Abstract is missing.
- Image Filtration and Feature Extraction for Face RecognitionTomasz Andrysiak, Michal Choras. 3-12 [doi]
- Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOMAnna Bartkowiak, Niki Evelpidou. 13-22 [doi]
- Wavelet Transform in Face RecognitionJanusz Bobulski. 23-29 [doi]
- Content-Based Image Retrieval - A SurveyRyszard S. Choras. 31-44 [doi]
- Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidden Markov ModelsMariusz Kubanek. 45-55 [doi]
- Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-CodersMichael Livshitz, Alexander Petrovsky. 57-67 [doi]
- The Color Information as a Feature for Postage Stamps RecognitionMiroslaw Miciak. 69-78 [doi]
- Iris Shape Evaluation in Face Image with Simple BackgroundSzymon Rydzek. 79-88 [doi]
- Experimental Algorithm for Characteristic Points Evaluation in Static Images of SignaturesKhalid Saeed 0001, Marcin Adamski. 89-98 [doi]
- Parallelization of Standard Modes of Operation for Symmetric Key Block CiphersWlodzimierz Bielecki, Dariusz Burak. 101-110 [doi]
- On Differential and Linear Approximation of S-box FunctionsKrzysztof Chmiel. 111-120 [doi]
- Random Generation of S-Boxes for Block CiphersAnna Grocholewska-Czurylo, Janusz Stoklosa. 121-135 [doi]
- Problems of Sending Sensitive InformationEugeniusz Kuriata. 137-154 [doi]
- Hash Chaining for Authenticated Data Structures Freshness CheckingEugeniusz Kuriata, Witold Macków, Pawel Sukiennik. 155-164 [doi]
- Stream Cipher Keys Generation with Low Power Consumption Based on LFSRMiroslaw Puczko, Vyatcheslav Yarmolik. 165-173 [doi]
- The Quality of Obfuscation and Obfuscation TechniquesJoanna Witkowska. 175-182 [doi]
- Capability and Functionings: A Fuzzy Way to Measure Interaction between Father and ChildTindara Addabbo, Gisella Facchinetti, Giovanni Mastroleo. 185-195 [doi]
- Remarks on Computer SimulationsWiktor Danko. 197-206 [doi]
- Analysis of E-learning System DynamicsBozena Ignatowska, Romuald Mosdorf. 207-216 [doi]
- Can a Negative Selection Detect an Extremely few Non-self among Enormous Amount of Self Cells?Akira Imada. 217-226 [doi]
- An Average Length of Computations of Normalized Probabilistic AlgorithmsJoanna Karbowska-Chilinska. 227-236 [doi]
- A Marine Environment Simulator for Testing Ship Control Systems in Dangerous SituationsAndrzej Lebkowski, Krzysztof Dziedzicki, Marcin Tobiasz, Roman Smierzchalski, Miroslaw Tomera. 237-246 [doi]
- Image Enhancement and Image Half-toning Using Fluid Particles Physics DynamicsKurosh Madani. 247-258 [doi]
- Tandem Models with Blocking in the Computer Subnetworks Performance AnalysisWalenty Oniszczuk. 259-267 [doi]
- Interchangeable Strategies in Games without Side Payments on the Base of Uncertain Information on ResourcesHenryk Piech, Aleksandra Ptak, Marcin Machura. 269-278 [doi]
- Properties of Morphological Operators Applied to Analysis of ECG SignalsKrzysztof Piekarski, Pawel Tadejko, Waldemar Rakowski. 279-288 [doi]
- Input's Significance Evaluation in a Multi Input-Variable SystemIzabela Rejer. 289-298 [doi]
- Calculating the Fractal Dimension of River Basins, Comparison of Several MethodsAdam Szustalewicz, Andreas Vassilopoulos. 299-309 [doi]
- Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic DeviceRyszard Tadeusiewicz, Piotr Augustyniak. 311-321 [doi]
- Evaluation of Clusters Quality in Artificial Immune Clustering System - SArISSlawomir T. Wierzchon, Urszula Kuzelewska. 323-331 [doi]
- Convergence Analysis of the Boundary Geometry Identification Obtained by Genetic Algorithms in the PIESEugeniusz Zieniuk, Krzysztof Szerszen, Agnieszka Boltuc. 333-340 [doi]