Accepted Papers

  • Jerzy Pejaś and Tomasz Hyla: Certificate-Based Encryption Scheme with General Access Structure
  • Imed El Fray: A comparative study of risk assessment methods, MEHARI & CRAMM with a new formal model of risk assessment (FoMRA) in Information Systems
  • Pawel Morawiecki, Marian Srebrny, Ekawat Homsirikamol and Marcin Rogawski: Security margin evaluation of SHA-3 contest finalists through SAT-based attacks
  • Rahma Boucetta and Mohamed Naceur Abdelkrim: Neural Network Modeling of a Flexible Manipulator Robot
  • Krzysztof Misztal, Jacek Tabor and Khalid Saeed: A new algorithm for rotation detection in iris pattern recognition
  • Ryszard Kozera and Jacek Tchorzewski: Outlier Removal in 2D Leap Frog Algorithm
  • Piotr Porwik and Tomasz Orczyk: DTW and voting-based lip print recognition system
  • Rafal Doroz and Krzysztof Wrobel: Dynamic Signature Recognition Based on Modified Windows Technique
  • Andrzej Chmielewski and Sławomir T. Wierzchoń: Hybrid Negative Selection Approach for Anomaly Detection
  • Ume Ghazia, Awais Shibli, Rahat Masood and Muhammad Bilal: USAGE CONTROL MODEL SPECIFICATION IN XACML
  • Małgorzata Lucińska and Sławomir Wierzchoń: Spectral clustering based on k-nearest neighbor graph
  • Novarun Deb and Nabendu Chaki: TIDS: Trust-based Intrusion Detection System for Wireless Ad-hoc Networks
  • Manali Chakraborty and Nabendu Chaki: ETSeM: A Energy-aware, Trust-based, Selective Multi-path Routing Protocol
  • Pavel Moravec and Petr Gajdos: Intruder Data Classification using GM-SOM
  • Agnieszka Jastrzebska and Wladyslaw Homenda: Modeling Consumer Decision Making Process Using Triangular Norms
  • Soumyabrata Saha and Rituparna Chaki: Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks
  • Pavla Drazdilova, Alisa Babskova, Jan Martinovic, Katerina Slaninova and Stepan Minks: Method for Identification of Suitable Persons in Collaborators’ Networks
  • Soumya Sen, Anjan Dutta, Agostino Cortesi and Nabendu Chaki: A New Scale for Attribute Dependency in Large Database Systems
  • Subhasis Dasgupta and Aditya Bagchi: A Graph-Based Formalism for Controlling Access to a Digital Library Ontology
  • Katerina Slaninova, Jan Martinovic, Tomáš Kocyan, Pavla Drazdilova and Vaclav Snasel: Left-Right Oscillate Algorithm for Community Detection used in E-learning system
  • Bartłomiej Dzieńkowski and Urszula Markowska-Kaczmar: Plan and goal structure reconstruction: an automated and incremental method based on observation of a single agent
  • Andrea Albarelli, Filippo Bergamasco and Andrea Torsello: Rigid and Non-rigid Shape Matching for Mechanical Components Retrieval
  • Vaclav Snasel, Pavel Kromer, Jan Platos, Milos Kudelka and Zdenek Horak: On Spectral Partitioning of Co-authorship Networks
  • Aneta Poniszewska-Maranda: Role approach in access control development with the usage control concept
  • Jiri Dvorsky, Zbynek Janoska and Lukas Vojacek: P systems for traffic flow simulation
  • Aida Saeed-Bagińska and Romuald Mosdorf: Network traffic anomaly detection of TCP and UDP protocols based on recurrence plot windowing method
  • Mariusz Rybnik and Wladyslaw Homenda: Tuning of a Knowledge-driven Harmonization Model for Tonal Music
  • Tomasz Sitarek and Wladyslaw Homenda: Effcient Processing the Music Notation
  • Michal Radecky, Jan Martinovic, Dusan Fedorcak, Radek Tomis and Ivo Vondrák: Using Extended Raster File for Real Time Traffic Information Mining
  • Bartosz Marcinkowski and Michal Kuciapski: A Business Process Modeling Notation Extension for Risk Handling
  • Marek Penhaker and Vladimir Kasik: Cloud Computing Environments for Biomedical Data Services
  • Saswati Mukherjee, Ayan Lahiri, Samiran Chattopadhyay and Matangini Chattopadhyay: An Efficient Binary Playfair Algorithm using a 4×4 Playfair Key Matrix
  • Marek Penhaker, Petr Klimes and Jakub Pindor: Advanced Intracardial Biosignal Processing
  • Hazar Mliki, Mohamed Hammami and Hanêne Ben-Abdallah: Multi-constraints face detect-track system
  • Martin Augustynek, Ondrej Adamec and David Micanik: Using different pressure sensor as spirometers
  • Bogusław Cyganek: Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors
  • Mariusz Rybnik, Piotr Panasiuk and Khalid Saeed: Advances in the Keystroke Dynamics: the Practical Impact of Database Quality