Information Processing and Security Systems
Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describe...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Boston, MA :
Springer US,
2005.
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Digital Image and Signal Processing
- Fourier Descritpor-Based Deformable Models for Segmentation of the Distal Femur in CT
- Hierarchical Segmentation of Sparse Surface Data Using Energy-Minimization Approach
- Interactive Real-time Image Analysis System for Distant Operation
- Analysis/Synthesis Speech Model Based on the Pitch-Tracking Periodic-Aperiodic Decomposition
- Bio-inspired voice activity detector based on the human speech properties in the modulation domain
- A New Step in Arabic Speech Identification: Spoken Digit Recognition
- Split Vector Quantization of Psychoacoustical Modified LSF Coefficients in Speech Coder Based on Pitch-Tracking Periodic-Aperiodic Decomposition
- New results in 3D views of polyhedron generation on view sphere with perspective projection
- Gram-Schmidt Orthonormalization-Based Color Model for Object Detection
- Eyes detection with motion interpretation
- Financial Distress Prediction Using Different Pattern Recognition Methods
- Genetic algorithms applied to optimal arrangement of collocation points in 3D potential boundary-value problems
- Computer Security and Safety
- Fast Computation of Approximation Tables
- Cryptographic Properties of Some Cryptosystem with Modulation of the Chaotic Sequence Parameters
- Keys distribution for asymmetric cryptographic systems
- Two-pattern test generation with low power consumption based on LFSR
- Unauthorized servers for online certificates status verification
- Micropayments with Privacy — a New Proposal for E-commerce
- A model-based approach to analysis of authentication protocols
- Accessibility of information in realtime systems
- Protocol for Certificate Based Access Control Policies Description Language
- Impact of the address changing on the detection of pattern sensitive faults
- Software IP Protection Based on Watermarking Techniques
- Probabilistic Analysis of Operational Security for Network Systems
- Quality of Service Requirements in Computer Networks with Blocking
- Artificial Intelligence-Oriented Trends and Applications
- Genetic BDD-oriented Pattern Classifiers
- A fuzzy way to evaluate the qualitative attributes in bank lending creditworthiness
- Multidimensional Systems, Signals, Circuits, and Repetitive Processes: Theory, Applications, and Future Trends
- Modelling using probabilistic algorithms
- Fuzzy Parametric Integral Equations System in modelling of polygonal potential boundary problems described by the Laplace equation
- From Integrated Circuits Technology to Silicon Grey Matter: Hardware Implementation of Artificial Neural Networks
- A Tiny Flat-island in a Huge Lake — How can we search for it if completely flatland elsewhere?
- A Soft Computing Based Approach Using Signal-To-Image Conversion for Computer Aided Medical Diagnosis (CAMD)
- The prediction of behaviours of chaotic dynamical systems in 3D state space
- Idiotypic Networks as a Metaphor for Data Analysis Algorithms
- Global learning of decision trees by an evolutionary algorithm
- Ships' domains as collision risk at sea in the evolutionary method of trajectory planning
- Inputs' Significance Analysis with Rough Sets Theory
- Semi-Markov process in performance evaluation of asynchronous processors
- Organization of the modeling and simulation of the discrete processes
- The Jeep Problem, searching for the best strategy with a genetic algorithm
- Evaluation of operation and state of an object using artificial intelligence tools.