Abstract is missing.
- Humatronics and RT-MiddlewareToru Yamaguchi, Eri Sato. 3-12 [doi]
- A Fuzzy Way to Measure Quality of Work in a Multidimensional PerspectiveTindara Addabbo, Gisella Facchinetti, Giovanni Mastroleo, Giovanni Solinas. 13-23 [doi]
- Application of the Peano Curve for the Robot Trajectory GeneratingMarcin Plucinski, Marcin Korzen. 25-34 [doi]
- On Some Properties of the B-Cell Algorithm in Non-Stationary EnvironmentsKrzysztof Trojanowski, Slawomir T. Wierzchon. 35-44 [doi]
- The Grouping of Valuations in Probabilistic AlgorithmsAnna Borowska. 45-53 [doi]
- Inverted Lists Compression Using Contextual InformationDariusz Czerski, Krzysztof Ciesielski, Michal Draminski, Mieczyslaw A. Klopotek, Slawomir T. Wierzchon. 55-66 [doi]
- Hybrid Intelligent Diagnosis Approaches: Analysis and Comparison under a Biomedicine ApplicationAmine Chohra, Nadia Kanaoui, Kurosh Madani. 67-76 [doi]
- Predicting Incomplete Data on the Basis of Non Symmetric Similarity RelationEwa Adamus, Andrzej Piegat. 77-84 [doi]
- Methods of Designing and System Analysis of Fast Neural Networks and Linear Tunable TransformationsA. Yu. Dorogov. 85-116 [doi]
- Minimal Coverage of Investigated Object when Seeking for its Fractal DimensionAdam Szustalewicz. 117-128 [doi]
- Networked Robots Personal Tastes Acquisition and SharingYoshiharu Yoshida, Toru Yamaguchi, Eri Sato, Toshihiro Shibano. 129-138 [doi]
- Reduction of Rules of a Fuzzy Model with a Chain ModelIzabela Rejer. 139-148 [doi]
- Singleton Representation of Fuzzy Set for Computing Fuzzy Model Response for Fuzzy InputsKarina Murawko-Wisniewska, Andrzej Piegat. 149-158 [doi]
- Tuning of Parameters Backstepping Ship Course Controller by Genetic AlgorithmAnna Witkowska, Roman Smierzchalski. 159-168 [doi]
- Visualization of Five Erosion Risk Classes using Kernel DiscriminantsAnna Bartkowiak, Niki Evelpidou, Andreas Vassilopoulos. 169-178 [doi]
- Multiple Error Detection in Substitution Blocks for Block CiphersKrzysztof Bucholc, Ewa Idzikowska. 181-190 [doi]
- Parallelization Method of Encryption AlgorithmsWlodzimierz Bielecki, Dariusz Burak. 191-204 [doi]
- When a Family of Iris Flower is Normal, Then are Others Abnormal?Akira Imada. 205-214 [doi]
- Strong Boolean Functions with Compact ANF RepresentationAnna Grocholewska-Czurylo. 215-224 [doi]
- Visual Cryptography Methods as a Source of Trustworthiness for the Signature Creation and Verification SystemsJerzy Pejas, Michal Zawalich. 225-239 [doi]
- Neural Network as a Programmable Block CipherPiotr Kotlarz, Zbigniew Kotulski. 241-250 [doi]
- On Intermediate Evaluation of Block CiphersKrzysztof Chmiel. 251-261 [doi]
- Development of Concealing the Purpose of Processing for Programs in a Distributed Computing EnvironmentYuji Kinoshita, Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi. 263-269 [doi]
- Covert Channel for Improving VoIP SecurityWojciech Mazurczyk, Zbigniew Kotulski. 271-280 [doi]
- Cryptanalysis of Chaotic Product CipherAdrian Skrobek, Pawel Sukiennik. 281-290 [doi]
- Embedding of Stego-Messages in Monochrome Images on the Base of Rank FilteringLarisa Dobryakova, Orest Popov. 291-300 [doi]
- JPEG 2000 Image Coding Standard - A Review and ApplicationsRyszard S. Choras. 303-321 [doi]
- New Experiments on Word Recognition Without SegmentationKhalid Saeed 0001, Marek Tabedzki. 323-332 [doi]
- Signature Verification by View-Based Feature Extractor and DTW ClassifierKhalid Saeed 0001, Marcin Adamski. 333-341 [doi]
- Increasing Performance of Fingerprint Recognition Systems Using Reconstruction of Ridge Lines MethodsGeorgy Kukharev, Edward Pólrolniczak. 343-350 [doi]
- Design and Prototyping of an Industrial Fault Clustering System Combining Image Processing and Artificial Neural Network Based ApproachesMatthieu Voiry, Véronique Amarger, Kurosh Madani, François Houbre. 351-360 [doi]
- Image Pre-classification for Biometrics Identification SystemsMichal Choras. 361-370 [doi]
- Application of Improved Projection Method to Binary ImagesDariusz Frejlichowski, Alji Maow. 371-380 [doi]
- A Consideration of Processor Utilization on Multi-Processor SystemKoichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi. 383-390 [doi]
- Reliability of Node Information on Autonomous Load Distribution MethodMichihiko Kudo, Koichi Kashiwagi, Yoshinobu Higami, Shin-ya Kobayashi. 391-398 [doi]
- Methodology of Developing Computer-Based Training Systems for Operators of Dynamic ObjectsOrest Popov, Tatiana Tretyakova, Anna Barcz, Piotr Piela. 399-408 [doi]
- Algorithms of Identification of Multi-connected BoundaryGeometry and Material Parameters in Problems Described by Navier-Lame Equation Using the PIESEugeniusz Zieniuk, Agnieszka Boltuc, Andrzej Kuzelewski. 409-418 [doi]
- Analysis of an Open Linked Series Three-station Network with BlockingWalenty Oniszczuk. 419-429 [doi]
- Hyperplane Method Implementation for Loops Parallelization in the .NET EnvironmentWlodzimierz Bielecki, Maciej Poliwoda. 431-445 [doi]
- On a Nonlinear Production-Inventory ProblemStanislaw Bylka, Ryszarda Rempala. 447-457 [doi]