default search action
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems 2005
- Jerzy Pejas, Andrzej Piegat:
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems. Springer 2005, ISBN 978-1-4020-7776-0
Information Technology Security
- Janusz Górski:
How can we justify trust in software based systems? 3-12 - Tomasz Hebisz, Eugeniusz Kuriata:
The capacity of ciphers fulfilling the accessibility of cryptograms. 13-22 - Volodymyr Beletskyy, D. Burak:
Parallelization of the Data Encryption Standard (DES) algorithm. 23-33 - Witold Macków:
Linked authenticated dictionaries for certificate status verification. 35-46 - Imed El Fray, Jerzy Pejas:
Integrated Payment System for Public Key Infrastructure Services. 47-59 - Jerzy Pejas, Imed El Fray:
Some methods of the analysis and risk assessment in the PKI system services providers. 61-70 - Igor Margasinski, Krzysztof Szczypiorski:
VAST: Versatile Anonymous System for Web Users. 71-82 - Bartosz Sokol, V. N. Yarmolik:
Cryptography and Steganography: teaching experience. 83-92 - Marek Jackiewicz, Eugeniusz Kuriata:
Analysis of non-linear pseudo-noise sequences. 93-102 - Janusz Górski, Aleksander Jarzebowicz, Rafal Leszczyna, Jakub Miler, Marcin Olszewski:
Tool support for detecting defects in object-oriented models. 103-112 - Wlodzimierz Chocianowicz, Jerzy Pejas, Andrzej Rucinski:
The Proposal of Protocol for Electronic Signature Creation in Public Environment. 113-124 - Krzysztof Chmiel:
On Arithmetic Subtraction Linear Approximation. 125-134 - S. Berczynski, Yurii A. Kravtsov, Jerzy Pejas, E. D. Surovyatkina:
Secure Data Transmission via Modulation of the Chaotic Sequence Parameters. 135-142
Biometric Systems
- Leonid Kompanets:
Some Advances and Challenges in Live Biometrics, Personnel Management, and Other "Human Being" Applications. 145-156 - Georgy Kukharev, Adam Kuzminski:
An environment for recognition systems modeling. 157-164 - Georgy Kukharev, Pawel Masicz, Piotr Masicz:
Modified Gradient Method for Face Localization. 165-176 - Adam Nowosielski:
Three stage face recognition algorithm for visitor identification system. 177-184 - Khalid Saeed, Marcin Werdoni:
A New Approach for Hand-Palm Recognition. 185-194 - Khalid Saeed, Piotr Charkiewicz:
An Experimental Criterion for Face Classification. 195-202 - Dariusz Frejlichowski:
Contour Objects Recognition Based On UNL-Fourier Descriptors. 203-208 - Mariusz Borawski, Pawel Forczmanski:
Sonar Image Simulation by Means of Ray Tracing and Image Processing. 209-214 - Liming Chen, Georgy Kukharev, Tomasz Ponikowski:
The PCA Reconstruction Based Approach for Extending Facial Image Databases for Face Recognition Systems. 215-227 - Edward Pólrolniczak:
Investigation of fingerprint verification algorithm based on local centers method. 229-238 - Leonid Kompanets, Mariusz Kubanek, Szymon Rydzek:
Czestochowa's Precise Model of a Face Based on the Facial Asymmetry, Ophthalmogeometry, and Brain Asymmetry Phenomena: the Idea and Algorithm Sketch. 239-251
Methods of Artificial Intelligence and Intelligent Agents
- Gisella Facchinetti, Ilda Mannino, Giovanni Mastroleo, Stefano Soriani:
A fuzzy expert approach for comparing alternative end uses for requalification of contaminated sites. 255-265 - Pawel Banás:
Training assisting program with hybrid decision supporting system. 267-272 - Adam Szustalewicz:
Numerical problems with evaluating the fractal dimension of real data. 273-283 - Zbigniew Pietrzykowski:
Multi-stage ship control in a fuzzy environment. 285-299 - Andrzej Piegat:
Informative value of the possibilistic extension principle. 301-310 - Roman Smierzchalski:
Intelligent Marine Control Systems. 311-319 - Izabela Rejer:
How to deal with the data in a bankruptcy modelling. 321-328 - Piotr Lipinski:
Dependency Mining in Large Sets of Stock Market Trading Rules. 329-336 - Anna Bartkowiak, Joanna Zdziarek, Niki Evelpidou, Andreas Vassilopoulos:
Choosing representative data items: Kohonen, Neural Gas or Mixture Model? 337-344 - Marcin Plucinski:
Application of the Ant Colony Algorithm for the Path Planning. 345-352 - Victor J. Mamaev, Dmitry A. Judin:
Application of fuzzy logic for track corrector formation into flight simulator. 353-359 - Przemyslaw Klesk:
Algorithm for Automatic Definition of Validated and Non-Validated Region in Multi-Dimensional Space. 361-370 - Walery Rogoza:
Adaptive simulation of separable dynamical systems in the neural network basis. 371-386 - Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi:
Improvement of the processors operating ratio in task scheduling using the deadline method. 387-394
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.