Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/books/collections/PS2007.bht:"
@incollection{DBLP:books/sp/07/AdamusP07, author = {Ewa Adamus and Andrzej Piegat}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Predicting Incomplete Data on the Basis of Non Symmetric Similarity Relation}, booktitle = {Advances in Information Processing and Protection}, pages = {77--84}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_8}, doi = {10.1007/978-0-387-73137-7\_8}, timestamp = {Thu, 24 Jan 2019 16:43:12 +0100}, biburl = {https://dblp.org/rec/books/sp/07/AdamusP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/AddabboFMS07, author = {Tindara Addabbo and Gisella Facchinetti and Giovanni Mastroleo and Giovanni Solinas}, editor = {Jerzy Pejas and Khalid Saeed}, title = {A Fuzzy Way to Measure Quality of Work in a Multidimensional Perspective}, booktitle = {Advances in Information Processing and Protection}, pages = {13--23}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_2}, doi = {10.1007/978-0-387-73137-7\_2}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/07/AddabboFMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/BartkowiakEV07, author = {Anna Bartkowiak and Niki Evelpidou and Andreas Vassilopoulos}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Visualization of Five Erosion Risk Classes using Kernel Discriminants}, booktitle = {Advances in Information Processing and Protection}, pages = {169--178}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_15}, doi = {10.1007/978-0-387-73137-7\_15}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/BartkowiakEV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/BieleckiB07, author = {Wlodzimierz Bielecki and Dariusz Burak}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Parallelization Method of Encryption Algorithms}, booktitle = {Advances in Information Processing and Protection}, pages = {191--204}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_17}, doi = {10.1007/978-0-387-73137-7\_17}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/BieleckiB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/BieleckiP07, author = {Wlodzimierz Bielecki and Maciej Poliwoda}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Hyperplane Method Implementation for Loops Parallelization in the .NET Environment}, booktitle = {Advances in Information Processing and Protection}, pages = {431--445}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_39}, doi = {10.1007/978-0-387-73137-7\_39}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/BieleckiP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Borowska07, author = {Anna Borowska}, editor = {Jerzy Pejas and Khalid Saeed}, title = {The Grouping of Valuations in Probabilistic Algorithms}, booktitle = {Advances in Information Processing and Protection}, pages = {45--53}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_5}, doi = {10.1007/978-0-387-73137-7\_5}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/Borowska07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/BucholcI07, author = {Krzysztof Bucholc and Ewa Idzikowska}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Multiple Error Detection in Substitution Blocks for Block Ciphers}, booktitle = {Advances in Information Processing and Protection}, pages = {181--190}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_16}, doi = {10.1007/978-0-387-73137-7\_16}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/BucholcI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/BylkaR07, author = {Stanislaw Bylka and Ryszarda Rempala}, editor = {Jerzy Pejas and Khalid Saeed}, title = {On a Nonlinear Production-Inventory Problem}, booktitle = {Advances in Information Processing and Protection}, pages = {447--457}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_40}, doi = {10.1007/978-0-387-73137-7\_40}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/BylkaR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Chmiel07, author = {Krzysztof Chmiel}, editor = {Jerzy Pejas and Khalid Saeed}, title = {On Intermediate Evaluation of Block Ciphers}, booktitle = {Advances in Information Processing and Protection}, pages = {251--261}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_22}, doi = {10.1007/978-0-387-73137-7\_22}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/Chmiel07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/ChohraKM07, author = {Amine Chohra and Nadia Kanaoui and Kurosh Madani}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine Application}, booktitle = {Advances in Information Processing and Protection}, pages = {67--76}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_7}, doi = {10.1007/978-0-387-73137-7\_7}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/ChohraKM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Choras07, author = {Ryszard S. Choras}, editor = {Jerzy Pejas and Khalid Saeed}, title = {{JPEG} 2000 Image Coding Standard - {A} Review and Applications}, booktitle = {Advances in Information Processing and Protection}, pages = {303--321}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_27}, doi = {10.1007/978-0-387-73137-7\_27}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/Choras07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Choras07a, author = {Michal Choras}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Image Pre-classification for Biometrics Identification Systems}, booktitle = {Advances in Information Processing and Protection}, pages = {361--370}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_32}, doi = {10.1007/978-0-387-73137-7\_32}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/Choras07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/CzerskiCDKW07, author = {Dariusz Czerski and Krzysztof Ciesielski and Michal Draminski and Mieczyslaw A. Klopotek and Slawomir T. Wierzchon}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Inverted Lists Compression Using Contextual Information}, booktitle = {Advances in Information Processing and Protection}, pages = {55--66}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_6}, doi = {10.1007/978-0-387-73137-7\_6}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/CzerskiCDKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Czurylo07, author = {Anna Grocholewska{-}Czurylo}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Strong Boolean Functions with Compact {ANF} Representation}, booktitle = {Advances