Full Text Documents

Search


Table of Contents
Computer Information Systems and Industrial Management
Agostino Cortesi, Nabendu Chaki, Khalid Saeed, Sławomir Wierzchoń (Eds.)
Front Matter

Invited Talks


Formalising Security in Ubiquitous and Cloud Scenarios
Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti, Chiara Bodei
1-29
Designing Smart Cities: Security Issues
Young Cho
30-40

Security, Access Control and Intrusion Detection


Certificate-Based Encryption Scheme with General Access Structure
Tomasz Hyla, Jerzy Pejaś
41-55
Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks
Ekawat Homsirikamol, Paweł Morawiecki, Marcin Rogawski, Marian Srebrny
56-67
Usage Control Model Specification in XACML Policy Language
Um E-Ghazia, Rahat Masood, Muhammad Shibli, Muhammad Bilal
68-79
TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks
Novarun Deb, Nabendu Chaki
80-91
Intruder Data Classification Using GM-SOM
Petr Gajdoš, Pavel Moravec
92-100
Method for Identification of Suitable Persons in Collaborators’ Networks
Pavla Dráždilová, Alisa Babskova, Jan Martinovič, Kateřina Slaninová, Štěpán Minks
101-110
A Graph-Based Formalism for Controlling Access to a Digital Library Ontology
Subhasis Dasgupta, Aditya Bagchi
111-122
Role Approach in Access Control Development with the Usage Control Concept
Aneta Poniszewska-Maranda
123-134

Pattern Recognition and Image Processing


A New Algorithm for Rotation Detection in Iris Pattern Recognition
Krzysztof Misztal, Jacek Tabor, Khalid Saeed
135-145
Outlier Removal in 2D Leap Frog Algorithm
Ryszard Kozera, Jacek Tchórzewski
146-157
Dynamic Signature Recognition Based on Modified Windows Technique
Rafal Doroz, Krzysztof Wrobel
158-167
Rigid and Non-rigid Shape Matching for Mechanical Components Retrieval
Andrea Albarelli, Filippo Bergamasco, Andrea Torsello
168-179
Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors
Bogusław Cyganek
180-190

Biometric Applications


DTW and Voting-Based Lip Print Recognition System
Piotr Porwik, Tomasz Orczyk
191-202
Advances in the Keystroke Dynamics: The Practical Impact of Database Quality
Mariusz Rybnik, Piotr Panasiuk, Khalid Saeed, Marcin Rogowski
203-214
Advanced Intracardial Biosignal Processing
Marek Penhaker, Petr Klimes, Jakub Pindor, David Korpas
215-223
Multi-constraints Face Detect-Track System
Hazar Mliki, Mohamed Hammami, Hanêne Ben-Abdallah
224-235
Using a Differential Pressure Sensor as Spirometer
Martin Augustynek, Ondrej Adamec, David Micanik
236-241

Algorithms and Data Management


Hybrid Negative Selection Approach for Anomaly Detection
Andrzej Chmielewski, Sławomir Wierzchoń
242-253
Spectral Clustering Based on k-Nearest Neighbor Graph
Małgorzata Lucińska, Sławomir Wierzchoń
254-265
A New Scale for Attribute Dependency in Large Database Systems
Soumya Sen, Anjan Dutta, Agostino Cortesi, Nabendu Chaki
266-277
Left-Right Oscillate Algorithm for Community Detection Used in E-Learning System
Jan Martinovič, Pavla Dráždilová, Kateřina Slaninová, Tomáš Kocyan, Václav Snášel
278-289
Plan and Goal Structure Reconstruction: An Automated and Incremental Method Based on Observation of a Single Agent
Bartłomiej Dzieńkowski, Urszula Markowska-Kaczmar
290-301
On Spectral Partitioning of Co-authorship Networks
Václav Snášel, Pavel Krömer, Jan Platoš, Miloš Kudělka, Zdeněk Horák
302-313
An Efficient Binary Playfair Algorithm Using a 4×4 Playfair Key Matrix
Saswati Mukherjee, Matangini Chattopadhyay, Ayan Lahiri, Samiran Chattopadhyay
314-325
Tuning of a Knowledge-Driven Harmonization Model for Tonal Music
Mariusz Rybnik, Wladyslaw Homenda
326-337
Efficient Processing the Braille Music Notation
Tomasz Sitarek, Wladyslaw Homenda
338-350

Networking


ETSeM: A Energy-Aware, Trust-Based, Selective Multi-path Routing Protocol
Manali Chakraborty, Nabendu Chaki
351-360
Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks
Soumyabrata Saha, Rituparna Chaki
361-373

System Models and Risk Assessment


A Business Process Modeling Notation Extension for Risk Handling
Bartosz Marcinkowski, Michal Kuciapski
374-381
Modeling Consumer Decision Making Process with Triangular Norms
Agnieszka Jastrzebska, Wladyslaw Homenda
382-394
Neural Network Modeling of a Flexible Manipulator Robot
Rahma Boucetta, Mohamed Abdelkrim
395-404
P Systems for Traffic Flow Simulation
Jiří Dvorský, Zbyněk Janoška, Lukáš Vojáček
405-415
Using Extended Raster File for Real Time Traffic Information Mining
Michal Radecký, Jan Martinovič, Dušan Fedorčák, Radek Tomis, Ivo Vondrák
416-427
A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems
Imed Fray
428-442

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/