


default search action
IMCSIT 2008: Wisla, Poland
- Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT 2008, Wisla, Poland, 20-22 October 2008. IEEE 2008, ISBN 978-83-60810-14-9

Workshop on Agent Based Computing V
- Vasile Alaiba, Armand Rotaru:

Agent architecture for building Robocode players with SWI-Prolog. 3-7 - Giacomo Cabri

, Letizia Leonardi
, Raffaele Quitadamo:
Tackling complexity of distributed systems: Towards an integration of service-oriented computing and agent-oriented programming. 9-15 - Giacomo Cabri

, Mariachiara Puviani
, Raffaele Quitadamo:
Connecting methodologies and infrastructures in the development of agent systems. 17-23 - Konrad Fuks, Arkadiusz Kawa

, Waldemar Wieczerzycki:
Adaptation of extended polymorpohic self-slimming agent model into e-sourcing platform. 25-29 - Maurice Grinberg

, Stefan Kostadinov:
The triple model: Combining cutting-edge web technologies with a cognitive model in an ECA. 31-37 - Antonín Komenda

, Michal Pechoucek
, Jirí Bíba, Jirí Vokrínek:
Planning and re-planning in multi-actors scenarios by means of social commitments. 39-45 - Viliam Lisý

, Michal Jakob, Jan Tozicka, Michal Pechoucek
:
Utility-based model for classifying adversarial behaviour in multi-agent systems. 47-53 - Martijn Warnier

, Reinier J. Timmer, Michel A. Oey, Frances M. T. Brazier, Anja Oskamp:
An agent based system for distributed information management: A case study. 55-61
3rd International Symposium Advances in Artificial Intelligence and Applications
- Sónia M. Almeida-Luz

, Miguel Ángel Vega Rodríguez
, Juan Antonio Gómez Pulido
, Juan Manuel Sánchez-Pérez:
Applying Differential Evolution to the Reporting Cells problem. 65-71 - Dominik Bas, Bartosz Broda, Maciej Piasecki

:
Towards Word Sense Disambiguation of Polish. 73-78 - Miroslaw Bedzak:

Usering. Education self-tuning-recommendations in the 8th level of ISO/OSI model. 79-82 - Bartosz Broda, Maciej Piasecki

, Stan Szpakowicz:
Sense-based clustering of Polish nouns in the extraction of semantic relatedness. 83-89 - Andrzej Chmielewski

, Slawomir T. Wierzchon
:
An immune approach to classifying the high-dimensional datasets. 91-96 - Lukasz Ciszak:

Application of clustering and association methods in data cleaning. 97-103 - Sebastian Ernst

, Antoni Ligeza:
A rule-based approach to robust granular planning. 105-111 - Amina El Gonnouni, Abdelouahid Lyhyaoui, Soufiane El Jelali, Manel Martínez-Ramón:

Support vector machines with composite kernels for nonlinear systems identification. 113-118 - Piotr Grobelny

:
The expert system approach in development of loosely coupled software with use of Domain Specific Language. 119-123 - Wojciech Gruszczyk, Halina Kwasnicka

:
Coalition Formation in multi-agent systems - an evolutionary approach. 125-130 - Soufiane El Jelali, Abdelouahid Lyhyaoui, Aníbal R. Figueiras-Vidal:

Applying emphasized soft targets for Gaussian Mixture Model based classification. 131-136 - Anna Jurek, Danuta Zakrzewska

:
Improving Naïve Bayes models of insurance risk by unsupervised classification. 137-144 - Witold Kosinski, Wieslaw Piasecki:

On a class of defuzzification functionals. 145-150 - Tamar Kakiashvili, Waldemar W. Koczkodaj

, Phyllis Montgomery, Kalpdrum Passi
, Ryszard Tadeusiewicz
:
Assessing the properties of the World Health Organization's Quality of Life Index. 151-154 - Adam Kalina, Edward Mezyk, Olgierd Unold:

Accuracy boosting induction of fuzzy rules with Artificial Immune Systems. 155-159 - Stefan Kotowski, Witold Kosinski, Zbigniew Michalewicz