in Information Processing and Protection}, pages = {215--224}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_19}, doi = {10.1007/978-0-387-73137-7\_19}, timestamp = {Sun, 01 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/07/Czurylo07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/DobryakovaP07, author = {Larisa Dobryakova and Orest Popov}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Embedding of Stego-Messages in Monochrome Images on the Base of Rank Filtering}, booktitle = {Advances in Information Processing and Protection}, pages = {291--300}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_26}, doi = {10.1007/978-0-387-73137-7\_26}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/DobryakovaP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Dorogov07, author = {A. Yu. Dorogov}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable Transformations}, booktitle = {Advances in Information Processing and Protection}, pages = {85--116}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_9}, doi = {10.1007/978-0-387-73137-7\_9}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/Dorogov07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/FrejlichowskiM07, author = {Dariusz Frejlichowski and Alji Maow}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Application of Improved Projection Method to Binary Images}, booktitle = {Advances in Information Processing and Protection}, pages = {371--380}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_33}, doi = {10.1007/978-0-387-73137-7\_33}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/FrejlichowskiM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Imada07, author = {Akira Imada}, editor = {Jerzy Pejas and Khalid Saeed}, title = {When a Family of Iris Flower is Normal, Then are Others Abnormal?}, booktitle = {Advances in Information Processing and Protection}, pages = {205--214}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_18}, doi = {10.1007/978-0-387-73137-7\_18}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/Imada07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/KashiwagiHK07, author = {Koichi Kashiwagi and Yoshinobu Higami and Shin{-}ya Kobayashi}, editor = {Jerzy Pejas and Khalid Saeed}, title = {A Consideration of Processor Utilization on Multi-Processor System}, booktitle = {Advances in Information Processing and Protection}, pages = {383--390}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_34}, doi = {10.1007/978-0-387-73137-7\_34}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/KashiwagiHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/KinoshitaKHK07, author = {Yuji Kinoshita and Koichi Kashiwagi and Yoshinobu Higami and Shin{-}ya Kobayashi}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment}, booktitle = {Advances in Information Processing and Protection}, pages = {263--269}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_23}, doi = {10.1007/978-0-387-73137-7\_23}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/KinoshitaKHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/KotlarzK07, author = {Piotr Kotlarz and Zbigniew Kotulski}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Neural Network as a Programmable Block Cipher}, booktitle = {Advances in Information Processing and Protection}, pages = {241--250}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_21}, doi = {10.1007/978-0-387-73137-7\_21}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/07/KotlarzK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/KudoKHK07, author = {Michihiko Kudo and Koichi Kashiwagi and Yoshinobu Higami and Shin{-}ya Kobayashi}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Reliability of Node Information on Autonomous Load Distribution Method}, booktitle = {Advances in Information Processing and Protection}, pages = {391--398}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_35}, doi = {10.1007/978-0-387-73137-7\_35}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/KudoKHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/KukharevP07, author = {Georgy Kukharev and Edward P{\'{o}}lrolniczak}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Increasing Performance of Fingerprint Recognition Systems Using Reconstruction of Ridge Lines Methods}, booktitle = {Advances in Information Processing and Protection}, pages = {343--350}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_30}, doi = {10.1007/978-0-387-73137-7\_30}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/07/KukharevP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/MazurczykK07, author = {Wojciech Mazurczyk and Zbigniew Kotulski}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Covert Channel for Improving VoIP Security}, booktitle = {Advances in Information Processing and Protection}, pages = {271--280}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_24}, doi = {10.1007/978-0-387-73137-7\_24}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/07/MazurczykK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Murawko-WisniewskaP07, author = {Karina Murawko{-}Wisniewska and Andrzej Piegat}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy Inputs}, booktitle = {Advances in Information Processing and Protection}, pages = {149--158}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_13}, doi = {10.1007/978-0-387-73137-7\_13}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/Murawko-WisniewskaP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Oniszczuk07, author = {Walenty Oniszczuk}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Analysis of an Open Linked Series Three-station Network with Blocking}, booktitle = {Advances in Information Processing and Protection}, pages = {419--429}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_38}, doi = {10.1007/978-0-387-73137-7\_38}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/Oniszczuk07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/PejasZ07, author = {Jerzy Pejas and Michal Zawalich}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification Systems}, booktitle = {Advances in Information Processing and Protection}, pages = {225--239}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_20}, doi = {10.1007/978-0-387-73137-7\_20}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/07/PejasZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/PlucinskiK07, author = {Marcin Plucinski and Marcin Korzen}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Application of the Peano Curve for the Robot Trajectory Generating}, booktitle = {Advances in Information Processing and Protection}, pages = {25--34}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_3}, doi = {10.1007/978-0-387-73137-7\_3}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/PlucinskiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/PopovTBP07, author = {Orest Popov and Tatiana Tretyakova and Anna Barcz and Piotr Piela}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects}, booktitle = {Advances in Information Processing and Protection}, pages = {399--408}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_36}, doi = {10.1007/978-0-387-73137-7\_36}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/PopovTBP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Rejer07, author = {Izabela Rejer}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Reduction of Rules of a Fuzzy Model with a Chain Model}, booktitle = {Advances in Information Processing and Protection}, pages = {139--148}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_12}, doi = {10.1007/978-0-387-73137-7\_12}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/Rejer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/SaeedA07, author = {Khalid Saeed and Marcin Adamski}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Signature Verification by View-Based Feature Extractor and {DTW} Classifier}, booktitle = {Advances in Information Processing and Protection}, pages = {333--341}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_29}, doi = {10.1007/978-0-387-73137-7\_29}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/SaeedA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/SaeedT07, author = {Khalid Saeed and Marek Tabedzki}, editor = {Jerzy Pejas and Khalid Saeed}, title = {New Experiments on Word Recognition Without Segmentation}, booktitle = {Advances in Information Processing and Protection}, pages = {323--332}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_28}, doi = {10.1007/978-0-387-73137-7\_28}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/SaeedT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/SkrobekS07, author = {Adrian Skrobek and Pawel Sukiennik}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Cryptanalysis of Chaotic Product Cipher}, booktitle = {Advances in Information Processing and Protection}, pages = {281--290}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_25}, doi = {10.1007/978-0-387-73137-7\_25}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/SkrobekS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/Szustalewicz07, author = {Adam Szustalewicz}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Minimal Coverage of Investigated Object when Seeking for its Fractal Dimension}, booktitle = {Advances in Information Processing and Protection}, pages = {117--128}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_10}, doi = {10.1007/978-0-387-73137-7\_10}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/Szustalewicz07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/TrojanowskiW07, author = {Krzysztof Trojanowski and Slawomir T. Wierzchon}, editor = {Jerzy Pejas and Khalid Saeed}, title = {On Some Properties of the B-Cell Algorithm in Non-Stationary Environments}, booktitle = {Advances in Information Processing and Protection}, pages = {35--44}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_4}, doi = {10.1007/978-0-387-73137-7\_4}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/TrojanowskiW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/VoiryAMH07, author = {Matthieu Voiry and V{\'{e}}ronique Amarger and Kurosh Madani and Fran{\c{c}}ois Houbre}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based Approaches}, booktitle = {Advances in Information Processing and Protection}, pages = {351--360}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_31}, doi = {10.1007/978-0-387-73137-7\_31}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/VoiryAMH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/WitkowskaS07, author = {Anna Witkowska and Roman Smierzchalski}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Tuning of Parameters Backstepping Ship Course Controller by Genetic Algorithm}, booktitle = {Advances in Information Processing and Protection}, pages = {159--168}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_14}, doi = {10.1007/978-0-387-73137-7\_14}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/07/WitkowskaS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/YamaguchiS07, author = {Toru Yamaguchi and Eri Sato}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Humatronics and RT-Middleware}, booktitle = {Advances in Information Processing and Protection}, pages = {3--12}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_1}, doi = {10.1007/978-0-387-73137-7\_1}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/YamaguchiS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/YoshidaYSS07, author = {Yoshiharu Yoshida and Toru Yamaguchi and Eri Sato and Toshihiro Shibano}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Networked Robots Personal Tastes Acquisition and Sharing}, booktitle = {Advances in Information Processing and Protection}, pages = {129--138}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_11}, doi = {10.1007/978-0-387-73137-7\_11}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/YoshidaYSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/07/ZieniukBK07, author = {Eugeniusz Zieniuk and Agnieszka Boltuc and Andrzej Kuzelewski}, editor = {Jerzy Pejas and Khalid Saeed}, title = {Algorithms of Identification of Multi-connected BoundaryGeometry and Material Parameters in Problems Described by Navier-Lame Equation Using the {PIES}}, booktitle = {Advances in Information Processing and Protection}, pages = {409--418}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7\_37}, doi = {10.1007/978-0-387-73137-7\_37}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/07/ZieniukBK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/PS2007, editor = {Jerzy Pejas and Khalid Saeed}, title = {Advances in Information Processing and Protection}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73137-7}, doi = {10.1007/978-0-387-73137-7}, isbn = {978-0-387-73136-0}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/PS2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.