Abstract is missing.
- Rule-Based Knowledge Management in Social Threat MonitorMateusz Baran, Antoni Ligeza. 1-12 [doi]
- Multiagent System for Pattern Searching in Billing DataLukasz Beben, Bartlomiej Sniezynski. 13-24 [doi]
- Mobile Context-Based Framework for Monitoring Threats in Urban EnvironmentSzymon Bobek, Grzegorz J. Nalepa, Weronika T. Adrian. 25-35 [doi]
- Anchor-Free Localization Algorithm with Low-Complexity Method for Node Distance Estimation Enhancement Using ToAVladimír Cipov, L'ubomír Dobos, Ján Papaj. 36-47 [doi]
- Visual Detection of People Movement Rules Violation in Crowded Indoor ScenesPiotr Dalka, Piotr Bratoszewski. 48-58 [doi]
- Survey of Recent Developments in Quality Assessment for Target Recognition VideoMikolaj Leszczuk, Joel Dumke. 59-70 [doi]
- Selective Robust Image Encryption for Social NetworksAhmet Emir Dirik, Nasir D. Memon. 71-81 [doi]
- Feature Recycling Cascaded SVM Classifier Based on Feature Selection of HOGs for Pedestrian DetectionAlexandros Gavriilidis, Carsten Stahlschmidt, Jörg Velten, Anton Kummert. 82-94 [doi]
- Two Methods for Detecting MalwareMaciej Korczynski, Gilles Berger-Sabbatel, Andrzej Duda. 95-106 [doi]
- Audio-Visual Surveillance System for Application in Bank Operating RoomJózef Kotus, Kuba Lopatka, Andrzej Czyzewski, Georgis Bogdanis. 107-120 [doi]
- Depth Estimation in Image Sequences in Single-Camera Video Surveillance SystemsAleksander Lamza, Zygmunt Wróbel, Andrzej Dziech. 121-129 [doi]
- Downloading and Analysing Images from the Internet in Order to Detect Special ObjectsMikolaj Leszczuk, Tomasz Piwowarczyk, Michal Grega. 130-143 [doi]
- Knife Detection Scheme Based on Possibilistic Shell ClusteringAleksandra Maksimova. 144-152 [doi]
- 3D Video Compression Using Depth Map PropagationSergey Matyunin, Dmitriy Vatolin. 153-166 [doi]
- Using Sub-sequence Patterns for Detecting Organ Trafficking WebsitesSuraj Jung Pandey, Suresh Manandhar, Agnieszka Kleszcz. 167-180 [doi]
- Changing the Voice of a Subscriber on the Example of an Implementation of the PSOLA Algorithm for the iOS and Android Mobile PlatformsZbigniew Piotrowski, Michal Ciolek. 181-193 [doi]
- Use of the Bio-inspired Algorithms to Find Global Minimum in Force Directed Layout AlgorithmsPatrik Dubec, Jan Plucar, Lukás Rapant. 194-203 [doi]
- Neural Network Regression of Eyes Location in Face ImagesKrzysztof Rusek, Piotr Guzik. 204-212 [doi]
- People Detection and Tracking from a Top-View Position Using a Time-of-Flight CameraCarsten Stahlschmidt, Alexandros Gavriilidis, Jörg Velten, Anton Kummert. 213-223 [doi]
- Video Analytics-Based Algorithm for Monitoring Egress from BuildingsMaciej Szczodrak, Andrzej Czyzewski. 224-232 [doi]
- Risk Assessment for SWOP Telemonitoring System Based on Fuzzy Cognitive MapsPiotr Szwed, Pawel Skrzynski, Pawel Grodniewicz. 233-247 [doi]
- Application of New ATAM Tools to Evaluation of the Dynamic Map ArchitecturePiotr Szwed, Igor Wojnicki, Sebastian Ernst, Andrzej Glowacz. 248-261 [doi]
- Detection of Moving Objects in Images Combined from Video and Thermal CamerasGrzegorz Szwoch, Maciej Szczodrak. 262-272 [doi]
- INDECT Security ArchitectureManuel Urueña, Petr Machník, Marcin Niemiec, Nikolai Stoianov. 273-287 [doi]
- Comparison of Different Feature Types for Acoustic Event Detection SystemEva Kiktová, Martin Lojka, Matús Pleva, Jozef Juhár, Anton Cizmar. 288-297 [doi]
- New Robust Video Watermarking Techniques Based on DWT Transform and Spread Spectrum of Basis Images of 2D Hadamard TransformJakob Wassermann. 298-308 [doi]
- Practical Implementation of Visual Hash Functions for CCTV Footage AuthenticationKatarzyna Zarnowiec, Pawel Korus, Andrzej Dziech, Andrzej Glowacz. 309-323 [doi]