, Piotr Synak, Lukasz Brocki:
On classification tools for genetic algorithms. 161-164 - Daniel Laszlo Kovacs, Tadeusz P. Dobrowiecki

:
Evolution of strategy selection in games by means of natural selection. 165-172 - Juliusz L. Kulikowski:

Image similarity detection in large visual data bases. 173-180 - Roman Kurc, Maciej Piasecki

:
Automatic acquisition of wordnet relations by the morpho-syntactic patterns extracted from the corpora in Polish. 181-188 - Konrad Kulakowski, Grzegorz J. Nalepa:

Using UML state diagrams for visual modeling of business rules. 189-194 - Urszula Markowska-Kaczmar

, Maciej Dziedzic:
Discovery of technical analysis patterns. 195-200 - Marisa da Silva Maximiano

, Miguel A. Vega-Rodríguez
, Juan Antonio Gómez Pulido
, Juan Manuel Sánchez-Pérez:
A hybrid Differential Evolution algorithm to solve a real-world Frequency Assignment problem. 201-205 - Grzegorz J. Nalepa, Igor Wojnicki:

Hierarchical rule design with HaDEs the HeKatE toolchain. 207-214 - Mariusz Paradowski, Halina Kwasnicka, Martin Tabakov

, Jacek Filarski, Marek J. Sasiadek:
On automation of brain CT image analysis. 215-220 - Michal Pryczek:

Neuronal groups and interrelations. 221-227 - Sang Keun Rhee, Jihye Lee, Myon-Woong Park:

Semantic relevance measure between resources based on a graph structure. 229-236 - Marcin Szpyrka:

Exclusion rule-based systems - case study. 237-242 - Michal Szymczak, Grzegorz Frackowiak, Maria Ganzha, Marcin Paprzycki

, Sang Keun Rhee, Jihye Lee, Young Tae Sohn, Jae Kwan Kim, Yo-Sub Han, Myon-Woong Park:
Ontological matchmaking in a Duty Trip Support application in a virtual organization. 243-250 - Elzbieta Hudyma, Grzegorz Terlikowski:

Computer-aided detecting of early strokes and its evaluation on the base of CT images. 251-254
Computer Aspects of Numerical Algorithms
- Alexandre Bezen:

A numerical algorithm of solving the forced sine-Gordon equation. 257-261 - Jaroslaw Bylina, Beata Bylina:

Merging Jacobi and Gauss-Seidel methods for solving Markov chains on computer clusters. 263-268 - Janusz Bytnar, Anna Kucaba-Pietal, Zbigniew Walenta:

Influence of molecular models of water on computer simulations of water nanoflows. 269-275 - Sergiy Fialko

:
A spare shared-memory multifrontal solver in SCAD software. 277-283 - Pawel Maciol, Krzysztof Banas

:
Testing Tesla architecture for scientific computing: The performance of matrix-vector product. 285-291 - Przemyslaw Stpiczynski:

Solving a kind of BVP for second-order ODEs using novel data formats for dense matrices. 293-296 - Vasyl Ustimenko:

On the hidden discrete logarithm for some polynomial stream ciphers. 297-301 - R. Clint Whaley:

Empirically tuning LAPACK's blocking factor for increased performance. 303-310
Computational Linguistics - Applications
- Alexandre Labadié, Violaine Prince:

The impact of corpus quality and type on topic based text segmentation evaluation. 313-319 - Bartosz Rapp:

N-gram language models for Polish language. Basic concepts and applications in automatic speech recognition systems. 321-324 - Pawel Lupkowski

, Mariusz Urbanski
:
SemCAPTCHA - user-friendly alternative for OCR-based CAPTCHA systems. 325-329 - Farag Ahmed, Andreas Nürnberger:

Arabic/English word translation disambiguation approach based on naive Bayesian classifier. 331-338 - Todor Arnaudov, Ruslan Mitkov:

Smarty-extendable framework for bilingual and multilingual comprehension assistants. 339-344 - Bartosz Broda, Maciej Piasecki

:
SuperMatrix: a General tool for lexical semantic knowledge acquisition. 345-352 - Lukasz Degórski, Lukasz Kobylinski

, Adam Przepiórkowski:
Definition extraction: Improving Balanced Random Forests. 353-357 - Krzysztof Dyczkowski

