Abstract is missing.
- Fourier Descritpor-Based Deformable Models for Segmentation of the Distal Femur in CTEric Berg, Mohamed Mahfouz, Christian Debrunner, Brandon Merkl, William Hoff. 3-12 [doi]
- Hierarchical Segmentation of Sparse Surface Data Using Energy-Minimization ApproachRaid Al-Tahir. 13-22 [doi]
- Interactive Real-time Image Analysis System for Distant OperationMahinda P. Pathegama, Özdemir Göl. 23-31 [doi]
- Analysis/Synthesis Speech Model Based on the Pitch-Tracking Periodic-Aperiodic DecompositionPiotr Zubrycki, Alexander A. Petrovsky. 33-42 [doi]
- Bio-inspired voice activity detector based on the human speech properties in the modulation domainA. Shadevsky, Alexander Petrovsky. 43-54 [doi]
- A New Step in Arabic Speech Identification: Spoken Digit RecognitionKhalid Saeed 0001, Mohammad Kheir Nammous. 55-66 [doi]
- Split Vector Quantization of Psychoacoustical Modified LSF Coefficients in Speech Coder Based on Pitch-Tracking Periodic-Aperiodic DecompositionAlexander Petrovsky, Andrzej Sawicki, Alexander Pavlovec. 67-76 [doi]
- New results in 3D views of polyhedron generation on view sphere with perspective projectionMaciej Frydler, Wojciech S. Mokrzycki. 77-86 [doi]
- Gram-Schmidt Orthonormalization-Based Color Model for Object DetectionMariusz Borawski, Pawel Forczmanski. 87-94 [doi]
- Eyes detection with motion interpretationArkadiusz Kogut. 95-102 [doi]
- Financial Distress Prediction Using Different Pattern Recognition MethodsWieslaw Pietruszkiewicz, Leonard Rozenberg. 103-111 [doi]
- Genetic algorithms applied to optimal arrangement of collocation points in 3D potential boundary-value problemsEugeniusz Zieniuk, Krzysztof Szerszen, Agnieszka Boltuc. 113-122 [doi]
- Fast Computation of Approximation TablesKrzysztof Chmiel. 125-134 [doi]
- Cryptographic Properties of Some Cryptosystem with Modulation of the Chaotic Sequence ParametersStefan Berczynski, Yury A. Kravtsov, Jerzy Pejas, Adrian Skrobek. 135-148 [doi]
- Keys distribution for asymmetric cryptographic systemsEugeniusz Kuriata. 149-158 [doi]
- Two-pattern test generation with low power consumption based on LFSRM. Puczko, V. N. Yarmolik. 159-166 [doi]
- Unauthorized servers for online certificates status verificationWitold Macków, Jerzy Pejas. 167-174 [doi]
- Micropayments with Privacy - a New Proposal for E-commerceKrzysztof Szczypiorski, Aneta Zwierko, Igor Margasinski. 175-185 [doi]
- A model-based approach to analysis of authentication protocolsJanusz Górski, Marcin Olszewski. 187-196 [doi]
- Accessibility of information in realtime systemsTomasz Hebisz, Eugeniusz Kuriata. 197-206 [doi]
- Protocol for Certificate Based Access Control Policies Description LanguageJerzy Pejas, Pawel Sukiennik. 207-216 [doi]
- Impact of the address changing on the detection of pattern sensitive faultsBartosz Sokol, Ireneusz Mrozek, Wiaczeslaw Yarmolik. 217-225 [doi]
- Software IP Protection Based on Watermarking TechniquesVyacheslav Yarmolik, Siarhei Partsianka. 227-234 [doi]
- Probabilistic Analysis of Operational Security for Network SystemsJolanta Koszelew. 235-244 [doi]
- Quality of Service Requirements in Computer Networks with BlockingWalenty Oniszczuk. 245-254 [doi]
- Genetic BDD-oriented Pattern ClassifiersWitold Pedrycz, Zenon A. Sosnowski. 257-268 [doi]
- A fuzzy way to evaluate the qualitative attributes in bank lending creditworthinessGisella Facchinetti, Giovanni Mastroleo. 269-282 [doi]
- Multidimensional Systems, Signals, Circuits, and Repetitive Processes: Theory, Applications, and Future TrendsKrzysztof Galkowski, Anton Kummert. 283-302 [doi]
- Modelling using probabilistic algorithmsAnna Borowska, Wiktor Danko, Joanna Karbowska-Chilinska. 303-315 [doi]
- Fuzzy Parametric Integral Equations System in modelling of polygonal potential boundary problems described by the Laplace equationEugeniusz Zieniuk, Andrzej Kuzelewski. 317-326 [doi]
- From Integrated Circuits Technology to Silicon Grey Matter: Hardware Implementation of Artificial Neural NetworksKurosh Madani. 327-351 [doi]
- A Tiny Flat-island in a Huge Lake - How can we search for it if completely flatland elsewhere?Akira Imada. 353-364 [doi]
- A Soft Computing Based Approach Using Signal-To-Image Conversion for Computer Aided Medical Diagnosis (CAMD)Amine Chohra, Nadia Kanaoui, Véronique Amarger. 365-374 [doi]
- The prediction of behaviours of chaotic dynamical systems in 3D state spaceM. Pankiewicz, Romuald Mosdorf. 375-388 [doi]
- Idiotypic Networks as a Metaphor for Data Analysis AlgorithmsSlawomir T. Wierzchon. 389-400 [doi]
- Global learning of decision trees by an evolutionary algorithmMarek Kretowski, Marek Grzes. 401-410 [doi]
- Ships' domains as collision risk at sea in the evolutionary method of trajectory planningRoman Smierzchalski. 411-422 [doi]
- Inputs' Significance Analysis with Rough Sets TheoryIzabela Rejer. 423-432 [doi]
- Semi-Markov process in performance evaluation of asynchronous processorsWojciech Kadlubowski. 433-442 [doi]
- Organization of the modeling and simulation of the discrete processesEmma Kushtina, Alexandre Dolgui, Bartlomiej Malachowski. 443-452 [doi]
- The Jeep Problem, searching for the best strategy with a genetic algorithmPrzemyslaw Klesk. 453-464 [doi]
- Evaluation of operation and state of an object using artificial intelligence toolsHenryk Piech, Aleksandra Ptak, Marcin Machura. 465-475 [doi]