Search dblp for Publications

export results for "toc:db/books/collections/PP2005.bht:"

 download as .bib file

@incollection{DBLP:books/sp/05/0002KP05,
  author    = {Liming Chen and
               Georgy Kukharev and
               Tomasz Ponikowski},
  title     = {The {PCA} Reconstruction Based Approach for Extending Facial Image
               Databases for Face Recognition Systems},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {215--227},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Banas05,
  author    = {Pawel Ban{\'{a}}s},
  title     = {Training assisting program with hybrid decision supporting system},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {267--272},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/BartkowiakZEV05,
  author    = {Anna Bartkowiak and
               Joanna Zdziarek and
               Niki Evelpidou and
               Andreas Vassilopoulos},
  title     = {Choosing representative data items: Kohonen, Neural Gas or Mixture
               Model?},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {337--344},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/BeletskyyB05,
  author    = {Volodymyr Beletskyy and
               D. Burak},
  title     = {Parallelization of the Data Encryption Standard {(DES)} algorithm},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {23--33},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/BerczynskiKPS05a,
  author    = {S. Berczynski and
               Yu. A. Kravtsov and
               Jerzy Pejas and
               E. D. Surovyatkina},
  title     = {Secure Data Transmission via Modulation of the Chaotic Sequence Parameters},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {135--142},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/BorawskiF05a,
  author    = {Mariusz Borawski and
               Pawel Forczmanski},
  title     = {Sonar Image Simulation by Means of Ray Tracing and Image Processing},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {209--214},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Chmiel05a,
  author    = {Krzysztof Chmiel},
  title     = {On Arithmetic Subtraction Linear Approximation},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {125--134},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/ChocianowiczPR05,
  author    = {Wlodzimierz Chocianowicz and
               Jerzy Pejas and
               Andrzej Rucinski},
  title     = {The Proposal of Protocol for Electronic Signature Creation in Public
               Environment},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {113--124},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/FacchinettiMMS05,
  author    = {Gisella Facchinetti and
               Ilda Mannino and
               Giovanni Mastroleo and
               Stefano Soriani},
  title     = {A fuzzy expert approach for comparing alternative end uses for requalification
               of contaminated sites},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {255--265},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/FrayP05,
  author    = {Imed El Fray and
               Jerzy Pejas},
  title     = {Integrated Payment System for Public Key Infrastructure Services},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {47--59},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Frejlichowski05,
  author    = {Dariusz Frejlichowski},
  title     = {Contour Objects Recognition Based On UNL-Fourier Descriptors},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {203--208},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Gorski05,
  author    = {Janusz G{\'{o}}rski},
  title     = {How can we justify trust in software based systems?},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {3--12},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/GorskiJLMO05,
  author    = {Janusz G{\'{o}}rski and
               Aleksander Jarzebowicz and
               Rafal Leszczyna and
               Jakub Miler and
               Marcin Olszewski},
  title     = {Tool support for detecting defects in object-oriented models},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {103--112},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/HebiszK05a,
  author    = {Tomasz Hebisz and
               Eugeniusz Kuriata},
  title     = {The capacity of ciphers fulfilling the accessibility of cryptograms},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {13--22},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Izabela05,
  author    = {Izabela Rejer},
  title     = {How to deal with the data in a bankruptcy modelling},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {321--328},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/JackiewiczK05,
  author    = {Marek Jackiewicz and
               Eugeniusz Kuriata},
  title     = {Analysis of non-linear pseudo-noise sequences},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {93--102},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/KashiwagiHK05,
  author    = {Koichi Kashiwagi and
               Yoshinobu Higami and
               Shin{-}ya Kobayashi},
  title     = {Improvement of the processors operating ratio in task scheduling using
               the deadline method},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {387--394},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Klesk05a,
  author    = {Przemyslaw Klesk},
  title     = {Algorithm for Automatic Definition of Validated and Non-Validated
               Region in Multi-Dimensional Space},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {361--370},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Kompanets05,
  author    = {Leonid Kompanets},
  title     = {Some Advances and Challenges in Live Biometrics, Personnel Management,
