IFIP TC6 Open Digital Library

11. CISIM 2012: Venice, Italy

Computer Information Systems and Industrial Management - 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012. Proceedings

Agostino Cortesi, Nabendu Chaki, Khalid Saeed, Slawomir T. Wierzchon

Springer, Lecture Notes in Computer Science 7564, ISBN: 978-3-642-33259-3


Invited Talks

Formalising Security in Ubiquitous and Cloud Scenarios.

Chiara Bodei, Pierpaolo Degano, Gian Luigi Ferrari, Letterio Galletta, Gianluca Mezzetti


Designing Smart Cities: Security Issues.

Young Im Cho


Security, Access Control and Intrusion Detection

Certificate-Based Encryption Scheme with General Access Structure.

Tomasz Hyla, Jerzy Pejas


Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks.

Ekawat Homsirikamol, Pawel Morawiecki, Marcin Rogawski, Marian Srebrny


Usage Control Model Specification in XACML Policy Language - XACML Policy Engine of UCON.

Um-e-Ghazia, Rahat Masood, Muhammad Awais Shibli, Muhammad Bilal


TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks.

Novarun Deb, Nabendu Chaki


Intruder Data Classification Using GM-SOM.

Petr Gajdos, Pavel Moravec


Method for Identification of Suitable Persons in Collaborators' Networks.

Pavla Drázdilová, Alisa Babskova, Jan Martinovic, Katerina Slaninová, Stepan Minks


A Graph-Based Formalism for Controlling Access to a Digital Library Ontology.

Subhasis Dasgupta, Aditya Bagchi


Role Approach in Access Control Development with the Usage Control Concept.

Aneta Poniszewska-Maranda


Pattern Recognition and Image Processing

A New Algorithm for Rotation Detection in Iris Pattern Recognition.

Krzysztof Misztal, Jacek Tabor, Khalid Saeed


Outlier Removal in 2D Leap Frog Algorithm.

Ryszard Kozera, Jacek Tchórzewski


Dynamic Signature Recognition Based on Modified Windows Technique.

Rafal Doroz, Krzysztof Wrobel


Rigid and Non-rigid Shape Matching for Mechanical Components Retrieval.

Andrea Albarelli, Filippo Bergamasco, Andrea Torsello


Embedding of the Extended Euclidean Distance into Pattern Recognition with Higher-Order Singular Value Decomposition of Prototype Tensors.

Boguslaw Cyganek


Biometric Applications

DTW and Voting-Based Lip Print Recognition System.

Piotr Porwik, Tomasz Orczyk


Advances in the Keystroke Dynamics: The Practical Impact of Database Quality.

Mariusz Rybnik, Piotr Panasiuk, Khalid Saeed, Marcin Rogowski


Advanced Intracardial Biosignal Processing.

Marek Penhaker, Petr Klimes, Jakub Pindor, David Korpas


Multi-constraints Face Detect-Track System.

Hazar Mliki, Mohamed Hammami, Hanêne Ben-Abdallah


Using a Differential Pressure Sensor as Spirometer.

Martin Augustynek, Ondrej Adamec, David Micanik


Algorithms and Data Management

Hybrid Negative Selection Approach for Anomaly Detection.

Andrzej Chmielewski, Slawomir T. Wierzchon


Spectral Clustering Based on k-Nearest Neighbor Graph.

Malgorzata Lucinska, Slawomir T. Wierzchon


A New Scale for Attribute Dependency in Large Database Systems.

Soumya Sen, Anjan Dutta 0002, Agostino Cortesi, Nabendu Chaki


Left-Right Oscillate Algorithm for Community Detection Used in E-Learning System.

Jan Martinovic, Pavla Drázdilová, Katerina Slaninová, Tomás Kocyan, Václav Snásel


Plan and Goal Structure Reconstruction: An Automated and Incremental Method Based on Observation of a Single Agent.

Bartlomiej Józef Dzienkowski, Urszula Markowska-Kaczmar


On Spectral Partitioning of Co-authorship Networks.

Václav Snásel, Pavel Krömer, Jan Platos, Milos Kudelka, Zdenek Horak


An Efficient Binary Playfair Algorithm Using a 4×4 Playfair Key Matrix.

Saswati Mukherjee, Matangini Chattopadhyay, Ayan Lahiri, Samiran Chattopadhyay


Tuning of a Knowledge-Driven Harmonization Model for Tonal Music.

Mariusz Rybnik, Wladyslaw Homenda


Efficient Processing the Braille Music Notation.

Tomasz Sitarek, Wladyslaw Homenda



ETSeM: A Energy-Aware, Trust-Based, Selective Multi-path Routing Protocol.

Manali Chakraborty, Nabendu Chaki


Weighted Energy Efficient Cluster Based Routing for Wireless Sensor Networks.

Soumyabrata Saha, Rituparna Chaki


System Models and Risk Assessment

A Business Process Modeling Notation Extension for Risk Handling.

Bartosz Marcinkowski, Michal Kuciapski


Modeling Consumer Decision Making Process with Triangular Norms.

Agnieszka Jastrzebska, Wladyslaw Homenda


Neural Network Modeling of a Flexible Manipulator Robot.

Rahma Boucetta, Mohamed Naceur Abdelkrim


P Systems for Traffic Flow Simulation.

Jiri Dvorský, Zbynek Janoska, Lukás Vojácek


Using Extended Raster File for Real Time Traffic Information Mining.

Michal Radecký, Jan Martinovic, Dusan Fedorcák, Radek Tomis, Ivo Vondrák


A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems.

Imed El Fray