default search action
6th MCSS 2013: Kraków, Poland
- Andrzej Dziech, Andrzej Czyzewski:
Multimedia Communications, Services and Security - 6th International Conference, MCSS 2013, Krakow, Poland, June 6-7, 2013. Proceedings. Communications in Computer and Information Science 368, Springer 2013, ISBN 978-3-642-38558-2 - Mateusz Baran, Antoni Ligeza:
Rule-Based Knowledge Management in Social Threat Monitor. 1-12 - Lukasz Beben, Bartlomiej Sniezynski:
Multiagent System for Pattern Searching in Billing Data. 13-24 - Szymon Bobek, Grzegorz J. Nalepa, Weronika T. Adrian:
Mobile Context-Based Framework for Monitoring Threats in Urban Environment. 25-35 - Vladimír Cipov, L'ubomír Dobos, Ján Papaj:
Anchor-Free Localization Algorithm with Low-Complexity Method for Node Distance Estimation Enhancement Using ToA. 36-47 - Piotr Dalka, Piotr Bratoszewski:
Visual Detection of People Movement Rules Violation in Crowded Indoor Scenes. 48-58 - Mikolaj Leszczuk, Joel Dumke:
Survey of Recent Developments in Quality Assessment for Target Recognition Video. 59-70 - Ahmet Emir Dirik, Nasir D. Memon:
Selective Robust Image Encryption for Social Networks. 71-81 - Alexandros Gavriilidis, Carsten Stahlschmidt, Jörg Velten, Anton Kummert:
Feature Recycling Cascaded SVM Classifier Based on Feature Selection of HOGs for Pedestrian Detection. 82-94 - Maciej Korczynski, Gilles Berger-Sabbatel, Andrzej Duda:
Two Methods for Detecting Malware. 95-106 - Józef Kotus, Kuba Lopatka, Andrzej Czyzewski, Georgis Bogdanis:
Audio-Visual Surveillance System for Application in Bank Operating Room. 107-120 - Aleksander Lamza, Zygmunt Wróbel, Andrzej Dziech:
Depth Estimation in Image Sequences in Single-Camera Video Surveillance Systems. 121-129 - Mikolaj Leszczuk, Tomasz Piwowarczyk, Michal Grega:
Downloading and Analysing Images from the Internet in Order to Detect Special Objects. 130-143 - Aleksandra Maksimova:
Knife Detection Scheme Based on Possibilistic Shell Clustering. 144-152 - Sergey Matyunin, Dmitriy S. Vatolin:
3D Video Compression Using Depth Map Propagation. 153-166 - Suraj Jung Pandey, Suresh Manandhar, Agnieszka Kleszcz:
Using Sub-sequence Patterns for Detecting Organ Trafficking Websites. 167-180 - Zbigniew Piotrowski, Michal Ciolek:
Changing the Voice of a Subscriber on the Example of an Implementation of the PSOLA Algorithm for the iOS and Android Mobile Platforms. 181-193 - Patrik Dubec, Jan Plucar, Lukás Rapant:
Use of the Bio-inspired Algorithms to Find Global Minimum in Force Directed Layout Algorithms. 194-203 - Krzysztof Rusek, Piotr Guzik:
Neural Network Regression of Eyes Location in Face Images. 204-212 - Carsten Stahlschmidt, Alexandros Gavriilidis, Jörg Velten, Anton Kummert:
People Detection and Tracking from a Top-View Position Using a Time-of-Flight Camera. 213-223 - Maciej Szczodrak, Andrzej Czyzewski:
Video Analytics-Based Algorithm for Monitoring Egress from Buildings. 224-232 - Piotr Szwed, Pawel Skrzynski, Pawel Grodniewicz:
Risk Assessment for SWOP Telemonitoring System Based on Fuzzy Cognitive Maps. 233-247 - Piotr Szwed, Igor Wojnicki, Sebastian Ernst, Andrzej Glowacz:
Application of New ATAM Tools to Evaluation of the Dynamic Map Architecture. 248-261 - Grzegorz Szwoch, Maciej Szczodrak:
Detection of Moving Objects in Images Combined from Video and Thermal Cameras. 262-272 - Manuel Urueña, Petr Machník, Marcin Niemiec, Nikolai T. Stoianov:
INDECT Security Architecture. 273-287 - Eva Kiktová, Martin Lojka, Matús Pleva, Jozef Juhár, Anton Cizmar:
Comparison of Different Feature Types for Acoustic Event Detection System. 288-297 - Jakob Wassermann:
New Robust Video Watermarking Techniques Based on DWT Transform and Spread Spectrum of Basis Images of 2D Hadamard Transform. 298-308 - Katarzyna Zarnowiec, Pawel Korus, Andrzej Dziech, Andrzej Glowacz:
Practical Implementation of Visual Hash Functions for CCTV Footage Authentication. 309-323
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.