Abstract is missing.
- Should Normal Distribution be Normal? The Student s T AlternativeAnna Bartkowiak. 3-8 [doi]
- A New Approach to the Computer Support of Strategic Decision Making in Enterprises by Means of a New Class of Understanding Based Management Support SystemsRyszard Tadeusiewicz, Marek R. Ogiela, Lidia Ogiela. 9-13 [doi]
- GUI Patterns and Web SemanticsVáclav Snásel. 14-19 [doi]
- Finding a Needle in a Haystack: From Baldwin Effect to Quantum ComputationAkira Imada. 20-25 [doi]
- Iris Image RecognitionRyszard S. Choras. 26-30 [doi]
- Toward Higher Level Intelligent SystemsKurosh Madani. 31-36 [doi]
- Introduction of Humatronics--Towards Integration of Web Intelligence and RoboticsYasufumi Takama. 37-44 [doi]
- Benchmark problems of Signal Processing and Control for Testing Emergent Architectures and Programming Techniques of DSP s, FASIC s, and PLD sAdam Dabrowski, Pawel Pawlowski. 45-52 [doi]
- Location Prediction Methods with Markovian Approach and Extended Random Walk ModelPéter Fülöp, Sándor Szabó, Tamás Szálka. 53-58 [doi]
- Architecture of a Predictive Maintenance FrameworkChristin Groba, Sebastian Cech, Frank Rosenthal, Andreas Gössling. 59-64 [doi]
- The Theoretical Framework of the Optimization of Public Transport TravelJolanta Koszelew. 65-70 [doi]
- Estimation of the Average Time of Computations of Probabilistic Algorithms with Continuous Time ParameterJoanna Karbowska-Chilinska. 71-76 [doi]
- UBMSS (Understanding Based Managing Support Systems) as an Example of the Application of Cognitive Analysis in Data AnalysisLidia Ogiela. 77-80 [doi]
- Interpretation of Probabilistic Algorithmic Logic in Nondeterministic Algorithmic LogicAgnieszka Makarec. 81-86 [doi]
- On Toeplitz Matrices Minimal Eigenvalues in Moving Object DescriptionKhalid Saeed, Krzysztof Piekarski. 87-92 [doi]
- Some Criteria of Making Decisions in Pedestrian Evacuation AlgorithmsBartlomiej Gudowski, Jaroslaw Was. 93-96 [doi]
- Universally Composable Key-Evolving SignatureJin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang. 97-102 [doi]
- Histogram-Based Dimensionality Reduction of Term Vector SpaceKrzysztof Ciesielski, Mieczyslaw A. Klopotek, Slawomir T. Wierzchon. 103-108 [doi]
- Bearing s Behavior Modeling for Mechanical Defects Detection and DiagnosisMoustapha Sene, Michel Barret, Kurosh Madani. 109-114 [doi]
- Hybrid Intelligent Diagnosis SystemsAmine Chohra, Nadia Kanaoui, Kurosh Madani. 115-120 [doi]
- Finite Difference Runoff Modelling Using Voronoi Buckets Maciej Dakowicz, Christopher M. Gold. 121-124 [doi]
- Atomic Operators for Construction and Manipulation of the Augmented Quad-EdgePawel Boguslawski, Christopher M. Gold. 125-128 [doi]
- Application of the Kinetic Voronoi Diagram to the Real-Time Navigation of Marine VesselsRafal Goralski, Christopher M. Gold, Maciej Dakowicz. 129-134 [doi]
- A Grouping Aggregation Algorithm Based on the Dimension Hierarchical Encoding in Data WarehouseZhen-zhi Gong, Kong-fa Hu, Qing-Li Da. 135-142 [doi]
- B-Cell Algorithm as a Parallel Approach to Optimization of Moving Peaks Benchmark TasksKrzysztof Trojanowski. 143-148 [doi]
- Ants and Multiple Knapsack ProblemUrszula Boryczka. 149-154 [doi]
- Simple Method of Increasing the Coverage of Nonself Region for Negative Selection AlgorithmsAndrzej Chmielewski, Slawomir T. Wierzchon. 155-160 [doi]
- AIS for Trend Change DetectionAndrzej Domaradzki. 161-165 [doi]
- A Particle Swarm Optimization Algorithm for Neighbor Selection in Peer-to-Peer NetworksShichang Sun, Ajith Abraham, Guiyong Zhang, Hongbo Liu. 166-172 [doi]
- Wireless Sensor Network for Intravenous Dripping SystemsU. Bilbao, P. Bustamante, N. Guarretxena, J. Santo Domingo. 173-178 [doi]
- IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc NetworkRituparna Chaki, Nabendu Chaki. 179-184 [doi]
- ORRP: Optimal Reactive Routing Protocol for Mobile Ad-Hoc NetworksNabendu Chaki, Rituparna Chaki. 185-190 [doi]