, Norbert Kordek, Pawel Nowakowski, Krzysztof Stronski:
An application supporting language analysis within the framework of the phonetic grammar. 359-362 - Rauf Fatullayev, Ali M. Abbasov

, Abulfat Fatullayev:
Set of active suffix chains and its role in development of the MT system for Azerbaijani. 363-368 - Ali Sebti, Ahmad Abdollahzadeh Barfroush:

A new word sense similarity measure in wordnet. 369-373 - Alexander Troussov

, John Judge, Mikhail Sogrin, Amine Akrout, Brian Davis
, Siegfried Handschuh
:
A linguistic light approach to multilingualism in lexical layers for ontologies. 375-379 - Grazyna Chamielec, Dawid Weiss:

Modeling the frequency of phrasal verbs with search engines. 381-388
8th International Multidisciplinary Conference on e-Commerce and e-Government
- Cene Bavec:

On stimulus for citizens' use of e-government services. 391-395 - Grzegorz Kolaczek, Adam Turowiec, Dominik Kasprzak, Witold Holubowicz

:
e-collaboration platform for the development of rural areas and enterprises. 397-401 - Grzegorz Mazurek

:
Corporate blogs - innovative communication tool or another internet hype? empirical research study. 403-406 - Costantinos Rougeris, George S. Androulakis

:
An examination of factors affecting bidders' choice in electronic auctions. 407-413 - Marek Skokan, Tomas Sabol

, Marian Mach
, Karol Furdík:
Integration of governmental services in semantically described processes in the Access-eGov system. 415-419 - Magdalena Sroga:

Access-eGov-personal assistant of public services. 421-427 - Jacek Wachowicz, Piotr Drygas:

In search of values in internet shopping-method and preliminary research. 429-432 - Urszula Swierczynska-Kaczor:

V-commerce: The potential of virtual worlds in services. 433-436 - Wojciech Gorka

, Michal Socha, Adam Piasecki
, Jakub Ganko:
Intermediate information layer. The use of the SKOS ontology to create information about e-resources provided by the public administration. 437-442 - Mohanad Halaweh

, Christine Fidler:
Security perception in e-commerce: Conflict between customer and organizational perspectives. 443-449
4th Workshop on Large Scale Computations on Grids
- Jakub Jurkiewicz, Krzysztof Nowinski, Piotr Bala

:
Unicore 6 as a platform for desktop grid. 453-457 - Richard Olejnik, Iyad Alshabani, Bernard Toursel, Eryk Laskowski

, Marek S. Tudruj
:
Load balancing in the SOAJA web service platform. 459-465 - Giuseppe Romanazzi

, Peter K. Jimack
:
Parallel performance prediction for numerical codes in a multi-cluster environment. 467-474 - Harumasa Tada, Makoto Imase, Masayuki Murata

:
On the robustness of the soft state for task scheduling in large-scale distributed computing environment. 475-480
First International Symposium on Multimedia-Applications and Processing
- Ali S. Awad, Hong Man:

Similar neighborhood criterion for edge detection in noisy and noise-free images. 483-486 - Kwansik Cho, Ha Yoon Song, Jun Park:

Accurate localization in short distance based on computer vision for mobile sensors. 487-493 - Miroslaw Miciak:

Character recognition using Radon Transformation and Principal Component Analysis in postal applications. 495-500 - Kazuo Ohzeki, Engyoku Gi:

The quasi-one-way function and its applications to image watermarking. 501-508 - Liana Stanescu, Cosmin Stoica Spahiu, Anca Ion

, A. Spahiu:
Question generation for learning evaluation. 509-513
International Conference on Principles of Information Technology and Applications
- Anna Derezinska

, Romuald Pilitowski:
Correctness issues of UML class and state machine models in the C# code generation and execution framework. 517-524 - Ahmed Bahaa Farid, Ahmed Sharaf Aldin Ahmed

, Y. Mostafa Helmy:
Designing new XML based multidimensional messaging interface for the new XWarehouse architecture. 525-534 - Ka Lok Man:

PAFSV: A process algebraic framework for SystemVerilog. 535-542 - Tadeusz Pankowski, Tomasz Pilka

