Pub Date : 1900-01-01DOI: 10.1007/978-0-387-36503-9_13
Eugeniusz Kuriata
{"title":"Problems of Sending Sensitive Information","authors":"Eugeniusz Kuriata","doi":"10.1007/978-0-387-36503-9_13","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_13","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133845981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-0-387-36503-9_5
M. Kubanek
{"title":"Method of Speech Recognition and Speaker Identification using Audio-Visual of Polish Speech and Hidden Markov Models","authors":"M. Kubanek","doi":"10.1007/978-0-387-36503-9_5","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_5","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122963556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-0-387-36503-9_2
A. Bartkowiak, N. Evelpidou
{"title":"Visualization of Some Multi-Class Erosion Data Using GDA and Supervised SOM","authors":"A. Bartkowiak, N. Evelpidou","doi":"10.1007/978-0-387-36503-9_2","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_2","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-0-387-36503-9_25
H. Piech, A. Ptak, Marcin Machura
{"title":"Interchangeable Strategies in Games without Side Payments on the Base of Uncertain Information on Resources","authors":"H. Piech, A. Ptak, Marcin Machura","doi":"10.1007/978-0-387-36503-9_25","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_25","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-0-387-36503-9_11
Krzysztof Chmiel
{"title":"On Differential and Linear Approximation of S-box Functions","authors":"Krzysztof Chmiel","doi":"10.1007/978-0-387-36503-9_11","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_11","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127375004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-0-387-36503-9_19
B. Ignatowska, R. Mosdorf
{"title":"Analysis of E-learning System Dynamics","authors":"B. Ignatowska, R. Mosdorf","doi":"10.1007/978-0-387-36503-9_19","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_19","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129811136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-0-387-36503-9_29
R. Tadeusiewicz, P. Augustyniak
{"title":"Automatic Management of Tele-Interpretation Knowledge in a Wearable Diagnostic Device","authors":"R. Tadeusiewicz, P. Augustyniak","doi":"10.1007/978-0-387-36503-9_29","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_29","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130676977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-0-387-36503-9_9
K. Saeed, M. Adamski
{"title":"Experimental Algorithm for Characteristic Points Evaluation in Static Images of Signatures","authors":"K. Saeed, M. Adamski","doi":"10.1007/978-0-387-36503-9_9","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_9","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132785008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-0-387-36503-9_21
Joanna Karbowska-Chilinska
{"title":"An Average Length of Computations of Normalized Probabilistic Algorithms","authors":"Joanna Karbowska-Chilinska","doi":"10.1007/978-0-387-36503-9_21","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_21","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131405373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-0-387-36503-9_6
M. Livshitz, A. Petrovsky
{"title":"Synthesis of Codebooks with Perceptually Monitored Structure for Multiband CELP-Coders","authors":"M. Livshitz, A. Petrovsky","doi":"10.1007/978-0-387-36503-9_6","DOIUrl":"https://doi.org/10.1007/978-0-387-36503-9_6","url":null,"abstract":"","PeriodicalId":151122,"journal":{"name":"Biometrics, Computer Security Systems and Artificial Intelligence Applications","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132264529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}