default search action
13. CISIM 2014: Ho Chi Minh City, Vietnam
- Khalid Saeed, Václav Snásel:
Computer Information Systems and Industrial Management - 13th IFIP TC8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014. Proceedings. Lecture Notes in Computer Science 8838, Springer 2014, ISBN 978-3-662-45236-3
Keynote Papers
- Ngoc Thanh Nguyen:
Processing Collective Knowledge - Conflict Resolution and Integration Aspects - (Keynote Speech). 1-4 - Jaroslav Pokorný:
How to Store and Process Big Data: Are Today's Databases Sufficient? 5-10
Algorithms
- Ammlan Ghosh, Anubhab Sahin, Anirban Silsarma, Rituparna Chaki:
A New Contention Management Technique for Obstruction Free Transactional Memory. 11-22 - Dariusz Jankowski, Konrad Jackowski:
Evolutionary Algorithm for Decision Tree Induction. 23-32 - Tien Lu, Bay Vo, Hien T. Nguyen, Tzung-Pei Hong:
A New Method for Mining High Average Utility Itemsets. 33-42 - Malgorzata Lucinska, Slawomir T. Wierzchon:
Spectral Clustering Based on Analysis of Eigenvector Properties. 43-54 - Hieu Ngoc Duong, Quyen Ngoc Thi Nguyen, Long Ta Bui, Hien T. Nguyen, Václav Snásel:
Applying Recurrent Fuzzy Neural Network to Predict the Runoff of Srepok River. 55-66 - Roman Senkerik, Michal Pluhacek, Ivan Zelinka, Donald Davendra, Zuzana Komínková Oplatková:
Comparison of Chaos Driven PSO and Differential Evolution on the Selected PID Tuning Problem. 67-76 - Vaclav Svaton, Jan Martinovic, Katerina Slaninová, Václav Snásel:
Improving Rule Selection from Robot Soccer Strategy with Substrategies. 77-88 - Loc Hoang Tran, Linh Hoang Tran, Hoang Trang:
Novel Ranking Methods Applied to Complex Membership Determination Problems. 89-99 - Lukás Vojácek, Pavla Drázdilová, Jiri Dvorský:
Combination of Self Organizing Maps and Growing Neural Gas. 100-111
Biometrics and Biometrics Applications
- Tapalina Bhattasali, Khalid Saeed, Nabendu Chaki, Rituparna Chaki:
A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud. 112-121 - Piotr Panasiuk, Marcin Dabrowski, Khalid Saeed, Katarzyna Bochenska-Wlostowska:
On the Comparison of the Keystroke Dynamics Databases. 122-129 - Emil Saeed, Anna Bartocha, Piotr Wachulec, Khalid Saeed:
Influence of Eye Diseases on the Retina Pattern Recognition. 130-140 - Adam Szczepanski, Krzysztof Misztal, Khalid Saeed:
Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices. 141-150
Data Analysis and Information Retrieval
- Dariusz Rafal Augustyn:
Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions. 151-164 - Alisa Babskova, Jan Martinovic, Pavla Drázdilová, Katerina Slaninová:
Dynamic Centrality for Directed Co-author Network with Context. 165-174 - Thinh D. Bui, Son T. Nguyen, Quoc B. Ho:
Towards a Conceptual Search for Vietnamese Legal Text. 175-185 - Huu-Thanh Duong, Bao-Quoc Ho:
A Vietnamese Question Answering System in Vietnam's Legal Documents. 186-197 - Ywen Huang, Zhua Jiang, Xde Xiang, Cneng He, Jfeng Liu, Ying Huang:
An Inner-Enterprise Wiki System (IWkS) Integrated with an Expert Finding Mechanism for Lesson-Learned Knowledge Accumulation in Product Design. 198-208 - Worapot Jakkhupan, Supasit Kajkamhaeng:
Movie Recommendation Using OLAP and Multidimensional Data Model. 209-218 - Wladyslaw Homenda, Wojciech Lesinski:
Decision Trees and Their Families in Imbalanced Pattern Recognition: Recognition with and without Rejection. 219-230 - Mai Nhat Vinh, Nguyen Nhat Duy, Ho Thi Hoang Vy, Le Nguyen Hoai Nam:
An Approach for Integrating Multidimensional Database into Context-Aware Recommender System. 231-242 - Hien T. Nguyen, Phuc H. Duong, Vinh T. Vo:
Vietnamese Sentence Similarity Based on Concepts. 243-253 - Santanu Roy, Ranak Ghosh, Soumya Sen:
Materialized View Construction Based on Clustering Technique. 254-265 - Petr Saloun, Peter Drábik, Ivan Zelinka, Jaroslav Bucko:
Big Data Spectra Analysis Using Analytical Programming and Random Decision Forests. 266-277 - Ryszard Tadeusiewicz, Adrian Horzyk:
Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification. 278-289
Industrial Management and Other Applications
- Dusan Fedorcák, Tomás Kocyan, Martin Hájek, Daniela Szturcová, Jan Martinovic:
viaRODOS: Monitoring and Visualisation of Current Traffic Situation on Highways. 290-300 - Stepán Ozana, Martin Pies, Radovan Hájovský:
Computation of Swing-up Signal for Inverted Pendulum Using Dynamic Optimization. 301-314 - Antoni Portero, Stepán Kuchár, Radim Vavrík, Martin Golasowski, Vít Vondrák:
System and Application Scenarios for Disaster Management Processes, the Rainfall-Runoff Model Case Study. 315-326 - Paramita Sarkar, Ditipriya Sinha:
An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse. 327-338 - Seiji Sugiyama, Daisuke Yokozawa, Atsushi Ikuta, Satoshi Hiratsuka, Susumu Saito, Miyuki Shibata, Tohru Matsuura:
Abbreviation Method for Some Jointed Relations in Displaying Genealogy. 339-350 - Muhammad Waseem Anwar, Farooque Azam:
Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems. 351-362
Modelling and Optimization
- Adrija Bhattacharya, Avirup Das, Sankhayan Choudhury, Nabendu Chaki:
Agent-Based Context Management for Service-Oriented Environments. 363-374 - Ripon Kumar Chakrabortty, Ruhul Amin Sarker, Daryl Essam:
Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem. 375-386 - Juan Carlos Figueroa García, Emanuel Jonathan Medina-Pinzón, Jannan David Rubio-Espinosa:
Non-cooperative Games Involving Type-2 Fuzzy Uncertainty: An Approach. 387-396 - Wladyslaw Homenda, Agnieszka Jastrzebska, Witold Pedrycz:
Joining Concept's Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling. 397-408 - Wladyslaw Homenda, Agnieszka Jastrzebska, Witold Pedrycz:
Time Series Modeling with Fuzzy Cognitive Maps: Simplification Strategies - The Case of a Posteriori Removal of Nodes and Weights. 409-420 - Hong-Quan Hua, T. Hoang Ngan Le, Bac Le:
An Effective Initialization for ASM-Based Methods. 421-432 - Phan T. H. Nguyen, Thang H. Bui:
A Multiple Refinement Approach in Abstraction Model Checking. 433-444 - Michal Pluhacek, Roman Senkerik, Ivan Zelinka:
Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation - An Initial Study. 445-454 - Ivan Zelinka, Petr Saloun, Roman Senkerik:
Chaos Powered Grammatical Evolution. 455-464
Networking
- Przemyslaw Berezinski, Marcin Szpyrka, Bartosz Jasiul, Michal Mazur:
Network Anomaly Detection Using Parameterized Entropy. 465-478 - Jan Dvorak, Ondrej Berger, Ondrej Krejcar:
Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts - Case Study on Low Cost Smart Solution. 479-488 - Daniel Oliveira, Diana Oliveira, Nuno M. Garcia, Graça Esgalhado:
An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service. 489-500 - Stepán Ozana, Martin Pies, Radovan Hájovský, Jirí Koziorek, Ondrej Horácek:
Application of PIL Approach for Automated Transportation Center. 501-513 - Anna Pieta, Michal Lupa, Monika Chuchro, Adam Piórkowski, Andrzej Lesniak:
A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring. 514-525 - Chien-Wen Shen, Chin-Jin Kuo:
Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter. 526-534 - Vo Dang Khoa, Tran Vu Pham, Huynh Tuong Nguyen, Tran Van Hoai:
Multi-criteria Route Planning in Bus Network. 535-546
Pattern Recognition and Image Processing
- Nhat-Quan Huynh Nguyen, Thai Hoang Le:
Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching Weight Set. 547-558 - Przemyslaw Spurek, Alena Chaikouskaya, Jacek Tabor, Elzbieta Zajac:
A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves. 559-570 - Przemyslaw Spurek, Marek Smieja, Krzysztof Misztal:
Subspaces Clustering Approach to Lossy Image Compression. 571-579 - Jakub Stolfa, Svatopluk Stolfa, Katerina Slaninová, Jan Martinovic, Václav Snásel:
An Impact of the User and Time Parameters to Sequence Alignment Methods for Process Mining. 580-591 - Puchong Subpratatsavee, Pramote Kuacharoen:
An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature. 592-601 - Puchong Subpratatsavee, Suchai Tanaiadehawoot:
Grasping Action for Impaired Vision Action Using HC2D Barcode Technology. 602-614
Various Aspects of Computer Security
- Maciej Brzozowski, Andrzej Chmielewski:
Hardware Approach for Generating b-detectors by Immune-Based Algorithms. 615-623 - Feng Xie, Yong Peng, Wei Zhao, Yang Gao, Xuefeng Han:
Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges. 624-635 - Imed El Fray, Tomasz Hyla, Wlodzimierz Chocianowicz:
Protection Profile for Secure Sensitive Information System on Mobile Devices. 636-650 - Tomasz Hyla, Witold Mackow, Jerzy Pejas:
Implicit and Explicit Certificates-Based Encryption Scheme. 651-666 - Bartosz Jasiul, Marcin Szpyrka, Joanna Sliwa:
Malware Behavior Modeling with Colored Petri Nets. 667-679 - Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
A Proposal of Algorithm for Web Applications Cyber Attack Detection. 680-687 - Nguyen Van Nhuong, Vo Thi Yen Nhi, Nguyen Tan Cam, Phu Xuan Mai, Cao Dang Tan:
Semantic Set Analysis for Malware Detection. 688-700
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.