- Enhanced Mobility Management Modelling FrameworkPéter Fülöp, Benedek Kovács. 191-196 [doi]
- Spread Spectrum Signals Classification Based on the Wigner-Ville Distribution and Neural Network Probability Density Function EstimationYuri Grishin. 197-202 [doi]
- An Adaptive Data Broadcasting Model in Mobile Information SystemsJohn Tsiligaridis, Raj Acharya. 203-208 [doi]
- Towards a Pervasive Mobile Multimedia ExperienceXu Chen, Michael J. O Grady, Gregory M. P. O Hare. 209-212 [doi]
- Mobile Agent-Based Digital Rights Management SchemeBartlomiej Ziólkowski, Janusz Stoklosa. 213-218 [doi]
- On Frequency Synchronization of e-Learning Web System UsersRomuald Mosdorf, Bozena Ignatowska. 219-224 [doi]
- Deniable File System--Application of Deniable Storage to Protection of Private KeysBartosz Oler, Imed El Fray. 225-229 [doi]
- VCOP--The System of Visual Communication with Computers for Paralyzed UsersGrzegorz Kurdziel, Halina Kwasnicka. 230-238 [doi]
- Face Recognition Using Kernel PCA and Hierarchical RBF NetworkJin Zhou, Yang Liu, Yuehui Chen. 239-244 [doi]
- ICA Based on KPCA and Hybrid Flexible Neural Tree to Face RecognitionJin Zhou, Yang Liu, Yuehui Chen. 245-250 [doi]
- Fuzzy Data in Local Optimal Strategy of Multistage RecognitionRobert Burduk. 251-254 [doi]
- Semi-Automatic Segmentation of Fibrous Liver TissueP. Andruszkiewicz, C. Boldak, J. Jaroszewicz. 255-260 [doi]
- Image Feature Extraction Methods for Ear Biometrics--A SurveyMichal Choras. 261-265 [doi]
- Capillaroscopy Image Analysis as an Automatic Image Annotation ProblemHalina Kwasnicka, Mariusz Paradowski, Krzysztof Borysewicz. 266-271 [doi]
- Image Analysis by Methods of Dimension ReductionPavel Moravec, Václav Snásel, Alexander A. Frolov, Dusan Húsek, Hana Rezanková, Pavel Polyakov. 272-277 [doi]
- Images Reconstruction with Use of a Genetic AlgorithmAnna Piwonska, Urszula Grycuk. 278-281 [doi]
- The Compact Three Stages Method of the Signature RecognitionPiotr Porwik. 282-287 [doi]
- Modified Word Recognition System--New PerformanceMarek Tabedzki, Khalid Saeed. 288-293 [doi]
- Bandelet Union Optimal Matrix Norms Constructing Lossless WatermarkingYue-xiang Yang, Li-Zhi Cheng, Yong Luo, Rui Wang. 294-298 [doi]
- Standard and Genetic k-means Clustering Techniques in Image SegmentationDariusz Malyszko, Slawomir T. Wierzchon. 299-304 [doi]
- Using Wavelet Transform, DPCM and Adaptive Run-length Coding to Compress ImagesBan N. Thanoon. 305-309 [doi]
- Nonlinear and Frequency Analysis of the Weather in BialystokJaroslaw Kilon, Aida Saeed-Baginska, Jerzy Sienkiewicz, Romuald Mosdorf. 310-315 [doi]
- Semi-Supervised Handwritten Word Segmentation Using Character Samples Similarity Maximization and Evolutionary AlgorithmJerzy Sas, Urszula Markowska-Kaczmar. 316-321 [doi]
- Mathematical Morphology Based ECG Feature Extraction for the Purpose of Heartbeat ClassificationPawel Tadejko, Waldemar Rakowski. 322-327 [doi]
- Using Shaded Views in 3D Multiview Representation of Monotonous PolyhedronWojciech S. Mokrzycki, Andrzej Salamonczyk. 328-336 [doi]
- Obfuscation as Intellectual Rights Protection in VHDL LanguageMaciej Brzozowski, Vyacheslav N. Yarmolik. 337-340 [doi]
- Address Sequences Generation for Multiple Run Memory TestingS. V. Yarmolik, Ireneusz Mrozek, B. Sokol. 341-344 [doi]
- FSM State Assignment Methods for Low-Power DesignValery Salauyou, Tomasz Grzes. 345-350 [doi]
- Managing Information on Industrial Automation ProjectsJan Jekielek. 351-356 [doi]
- Organizational Knowledge MeasurementJoanna Moczydlowska. 357-363 [doi]
- Support of Decision Making by Business Intelligence ToolsMilena Tvrdikova. 364-368 [doi]
- A Study on the Importance of Biometric Technique Selection in the Protection of Company ResourcesAnna Zajkowska, Wojciech Zimnoch, Khalid Saeed. 369-374 [doi]
- Cooperation of Enterprises in the Area of Innovative ActivityAnna Strychalska-Rudzewicz. 375-379 [doi]
- Adapting Price Negotiations to an E-commerce System ScenarioMarcin Paprzycki, Maria Ganzha. 380-386 [doi]