


default search action
ACS 2016: Miȩ;dzyzdroje, Poland
- Shin-ya Kobayashi, Andrzej Piegat, Jerzy Pejas
, Imed El Fray
, Janusz Kacprzyk:
Hard and Soft Computing for Artificial Intelligence, Multimedia and Security, Selected, Revised Papers from the International Conference on Advanced Computer Systems, ACS 2016, Miȩdzyzdroje, Poland, 19-21 October 2016. Advances in Intelligent Systems and Computing 534, 2017, ISBN 978-3-319-48428-0
Artificial Intelligence
- Andrzej Piegat, Marek Landowski
:
On Fuzzy RDM-Arithmetic. 3-16 - Marcin Pietras:
Hidden Markov Models with Affix Based Observation in the Field of Syntactic Analysis. 17-26 - Olga Pilipczuk
, Galina Cariowa
:
Opinion Acquisition: An Experiment on Numeric, Linguistic and Color Coded Rating Scale Comparison. 27-36 - Walery Rogoza
, Michal Zablocki:
A Weather Forecasting System Using Intelligent BDI Multiagent-Based Group Method of Data Handling. 37-48 - Marek Landowski
:
Comparison of RDM Complex Interval Arithmetic and Rectangular Complex Arithmetic. 49-57 - Robert Burduk, Paulina Heda:
Homogeneous Ensemble Selection - Experimental Studies. 58-67 - Walery Rogoza
:
Deterministic Method for the Prediction of Time Series. 68-80 - Leszek J. Chmielewski
, Arkadiusz Orlowski
, Maciej Janowicz
:
A Study on Directionality in the Ulam Square with the Use of the Hough Transform. 81-90
Design of Information and Security Systems
- Nikolay Borgest
, Maksim Korovin
:
Ontological Approach Towards Semantic Data Filtering in the Interface Design Applied to the Interface Design and Dialogue Creation for the "Robot-Aircraft Designer" Informational System. 93-101 - Grzegorz Smigielski
, Roman Dygdala, Hubert Zarzycki
, Damian Lewandowski:
Real-Time System of Delivering Water-Capsule for Firefighting. 102-111 - Kosuke Yamaguchi, Tsutomu Inamoto, Keiichi Endo, Yoshinobu Higami, Shinya Kobayashi:
Evaluation of Influence Exerted by a Malicious Group's Various Aims in the External Grid. 112-122 - Izabela Rejer
, Lukasz Cieszynski:
Subject-Specific Methodology in the Frequency Scanning Phase of SSVEP-Based BCI. 123-132 - Anna Grocholewska-Czurylo:
S-boxes Cryptographic Properties from a Statistical Angle. 133-145 - Izabela Rejer
:
Wavelet Transform in Detection of the Subject Specific Frequencies for SSVEP-Based BCI. 146-155 - Tomasz Klasa, Imed El Fray
:
Data Scheme Conversion Proposal for Information Security Monitoring Systems. 156-166 - Tomasz Hyla
, Jerzy Pejas
:
Non-standard Certification Models for Pairing Based Cryptography. 167-181
Multimedia Systems
- Aleksandr Cariow
, Galina Cariowa
:
An Algorithm for the Vandermonde Matrix-Vector Multiplication with Reduced Multiplicative Complexity. 185-194 - Jakub Peksinski
, Grzegorz Mikolajczak
, Janusz Pawel Kowalski:
The Use of the Objective Digital Image Quality Assessment Criterion Indication to Create Panoramic Photographs. 195-204 - Pawel Forczmanski
:
Human Face Detection in Thermal Images Using an Ensemble of Cascading Classifiers. 205-215 - Radoslaw Mantiuk
:
Accuracy of High-End and Self-build Eye-Tracking Systems. 216-227 - Robert Staniucha, Adam Wojciechowski
:
Mouth Features Extraction for Emotion Analysis. 228-237 - Dorota Oszutowska-Mazurek
, Przemyslaw Mazurek
:
Sensitivity of Area-Perimeter Relation for Image Analysis and Image Segmentation Purposes. 238-248 - Edward Pólrolniczak
, Michal Kramarczyk
:
Vocal Tract Resonance Analysis Using LTAS in the Context of the Singer's Level of Advancement. 249-257 - Janusz Bobulski
:
Parallel Facial Recognition System Based on 2DHMM. 258-265 - Mariusz Kubanek
, Filip Depta, Dorota Smorawa:
System of Acoustic Assistance in Spatial Orientation for the Blind. 266-277
Software Technologies
- Andriy Luntovskyy
:
Performance and Energy Efficiency in Distributed Computing. 281-292 - Alexander V. Koval
, Larisa S. Globa
, Rina Novogrudska
:
The Approach to Web Services Composition. 293-304 - Wlodzimierz Bielecki
, Marek Palkowski
:
Loop Nest Tiling for Image Processing and Communication Applications. 305-314 - Wlodzimierz Bielecki
, Piotr Skotnicki
:
Tile Merging Technique to Generate Valid Tiled Code by Means of the Transitive Closure of a Dependence Graph. 315-327 - Anna Derezinska
, Marian Szczykulski:
Performance Evaluation of Impact of State Machine Transformation and Run-Time Library on a C# Application. 328-340 - Luiza Fabisiak:
The Method of Evaluating the Usability of the Website Based on Logs and User Preferences. 341-354 - Agnieszka Konys
:
Ontology-Based Approaches to Big Data Analytics. 355-365

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.