Research Catalog

Enhanced methods in computer security, biometric and artificial intelligence systems

Title
  1. Enhanced methods in computer security, biometric and artificial intelligence systems / edited by Jerzy Pejaś, Andrzej Piegat.
Published by
  1. New York : Springer Science, [2005], ©2005.

Items in the library and off-site

Filter by

Displaying 1 item

StatusFormatAccessCall numberItem location
Status
Request for on-site useRequest scan
How do I pick up this item and when will it be ready?
FormatBook/TextAccessRequest in advanceCall numberQA76.9.A25 E545 2005Item locationOff-site

Details

Additional authors
  1. Pejaś, Jerzy, 1954-
  2. Piegat, Andrzej, 1947-
Description
  1. xi, 394 pages : illustrations; 25 cm
Subject
  1. Biometric identification
  2. Computer security
  3. Artificial intelligence
Contents
  1. How can we justify trust in software based systems? / Janusz Gorski -- The capacity of ciphers fulfilling the accessibility of cryptograms / Tomasz Hebisz and Eugeniusz Kuriata -- Parallelization of the data encryption standard (DES) algorithm / V. Beletskyy and D. Burak -- Linked authenticated dictionaries for certificate status verification / Witold Mackow -- Integrated payment system for public key infrastructure services / Imedel Fray and Jerzy Pejas -- Some methods of the analysis and risk assessment in the PKI system services providers / Jerzy Pejas and Imedel Fray -- VAST : Versatile Anonymous Systems for Web Users / Igor Margasinski and Krzysztof Szczypiorski -- Cryptography and steganography : teaching experience / Bartosz Sokol and V. N. Yarmolik -- Analysis of non-linear pseudo-noise sequences / Marek Jackiewicz and Eugeniusz Kuriata -- Tool support for detecting defects in object-oriented models / Janusz Gorski, Aleksander Jarzebowicz, Rafal Leszczyna, Jakub Miler and Marcin Olszewski -- The proposal of protocol for electronic signature creation in public environment / Wlodzimierz Chocianoqicz, Jerzy Pejas and Andrzej Rucinski -- On arithmetic subtraction linear approximation / Krzysztof Chmiel -- Secure data transmission via modulation of the chaotic sequence parameters / S. Berczynski, Y. Y. A. Kravtsov, J. Pejas and E. D. Surovyatkina -- Some advances and challenges in live biometrics, personnel management, and other "human being" applications / Leonid Kompanets -- An environment for recognition systems modeling / Georgy Kukharev and Adam Kuzminski -- Modified gradient method for face localization / Georgi Kukharev, Pawel Masicz and Piotr Masicz -- Three stage face recognition algorithm for visitor identification system / Adam Nowosielski -- A new approach for hand-palm recognition / Khalid Saeed and Marcin Werdoni -- An experimental criterion for face classification / Khalid Saeed and Piotr Charkiewicz -- Contour objects recognition based on UNL-Fourier descriptors / Dariusz Frejlichowski -- Sonar image simulation by means of ray tracing and image processing / Mariusz Borawski and Pawel Forczmanski -- The PCA reconstruction based approach for extending facial image databases for face recognition systems / Liming Chen, Georgy Kukharev and Tomasz Ponikowski -- Investigation of fingerprint verification algorithm based on local centers method / Edward Polrolniczak -- Czestochowa's precise model of a face based on the facial asymmetry, ophthalmogeometry, and brain asymmetry phenomena : the idea and algorithm sketch / Leonid Kompanets, Mariusz Kubanek and Szymon Rydzek -- A fuzzy expert approach for comparing alternative end uses for requalification of contaminated sites / Gisella Facchinetti, Ilda Mannino, Giovanni Mastroleo and Stefano Soriani -- Training assisting program with hybrid decision supporting system / Pawel Banas -- Numerical problems with evaluating the fractal dimension of real data / Adam Szustalewicz -- Multi-stage ship control in a fuzzy environment / Zbigniew Pietrzykowski -- Informative value of the possibilistic extension principle / Andrzej Piegat -- Intelligent marine control systems / Roman Smierzchalski -- How to deal with the data in a bankruptcy modeling / Rejer Izabela -- Dependency mining in large sets of stock market trading rules / Piotr Lipinski -- Choosing representative data items : Kohonen, neural gas or mixture model? / Anna Bartkowiak, Joanna Zdziarek, Niki Evelpidou and Andreas Vassilopoulos -- Application of the ant colony algorithm for the path planning / Marcin Plucinski -- Application of fuzzy logic for track corrector formation into flight simulator / Victor J. Mamaev and Dmitry A. Judin -- Algorithm for automatic definition of validated and non-validated region in multi-dimensional space / Przemyslaw Klesk -- Adaptive simulation of separable dynamical systems in the neural network basis / Walery Rogoza -- Improvement of the processors operating ratio in task scheduling using the deadline method / Koichi Kashiwagi, Yoshinobu Higami and Shin-Ya Kobayashi.
Owning institution
  1. Columbia University Libraries
Bibliography (note)
  1. Includes bibliographical references and index.