default search action
Advances in Information Processing and Protection 2007
- Jerzy Pejas, Khalid Saeed:
Advances in Information Processing and Protection. Springer 2007, ISBN 978-0-387-73136-0
Artificial Intelligence
- Toru Yamaguchi, Eri Sato:
Humatronics and RT-Middleware. 3-12 - Tindara Addabbo, Gisella Facchinetti, Giovanni Mastroleo, Giovanni Solinas:
A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective. 13-23 - Marcin Plucinski, Marcin Korzen:
Application of the Peano Curve for the Robot Trajectory Generating. 25-34 - Krzysztof Trojanowski, Slawomir T. Wierzchon:
On Some Properties of the B-Cell Algorithm in Non-Stationary Environments. 35-44 - Anna Borowska:
The Grouping of Valuations in Probabilistic Algorithms. 45-53 - Dariusz Czerski, Krzysztof Ciesielski, Michal Draminski, Mieczyslaw A. Klopotek, Slawomir T. Wierzchon:
Inverted Lists Compression Using Contextual Information. 55-66 - Amine Chohra, Nadia Kanaoui, Kurosh Madani:
Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application. 67-76 - Ewa Adamus, Andrzej Piegat:
Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation. 77-84 - A. Yu. Dorogov:
Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable Transformations. 85-116 - Adam Szustalewicz:
Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension. 117-128 - Yoshiharu Yoshida, Toru Yamaguchi, Eri Sato, Toshihiro Shibano:
Networked Robots Personal Tastes Acquisition and Sharing. 129-138 - Izabela Rejer:
Reduction of Rules of a Fuzzy Model with a Chain Model. 139-148 - Karina Murawko-Wisniewska, Andrzej Piegat:
Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs. 149-158 - Anna Witkowska, Roman Smierzchalski:
Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm. 159-168 - Anna Bartkowiak, Niki Evelpidou, Andreas Vassilopoulos:
Visualization of Five Erosion Risk Classes using Kernel Discriminants. 169-178
Computer Security and Safety
- Krzysztof Bucholc, Ewa Idzikowska:
Multiple Error Detection in Substitution Blocks for Block Ciphers. 181-190 - Wlodzimierz Bielecki, Dariusz Burak:
Parallelization Method of Encryption Algorithms. 191-204 - Akira Imada:
When a Family of Iris Flower is Normal, Then are Others Abnormal? 205-214 - Anna Grocholewska-Czurylo:
Strong Boolean Functions with Compact ANF Representation. 215-224 - Jerzy Pejas, Michal Zawalich:
Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems. 225-239 - Piotr Kotlarz, Zbigniew Kotulski:
Neural Network as a Programmable Block Cipher. 241-250 - Krzysztof Chmiel:
On Intermediate Evaluation of Block Ciphers. 251-261 - Yuji Kinoshita, Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi:
Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment. 263-269 - Wojciech Mazurczyk, Zbigniew Kotulski:
Covert Channel for Improving VoIP Security. 271-280 - Adrian Skrobek, Pawel Sukiennik:
Cryptanalysis of Chaotic Product Cipher. 281-290 - Larisa Dobryakova, Orest Popov:
Embedding of Stego-Messages in Monochrome Images on the Base of Rank Filtering. 291-300
Image Analysis, Graphics and Biometrics
- Ryszard S. Choras:
JPEG 2000 Image Coding Standard - A Review and Applications. 303-321 - Khalid Saeed, Marek Tabedzki:
New Experiments on Word Recognition Without Segmentation. 323-332 - Khalid Saeed, Marcin Adamski:
Signature Verification by View-Based Feature Extractor and DTW Classifier. 333-341 - Georgy Kukharev, Edward Pólrolniczak:
Increasing Performance of Fingerprint Recognition Systems Using Reconstruction of Ridge Lines Methods. 343-350 - Matthieu Voiry, Véronique Amarger, Kurosh Madani, François Houbre:
Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches. 351-360 - Michal Choras:
Image Pre-classification for Biometrics Identification Systems. 361-370 - Dariusz Frejlichowski, Alji Maow:
Application of Improved Projection Method to Binary Images. 371-380
Computer Simulation and Data Analysis
- Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi:
A Consideration of Processor Utilization on Multi-Processor System. 383-390 - Michihiko Kudo, Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi:
Reliability of Node Information on Autonomous Load Distribution Method. 391-398 - Orest Popov, Tatiana Tretyakova, Anna Barcz, Piotr Piela:
Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects. 399-408 - Eugeniusz Zieniuk, Agnieszka Boltuc, Andrzej Kuzelewski:
Algorithms of Identification of Multi-connected BoundaryGeometry and Material Parameters in Problems Described by Navier-Lame Equation Using the PIES. 409-418 - Walenty Oniszczuk:
Analysis of an Open Linked Series Three-station Network with Blocking. 419-429 - Wlodzimierz Bielecki, Maciej Poliwoda:
Hyperplane Method Implementation for Loops Parallelization in the .NET Environment. 431-445 - Stanislaw Bylka, Ryszarda Rempala:
On a Nonlinear Production-Inventory Problem. 447-457
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.