               and Other "Human Being" Applications},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {145--156},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/KompanetsKR05,
  author    = {Leonid Kompanets and
               Mariusz Kubanek and
               Szymon Rydzek},
  title     = {Czestochowa's Precise Model of a Face Based on the Facial Asymmetry,
               Ophthalmogeometry, and Brain Asymmetry Phenomena: the Idea and Algorithm
               Sketch},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {239--251},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/KukharevK05,
  author    = {Georgy Kukharev and
               Adam Kuzminski},
  title     = {An environment for recognition systems modeling},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {157--164},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/KukharevMM05,
  author    = {Georgy Kukharev and
               Pawel Masicz and
               Piotr Masicz},
  title     = {Modified Gradient Method for Face Localization},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {165--176},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Lipinski05,
  author    = {Piotr Lipinski},
  title     = {Dependency Mining in Large Sets of Stock Market Trading Rules},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {329--336},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Mackow05,
  author    = {Witold Mack{\'{o}}w},
  title     = {Linked authenticated dictionaries for certificate status verification},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {35--46},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/MamaevJ05,
  author    = {Victor J. Mamaev and
               Dmitry A. Judin},
  title     = {Application of fuzzy logic for track corrector formation into flight
               simulator},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {353--359},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/MargasinskiS05,
  author    = {Igor Margasinski and
               Krzysztof Szczypiorski},
  title     = {{VAST:} Versatile Anonymous System for Web Users},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {71--82},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Nowosielski05,
  author    = {Adam Nowosielski},
  title     = {Three stage face recognition algorithm for visitor identification
               system},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {177--184},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/PejasF05,
  author    = {Jerzy Pejas and
               Imed El Fray},
  title     = {Some methods of the analysis and risk assessment in the {PKI} system
               services providers},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {61--70},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Piegat05,
  author    = {Andrzej Piegat},
  title     = {Informative value of the possibilistic extension principle},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {301--310},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Pietrzykowski05,
  author    = {Zbigniew Pietrzykowski},
  title     = {Multi-stage ship control in a fuzzy environment},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {285--299},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Plucinski05,
  author    = {Marcin Plucinski},
  title     = {Application of the Ant Colony Algorithm for the Path Planning},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {345--352},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Polrolniczak05,
  author    = {Edward P{\'{o}}lrolniczak},
  title     = {Investigation of fingerprint verification algorithm based on local
               centers method},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {229--238},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Rogoza05,
  author    = {Walery Rogoza},
  title     = {Adaptive simulation of separable dynamical systems in the neural network
               basis},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {371--386},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/SaeedC05,
  author    = {Khalid Saeed and
               Piotr Charkiewicz},
  title     = {An Experimental Criterion for Face Classification},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {195--202},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/SaeedW05,
  author    = {Khalid Saeed and
               Marcin Werdoni},
  title     = {A New Approach for Hand-Palm Recognition},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {185--194},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Smierzchalski05a,
  author    = {Roman Smierzchalski},
  title     = {Intelligent Marine Control Systems},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {311--319},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/SokolY05,
  author    = {Bartosz Sokol and
               V. N. Yarmolik},
  title     = {Cryptography and Steganography: teaching experience},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {83--92},
  publisher = {Springer},
  year      = {2005}
}
@incollection{DBLP:books/sp/05/Szustalewicz05,
  author    = {Adam Szustalewicz},
  title     = {Numerical problems with evaluating the fractal dimension of real data},
  booktitle = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  pages     = {273--283},
  publisher = {Springer},
  year      = {2005}
}
@book{DBLP:books/sp/PP2005,
  editor    = {Jerzy Pejas and
               Andrzej Piegat},
  title     = {Enhanced Methods in Computer Security, Biometric and Artificial Intelligence
               Systems},
  publisher = {Springer},
  year      = {2005}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics