 - Lukasz Gadomer, Marcin Skoczylas
:
Gesture Recognition in 3D Space Using Dimensionally Reduced Set of Features. 167-179 - Lukasz Gadomer, Zenon A. Sosnowski
:
Using Cluster-Context Fuzzy Decision Trees in Fuzzy Random Forest. 180-192 - Krzysztof Hajto, Konrad Kamieniecki, Krzysztof Misztal
, Przemyslaw Spurek:
Split-and-merge Tweak in Cross Entropy Clustering. 193-204 - Ladislav Marsik
, Martin Rusek
, Katerina Slaninová
, Jan Martinovic
, Jaroslav Pokorný:
Evaluation of Chord and Chroma Features and Dynamic Time Warping Scores on Cover Song Identification Task. 205-217 - Janusz Rafalko
:
Algorithms for Automatic Selection of Allophones to the Acoustic Units Database. 218-226
Engineering of Enterprise Software Products
- Malik Khurram Awan, Agostino Cortesi
:
Blockchain Transaction Analysis Using Dominant Sets. 229-239 - Shreya Banerjee, Anirban Sarkar:
Ontology Driven Conceptualization of Context-Dependent Data Streams and Streaming Databases. 240-252 - Sukriti Bhattacharya, Prasun Banerjee
:
Towards the Exploitation of Statistical Language Models for Sentiment Analysis of Twitter Posts. 253-263 - Manali Chakraborty, Novarun Deb
, Nabendu Chaki
:
POMSec: Pseudo-Opportunistic, Multipath Secured Routing Protocol for Communications in Smart Grid. 264-276 - Priyanka Chakraborty
, Anirban Sarkar:
Context Driven Approach for Enterprise Architecture Framework. 277-289 - Ayan Kumar Das, Rituparna Chaki:
Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network. 290-302 - Martin Golasowski, João Bispo
, Jan Martinovic
, Katerina Slaninová
, João M. P. Cardoso
:
Expressing and Applying C++ Code Transformations for the HDF5 API Through a DSL. 303-314 - Marcin Luckner, Aneta Roslan, Izabela Krzeminska
, Jaroslaw Legierski, Robert Kunicki:
Clustering of Mobile Subscriber's Location Statistics for Travel Demand Zones Diversity. 315-326 - Giridhar Maji
, Soumya Sen, Amitrajit Sarkar:
Share Market Sectoral Indices Movement Forecast with Lagged Correlation and Association Rule Mining. 327-340 - Atanu Majumder, Sangeet Saha, Amlan Chakrabarti
:
Task Allocation Strategies for FPGA Based Heterogeneous System on Chip. 341-353 - Tadeusz Nowicki
, Robert Waszkowski
:
Productivity Oriented Cooperative Approach to Scheduling IT Project Tasks. 354-365 - Shivani Saini, Sunil Saumya
, Jyoti Prakash Singh
:
Sequential Purchase Recommendation System for E-Commerce Sites. 366-375
Industrial Management and Other Applications
- Anna Burduk
, Damian Krenczyk
:
Risk Assessment in a Parallel Production System with the Use of FMEA Method and Linguistic Variables. 379-390 - Olfa Chebbi, Ezzeddine Fatnassi:
The Multi Depot One-to-One Pickup and Delivery Problem with Distance Constraints: Real World Application and Heuristic Solution Approach. 391-401 - Michal Kruk
, Bartosz Swiderski
, Katarzyna Smietanska
, Jaroslaw Kurek
, Leszek J. Chmielewski
, Jaroslaw Górski, Arkadiusz Orlowski
:
Detection of 'Orange Skin' Type Surface Defects in Furniture Elements with the Use of Textural Features. 402-411 - Batyrkhan Omarov
, Aigerim Bakatkaliyevna Altayeva
, Young Im Cho:
Smart Building Climate Control Considering Indoor and Outdoor Parameters. 412-422 - Walenty Oniszczuk:
Service Strategies in Two-Server Tandem Configurations - Modeling and Investigation. 423-435 - Ewaryst Rafajlowicz, Wojciech Rafajlowicz:
Image-Driven Decision Making with Application to Control Gas Burners. 436-446 - Ewa Skubalska-Rafajlowicz
:
Sparse Random Projections of Camera Images for Monitoring of a Combustion Process in a Gas Burner. 447-456
Modelling and Optimization
- Katarzyna Borowska
, Jaroslaw Stepaniuk
:
Rough Sets in Imbalanced Data Problem: Improving Re-sampling Process. 459-469 - Germanas Budnikas
:
A Model of Machine Learning Based Interactive E-business Website. 470-480 - Sankhadeep Chatterjee
, Rhitaban Nag, Soumya Sen, Amitrajit Sarkar:
Towards Golden Rule of Capital Accumulation: A Genetic Algorithm Approach. 481-491 - Ezzeddine Fatnassi, Hadhami Kaabi:
A Multi-agent System Model for the Personal Rapid Transit System. 492-501 - Wiktor Jakowluk
:
Fractional-Order Linear Systems Modeling in Time and Frequency Domains. 502-513 - Joanna Karbowska-Chilinska
, Pawel Zabielski
:
Maximization of Attractiveness EV Tourist Routes. 514-525 - Adam Klimowicz
:
Synthesis Method of Finite State Machines Based on State Minimization for Low Power Design. 526-535 - Marcin Lewandowski, Bartlomiej Placzek, Marcin Bernas
:
Self-organizing Traffic Signal Control with Prioritization Strategy Aided by Vehicular Sensor Network. 536-547 - Shibendu Mahata, Suman Kumar Saha, Rajib Kar, Durbadal Mandal:
Infinite Impulse Response Approximations to the Non-integer Order Integrator Using Cuckoo Search Algorithm. 548-556 - Kamil Mielcarek
, Alexander Barkalov, Larisa Titarenko:
Designing Moore FSM with Transformation of State Codes. 557-568 - Tomasz Ozanski:
Efficient Simulation of Interacting Particle Systems in Continuous Space and Time. 569-579 - Pawel Rajba
, Mieczyslaw Wodecki
:
Sampling Method for the Flow Shop with Uncertain Parameters. 580-591 - Valery Salauyou, Michal Ostapczuk:
State Assignment of Finite-State Machines by Using the Values of Input Variables. 592-603 - Tatjana Sidekerskiene
, Marcin Wozniak
, Robertas Damasevicius:
Nonnegative Matrix Factorization Based Decomposition for Time Series Modelling. 604-613
Various Aspects of Computer Security
- Kamil Brenski, Maciej Choluj, Marcin Luckner:
Evil-AP - Mobile Man-in-the-Middle Threat. 617-627 - Mohanad Halaweh
:
Intention to Adopt the Cash on Delivery (COD) Payment Model for E-commerce Transactions: An Empirical Study. 628-637 - Tomasz Hyla
, Jerzy Pejas
:
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack. 638-651 - Rafal Kozik
, Robert Mlodzikowski, Michal Choras:
Netflow-Based Malware Detection and Data Visualisation System. 652-660 - Marcin Luckner, Bartosz Topolski, Magdalena Mazurek:
Application of XGBoost Algorithm in Fingerprinting Localisation Task. 661-671 - Pavel Moravec
, Michal Krumnikl
:
Developing Countermeasures against Cloning of Identity Tokens in Legacy Systems. 672-684 - Sanggyu Shin, Yoichi Seto, Mayumi Sasaki, Kei Sakamoto:
Analysis of Specific Personal Information Protection Assessment in the Social Security and Tax Number System of Local Governments in Japan. 685-696 - Gerard Wawrzyniak
, Imed El Fray
:
The Implementation of Electronic Document in Transaction Execution. 697-708

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.