Advertisement

© 2012

Computer Information Systems and Industrial Management

11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012. Proceedings

  • Agostino Cortesi
  • Nabendu Chaki
  • Khalid Saeed
  • Sławomir Wierzchoń
  • State-of-the-art research

  • Fast-track conference proceedings

  • Unique visibility

Conference proceedings CISIM 2012

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7564)

Table of contents

  1. Front Matter
  2. Invited Talks

    1. Chiara Bodei, Pierpaolo Degano, Gian-Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti
      Pages 1-29
    2. Young Im Cho
      Pages 30-40
  3. Security, Access Control and Intrusion Detection

    1. Ekawat Homsirikamol, Paweł Morawiecki, Marcin Rogawski, Marian Srebrny
      Pages 56-67
    2. Um-e-Ghazia, Rahat Masood, Muhammad Awais Shibli, Muhammad Bilal
      Pages 68-79
    3. Petr Gajdoš, Pavel Moravec
      Pages 92-100
    4. Pavla Dráždilová, Alisa Babskova, Jan Martinovič, Kateřina Slaninová, Štěpán Minks
      Pages 101-110
  4. Pattern Recognition and Image Processing

    1. Krzysztof Misztal, Jacek Tabor, Khalid Saeed
      Pages 135-145
    2. Ryszard Kozera, Jacek Tchórzewski
      Pages 146-157
    3. Rafal Doroz, Krzysztof Wrobel
      Pages 158-167
    4. Andrea Albarelli, Filippo Bergamasco, Andrea Torsello
      Pages 168-179
  5. Biometric Applications

    1. Piotr Porwik, Tomasz Orczyk
      Pages 191-202
    2. Mariusz Rybnik, Piotr Panasiuk, Khalid Saeed, Marcin Rogowski
      Pages 203-214
    3. Marek Penhaker, Petr Klimes, Jakub Pindor, David Korpas
      Pages 215-223
    4. Hazar Mliki, Mohamed Hammami, Hanêne Ben-Abdallah
      Pages 224-235

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Computer Information Systems and Industrial Management, CISIM 2012, held in Venice, Italy, in September 2012. The 35 revised full papers presented together with 2 keynote talks were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on security, access control and intrusion detection; pattern recognition and image processing; biometric applications; algorithms and data management; networking; and system models and risk assessment.

Keywords

agent system computer security knowledge processing neural networks query optimization

Editors and affiliations

  • Agostino Cortesi
    • 1
  • Nabendu Chaki
    • 2
  • Khalid Saeed
    • 3
  • Sławomir Wierzchoń
    • 4
  1. 1.DAISUniversity Ca’ Foscari of VeniceVeniceItaly
  2. 2.Department of Computer Science and EngineeringUniversity of CalcuttaKolkataIndia
  3. 3.Faculty of Physics and Applied Computer ScienceAGH University of Science and TechnologyCracowPoland
  4. 4.Department of Artificial IntelligencePolish Academy of SciencesWarsawPoland

Bibliographic information

Industry Sectors
Automotive
Biotechnology
IT & Software
Telecommunications
Consumer Packaged Goods
Pharma
Materials & Steel
Finance, Business & Banking
Electronics
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering