default search action
15. CISIM 2017: Bialystok, Poland
- Khalid Saeed, Wladyslaw Homenda, Rituparna Chaki:
Computer Information Systems and Industrial Management - 16th IFIP TC8 International Conference, CISIM 2017, Bialystok, Poland, June 16-18, 2017, Proceedings. Lecture Notes in Computer Science 10244, Springer 2017, ISBN 978-3-319-59104-9
Algorithms
- Agnieszka Jastrzebska, Rafael Toro Sluzhenko:
Pattern Classification with Rejection Using Cellular Automata-Based Filtering. 3-14 - Artur Malinowski, Pawel Czarnul:
Distributed NVRAM Cache - Optimization and Evaluation with Power of Adjacency Matrix. 15-26 - Ireneusz Mrozek, Vyacheslav N. Yarmolik:
Optimal Controlled Random Tests. 27-38 - Kamil Musial, Joanna Kotowska, Dagmara Górnicka, Anna Burduk:
Tabu Search and Greedy Algorithm Adaptation to Logistic Task. 39-49 - Krzysztof Ostrowski:
Evolutionary Algorithm for the Time-Dependent Orienteering Problem. 50-62 - Lukás Vojácek, Pavla Drázdilová, Jiri Dvorský:
Optimalization of Parallel GNG by Neurons Assigned to Processes. 63-72 - Lamia Zouhaier, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Methodology for the Development of Accessible User Interfaces Based on Meta-Model Transformations: The Case of Blind Users. 73-84
Biometrics and Pattern Recognition Applications
- Monika Drewnik, Zbigniew Pasternak-Winiarski:
SVM Kernel Configuration and Optimization for the Handwritten Digit Recognition. 87-98 - Aneta Górniak, Ewa Skubalska-Rafajlowicz:
Object Classification Using Sequences of Zernike Moments. 99-109 - Milan Jicínský, Jaroslav Marek:
New Year's Day Speeches of Czech Presidents: Phonetic Analysis and Text Analysis. 110-121 - Izabela Rejer, Robert Burduk:
Classifier Selection for Motor Imagery Brain Computer Interface. 122-130 - Maciej Szymkowski, Khalid Saeed:
A Multimodal Face and Fingerprint Recognition Biometrics System. 131-140 - Tomasz Emanuel Wesolowski, Rafal Doroz, Krzysztof Wrobel, Hossein Safaverdi:
Keystroke Dynamics and Finger Knuckle Imaging Fusion for Continuous User Verification. 141-152
Data Analysis and Information Retrieval
- Anna M. Bartkowiak, Jerzy Liebhart:
NMF in Screening Some Spirometric Data, an Insight into 12-Dimensional Data Space. 155-166 - Lukasz Gadomer, Marcin Skoczylas:
Gesture Recognition in 3D Space Using Dimensionally Reduced Set of Features. 167-179 - Lukasz Gadomer, Zenon A. Sosnowski:
Using Cluster-Context Fuzzy Decision Trees in Fuzzy Random Forest. 180-192 - Krzysztof Hajto, Konrad Kamieniecki, Krzysztof Misztal, Przemyslaw Spurek:
Split-and-merge Tweak in Cross Entropy Clustering. 193-204 - Ladislav Marsik, Martin Rusek, Katerina Slaninová, Jan Martinovic, Jaroslav Pokorný:
Evaluation of Chord and Chroma Features and Dynamic Time Warping Scores on Cover Song Identification Task. 205-217 - Janusz Rafalko:
Algorithms for Automatic Selection of Allophones to the Acoustic Units Database. 218-226
Engineering of Enterprise Software Products
- Malik Khurram Awan, Agostino Cortesi:
Blockchain Transaction Analysis Using Dominant Sets. 229-239 - Shreya Banerjee, Anirban Sarkar:
Ontology Driven Conceptualization of Context-Dependent Data Streams and Streaming Databases. 240-252 - Sukriti Bhattacharya, Prasun Banerjee:
Towards the Exploitation of Statistical Language Models for Sentiment Analysis of Twitter Posts. 253-263 - Manali Chakraborty, Novarun Deb, Nabendu Chaki:
POMSec: Pseudo-Opportunistic, Multipath Secured Routing Protocol for Communications in Smart Grid. 264-276 - Priyanka Chakraborty, Anirban Sarkar:
Context Driven Approach for Enterprise Architecture Framework. 277-289 - Ayan Kumar Das, Rituparna Chaki:
Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network. 290-302 - Martin Golasowski, João Bispo, Jan Martinovic, Katerina Slaninová, João M. P. Cardoso:
Expressing and Applying C++ Code Transformations for the HDF5 API Through a DSL. 303-314 - Marcin Luckner, Aneta Roslan, Izabela Krzeminska, Jaroslaw Legierski, Robert Kunicki:
Clustering of Mobile Subscriber's Location Statistics for Travel Demand Zones Diversity. 315-326 - Giridhar Maji, Soumya Sen, Amitrajit Sarkar:
Share Market Sectoral Indices Movement Forecast with Lagged Correlation and Association Rule Mining. 327-340 - Atanu Majumder, Sangeet Saha, Amlan Chakrabarti:
Task Allocation Strategies for FPGA Based Heterogeneous System on Chip. 341-353 - Tadeusz Nowicki, Robert Waszkowski:
Productivity Oriented Cooperative Approach to Scheduling IT Project Tasks. 354-365 - Shivani Saini, Sunil Saumya, Jyoti Prakash Singh:
Sequential Purchase Recommendation System for E-Commerce Sites. 366-375
Industrial Management and Other Applications
- Anna Burduk, Damian Krenczyk:
Risk Assessment in a Parallel Production System with the Use of FMEA Method and Linguistic Variables. 379-390 - Olfa Chebbi, Ezzeddine Fatnassi:
The Multi Depot One-to-One Pickup and Delivery Problem with Distance Constraints: Real World Application and Heuristic Solution Approach. 391-401 - Michal Kruk, Bartosz Swiderski, Katarzyna Smietanska, Jaroslaw Kurek, Leszek J. Chmielewski, Jaroslaw Górski, Arkadiusz Orlowski:
Detection of 'Orange Skin' Type Surface Defects in Furniture Elements with the Use of Textural Features. 402-411 - Batyrkhan Omarov, Aigerim Bakatkaliyevna Altayeva, Young Im Cho:
Smart Building Climate Control Considering Indoor and Outdoor Parameters. 412-422 - Walenty Oniszczuk:
Service Strategies in Two-Server Tandem Configurations - Modeling and Investigation. 423-435 - Ewaryst Rafajlowicz, Wojciech Rafajlowicz:
Image-Driven Decision Making with Application to Control Gas Burners. 436-446 - Ewa Skubalska-Rafajlowicz:
Sparse Random Projections of Camera Images for Monitoring of a Combustion Process in a Gas Burner. 447-456
Modelling and Optimization
- Katarzyna Borowska, Jaroslaw Stepaniuk:
Rough Sets in Imbalanced Data Problem: Improving Re-sampling Process. 459-469 - Germanas Budnikas:
A Model of Machine Learning Based Interactive E-business Website. 470-480 - Sankhadeep Chatterjee, Rhitaban Nag, Soumya Sen, Amitrajit Sarkar:
Towards Golden Rule of Capital Accumulation: A Genetic Algorithm Approach. 481-491 - Ezzeddine Fatnassi, Hadhami Kaabi:
A Multi-agent System Model for the Personal Rapid Transit System. 492-501 - Wiktor Jakowluk:
Fractional-Order Linear Systems Modeling in Time and Frequency Domains. 502-513 - Joanna Karbowska-Chilinska, Pawel Zabielski:
Maximization of Attractiveness EV Tourist Routes. 514-525 - Adam Klimowicz:
Synthesis Method of Finite State Machines Based on State Minimization for Low Power Design. 526-535 - Marcin Lewandowski, Bartlomiej Placzek, Marcin Bernas:
Self-organizing Traffic Signal Control with Prioritization Strategy Aided by Vehicular Sensor Network. 536-547 - Shibendu Mahata, Suman Kumar Saha, Rajib Kar, Durbadal Mandal:
Infinite Impulse Response Approximations to the Non-integer Order Integrator Using Cuckoo Search Algorithm. 548-556 - Kamil Mielcarek, Alexander Barkalov, Larisa Titarenko:
Designing Moore FSM with Transformation of State Codes. 557-568 - Tomasz Ozanski:
Efficient Simulation of Interacting Particle Systems in Continuous Space and Time. 569-579 - Pawel Rajba, Mieczyslaw Wodecki:
Sampling Method for the Flow Shop with Uncertain Parameters. 580-591 - Valery Salauyou, Michal Ostapczuk:
State Assignment of Finite-State Machines by Using the Values of Input Variables. 592-603 - Tatjana Sidekerskiene, Marcin Wozniak, Robertas Damasevicius:
Nonnegative Matrix Factorization Based Decomposition for Time Series Modelling. 604-613
Various Aspects of Computer Security
- Kamil Brenski, Maciej Choluj, Marcin Luckner:
Evil-AP - Mobile Man-in-the-Middle Threat. 617-627 - Mohanad Halaweh:
Intention to Adopt the Cash on Delivery (COD) Payment Model for E-commerce Transactions: An Empirical Study. 628-637 - Tomasz Hyla, Jerzy Pejas:
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack. 638-651 - Rafal Kozik, Robert Mlodzikowski, Michal Choras:
Netflow-Based Malware Detection and Data Visualisation System. 652-660 - Marcin Luckner, Bartosz Topolski, Magdalena Mazurek:
Application of XGBoost Algorithm in Fingerprinting Localisation Task. 661-671 - Pavel Moravec, Michal Krumnikl:
Developing Countermeasures against Cloning of Identity Tokens in Legacy Systems. 672-684 - Sanggyu Shin, Yoichi Seto, Mayumi Sasaki, Kei Sakamoto:
Analysis of Specific Personal Information Protection Assessment in the Social Security and Tax Number System of Local Governments in Japan. 685-696 - Gerard Wawrzyniak, Imed El Fray:
The Implementation of Electronic Document in Transaction Execution. 697-708
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.