:
Dealing with redundancies and dependencies in normalization of XML data. 543-550 - Adam Przybylek

:
Separation of crosscutting concerns at the design level: An extension to the UML metamodel. 551-557 - Tomasz Rak

, Slawomir Samolej
:
Distributed Internet systems modeling using TCPNs. 559-566
International Workshop on Real Time Software
- Tanguy Le Berre, Philippe Mauran, Gérard Padiou, Philippe Quéinnec:

Real time behavior of data in distributed embedded systems. 569-575 - Petr Bilik

, Ludvik Koval, Jiri Hajduk:
CompactRIO embedded system in Power Quality Analysis. 577-580 - Alécio Pedro Delazari Binotto, Edison Pignaton de Freitas

, Carlos Eduardo Pereira
, André Stork, Tony Larsson:
Real-time task reconfiguration support applied to an UAV-based surveillance system. 581-588 - Milan Brejl, Jaroslav Necesany:

Student's contest: Self-driven slot car racing. 589-592 - Edison Pignaton de Freitas

, Marco A. Wehrmeister
, Carlos Eduardo Pereira
, Tony Larsson:
Real-time support in adaptable middleware for heterogeneous sensor networks. 593-600 - Angelo Furfaro

, Libero Nigro:
Embedded Control Systems Design based on RT-DEVS and temporal analysis using UPPAAL. 601-608 - Jan Galdun, Jean-Marc Thiriet, Jan Ligus

:
Study of different load dependencies among shared redundant systems. 609-615 - Laure Gonnord, Jean-Philippe Babau:

Runtime resource assurance and adaptation with Qinna framework: A case study. 617-624 - Wojciech Grega

, Adam Pilat
:
Real-time control teaching using LEGO® MINDSTORMS® NXT robot. 625-628 - Roman Gumzej, Wolfgang A. Halang:

A safety shell for UML-RT Projects. 629-632 - Thomas B. Hilburn, Andrew J. Kornecki, Jean-Marc Thiriet, Wojciech Grega, Miroslav Svéda:

An RSIC-SE2004 curriculum framework. 633-638 - Michael G. Hinchey

, James L. Rash, Walter Truszkowski, Roy Sterritt
, Christopher A. Rouff:
You can't get there from here! Problems and potential solutions in developing new classes of complex computer systems. 639-647 - Thomas Kaegi-Trachsel, Jürg Gutknecht:

Minos - the design and implementation of an embedded real-time operating system with a perspective of fault tolerance. 649-656 - Rola Kassem, Mikaël Briday, Jean-Luc Béchennec, Yvon Trinquet, Guillaume Savaton:

Simulator generation using an automaton based pipeline model for timing analysis. 657-664 - Andrew J. Kornecki, Janusz Zalewski:

Software certification for safety-critical systems: A status report. 665-672 - Martin Kot:

Modeling real-time database concurrency control protocol two-phase-locking in Uppaal. 673-678 - Tiberiu Letia, Mihai Hulea

, Radu Miron
:
Distributed scheduling for real-time railway traffic control. 679-685 - Diego Martínez, Francisco Blanes, José E. Simó, Alfons Crespo

:
Wireless Sensor and Actuator Networks: Charecterization and case study for confined spaces healthcare applications. 687-693 - Guido Moritz, Steffen Prüter, Dirk Timmermann

, Frank Golatowski
:
Real-time service-oriented communication protocols on resource constrained devices. 695-701 - Pavel Moryc, Jindrich Cernohorský:

Task jitter measurement under RTLinux and RTX operating systems, comparison of RTLinux and RTX operating environments. 703-709 - Jae-Young Park, Ha Yoon Song:

Multilevel localization for Mobile Sensor Network platforms. 711-718 - Ondrej Rysavý, Jaroslav Ráb:

A component-based approach to verification of embedded control systems using TLA+. 719-725 - Rauf Kh. Sadykhov, Denis V. Lamovsky:

Algorithm for real time faces detection in 3D space. 727-732 - Igor Schagaev:

Reliability of malfunction tolerance. 733-737 - Grzegorz Skiba, Tomasz Zabinski

, Andrzej Bozek:
Rapid control prototyping with Scilab/Scicos/RTAI for PC-based ARM-based platforms. 739-744 - Vilém Srovnal, Jirí Kotzian:

Development of a flight control system for an ultralight airplane. 745-750 - Roy Sterritt

, Mike Hinchey
:
Towards Self-Managing Real-Time System. 751-756 - Dariusz Rzonca

, Jan Sadolewski
, Andrzej Stec, Zbigniew Swider, Bartosz Trybus
, Leszek Trybus
:
IEC structured text programming of a small Distributed Control System. 757-760 - Janusz Zalewski:

Web-based laboratories: How does that affect pedagogy? Thoughts for a panel discussion. 761-762 - Thorsten Zitterell, Christoph Scholl:

Improving energy-efficient real-time scheduling by exploiting code instrumentation. 763-771
3rd International Workshop on Secure Information Systems
- Ali Ahmed, Ning Zhang:

A Context-Risk-Aware Access Control model for Ubiquitous environments. 775-782 - Xun Dong, John A. Clark, Jeremy L. Jacob:

User behaviour based phishing websites detection. 783-790 - Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal

:
A new worm propagation threat in BitTorrent: Modeling and analysis. 791-798 - Elaine Hulitt, Rayford B. Vaughn:

Information system security compliance to FISMA standard: A quantitative measure. 799-806 - Przemyslaw Kukielka, Zbigniew Kotulski

:
Analysis of different architectures of neural networks for application in Intrusion Detection Systems. 807-811 - Georgios V. Lioudakis

, Nikolaos L. Dellas, Eleftherios Koutsoloukas, Georgia M. Kapitsaki
, Dimitra I. Kaklamani, Iakovos S. Venieris:
A semantic framework for privacy-aware access control. 813-820 - Aneta Poniszewska-Maranda

:
Access control models in heterogeneous information systems: From conception to exploitation. 821-826 - Ali Noorollahi Ravari, Morteza Amini

, Rasool Jalili:
A Semantic aware Access Control model with real time constraints on history of accesses. 827-836 - Marta Rybczynska:

Network-level properties of modern anonymity systems. 837-843 - Giacomo Verticale

, Paolo Giacomazzi:
Performance evaluation of a machine learning algorithm for early application identification. 845-849
Workshop on Wireless and Unstructured Networking: Taming the Stray
- Nicholas M. Boers, Pawel Gburzynski, Ioanis Nikolaidis, Wladek Olesinski:

Supporting wireless application development via virtual execution. 853-860 - Zdravko Karakehayov:

Wireless ad hoc networks: Where security, real-time and lifetime meet. 861-868 - Ha Yoon Song:

A method of mobile base station placement for High Altitude Platform based network with geographical clustering of mobile ground nodes. 869-876 - Gergely Vakulya, Gyula Simon

:
Energy efficient percolation-driven flood routing for large-scale sensor networks. 877-883
Workshop on Computational Optimization
- Stefka Fidanova, Ivan Lirkov

:
Ant colony system approach for protein folding. 887-891 - Eleni G. Lisgara, George S. Androulakis

:
Estimating time series future optima using a steepest descent methodology as a backtracker. 893-898 - Philippe Michelon

, Dominique Quadri, Marcos Negreiros:
On a class of periodic scheduling problems: Models, lower bounds and heuristics. 899-906 - Elina Madetoja, Henri Ruotsalainen, Veli-Matti Mönkkönen, Jari Hämäläinen

, Kalyanmoy Deb:
Visualizing multi-dimensional pareto-optimal fronts with a 3D virtual reality system. 907-913 - Chrysa Papagianni

, Kostas Papadopoulos, Christos A. Pappas, Nikolaos D. Tselikas
, Dimitra I. Kaklamani, Iakovos S. Venieris:
Communication network design using Particle Swarm Optimization. 915-920 - Ahmad H. Shraideh, Hervé G. Camus, Pascal G. M. Yim:

Two stages optimization problem: New variant of Bin Packing Problem for decision making. 921-925 - Josef Tvrdík:

Adaptive differential evolution and exponential crossover. 927-931 - Krzysztof Zmorzynski:

Solving IK problems for open chains using optimization methods. 933-937

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














