default search action
11. CISIM 2012: Venice, Italy
- Agostino Cortesi, Nabendu Chaki, Khalid Saeed, Slawomir T. Wierzchon:
Computer Information Systems and Industrial Management - 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012. Proceedings. Lecture Notes in Computer Science 7564, Springer 2012, ISBN 978-3-642-33259-3
Invited Talks
- Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti:
Formalising Security in Ubiquitous and Cloud Scenarios. 1-29 - Young Im Cho:
Designing Smart Cities: Security Issues. 30-40
Security, Access Control and Intrusion Detection
- Tomasz Hyla, Jerzy Pejas:
Certificate-Based Encryption Scheme with General Access Structure. 41-55 - Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny:
Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks. 56-67 - Um-e-Ghazia, Rahat Masood, Muhammad Awais Shibli, Muhammad Bilal:
Usage Control Model Specification in XACML Policy Language - XACML Policy Engine of UCON. 68-79 - Novarun Deb, Nabendu Chaki:
TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks. 80-91 - Petr Gajdos, Pavel Moravec:
Intruder Data Classification Using GM-SOM. 92-100 - Pavla Drázdilová, Alisa Babskova, Jan Martinovic, Katerina Slaninová, Stepan Minks:
Method for Identification of Suitable Persons in Collaborators' Networks. 101-110 - Subhasis Dasgupta, Aditya Bagchi:
A Graph-Based Formalism for Controlling Access to a Digital Library Ontology. 111-122 - Aneta Poniszewska-Maranda:
Role Approach in Access Control Development with the Usage Control Concept. 123-134
Pattern Recognition and Image Processing
- Krzysztof Misztal, Jacek Tabor, Khalid Saeed:
A New Algorithm for Rotation Detection in Iris Pattern Recognition. 135-145 - Ryszard Kozera, Jacek Tchórzewski:
Outlier Removal in 2D Leap Frog Algorithm. 146-157 - Rafal Doroz, Krzysztof Wrobel:
Dynamic Signature Recognition Based on Modified Windows Technique. 158-167 - Andrea Albarelli, Filippo Bergamasco, Andrea Torsello:
Rigid and Non-rigid Shape Matching for Mechanical Components Retrieval. 168-179 - Boguslaw Cyganek:
Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors. 180-190
Biometric Applications
- Piotr Porwik, Tomasz Orczyk:
DTW and Voting-Based Lip Print Recognition System. 191-202 - Mariusz Rybnik, Piotr Panasiuk, Khalid Saeed, Marcin Rogowski:
Advances in the Keystroke Dynamics: The Practical Impact of Database Quality. 203-214 - Marek Penhaker, Petr Klimes, Jakub Pindor, David Korpas:
Advanced Intracardial Biosignal Processing. 215-223 - Hazar Mliki, Mohamed Hammami, Hanêne Ben-Abdallah:
Multi-constraints Face Detect-Track System. 224-235 - Martin Augustynek, Ondrej Adamec, David Micanik:
Using a Differential Pressure Sensor as Spirometer. 236-241
Algorithms and Data Management
- Andrzej Chmielewski, Slawomir T. Wierzchon:
Hybrid Negative Selection Approach for Anomaly Detection. 242-253 - Malgorzata Lucinska, Slawomir T. Wierzchon:
Spectral Clustering Based on k-Nearest Neighbor Graph. 254-265 - Soumya Sen, Anjan Dutta, Agostino Cortesi, Nabendu Chaki:
A New Scale for Attribute Dependency in Large Database Systems. 266-277 - Jan Martinovic, Pavla Drázdilová, Katerina Slaninová, Tomás Kocyan, Václav Snásel:
Left-Right Oscillate Algorithm for Community Detection Used in E-Learning System. 278-289 - Bartlomiej Józef Dzienkowski, Urszula Markowska-Kaczmar:
Plan and Goal Structure Reconstruction: An Automated and Incremental Method Based on Observation of a Single Agent. 290-301 - Václav Snásel, Pavel Krömer, Jan Platos, Milos Kudelka, Zdenek Horak:
On Spectral Partitioning of Co-authorship Networks. 302-313 - Saswati Mukherjee, Matangini Chattopadhyay, Ayan Lahiri, Samiran Chattopadhyay:
An Efficient Binary Playfair Algorithm Using a 4×4 Playfair Key Matrix. 314-325 - Mariusz Rybnik, Wladyslaw Homenda:
Tuning of a Knowledge-Driven Harmonization Model for Tonal Music. 326-337 - Tomasz Sitarek, Wladyslaw Homenda:
Efficient Processing the Braille Music Notation. 338-350
Networking
- Manali Chakraborty, Nabendu Chaki:
ETSeM: A Energy-Aware, Trust-Based, Selective Multi-path Routing Protocol. 351-360 - Soumyabrata Saha, Rituparna Chaki:
Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks. 361-373
System Models and Risk Assessment
- Bartosz Marcinkowski, Michal Kuciapski:
A Business Process Modeling Notation Extension for Risk Handling. 374-381 - Agnieszka Jastrzebska, Wladyslaw Homenda:
Modeling Consumer Decision Making Process with Triangular Norms. 382-394 - Rahma Boucetta, Mohamed Naceur Abdelkrim:
Neural Network Modeling of a Flexible Manipulator Robot. 395-404 - Jiri Dvorský, Zbynek Janoska, Lukás Vojácek:
P Systems for Traffic Flow Simulation. 405-415 - Michal Radecký, Jan Martinovic, Dusan Fedorcák, Radek Tomis, Ivo Vondrák:
Using Extended Raster File for Real Time Traffic Information Mining. 416-427 - Imed El Fray:
A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems. 428-442
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.