Limit search to available items
Book Cover
Book

Title Enhanced methods in computer security, biometric and artificial intelligence systems / edited by Jerzy Pejaþs, Andrzej Piegat
Published New York : Springer, 2004

Copies

Location Call no. Vol. Availability
 W'PONDS  005.8 Pie/Emi  AVAILABLE
Description xi, 394 pages : illustrations ; 24 cm
Contents Machine derived contents note: Inforrmation Technno laogy Security -- JAN USZ GORSKI -- How can we justify trust in software based systems? -- TuOMAZ HE BSZ, EUGENIUSZ KURL4 TA -- The capacity of ciphers fulfilling the accessibility of cryptograms 13 -- V BELETSKYY 1 BURAK -- Parlelation of the Data Encryption Standard (DES) algorithm ..23 -- WITOLD MACKOW -- Linked authenticated dictionaries for certificate status verification 35 -- ED EL FRAY JERZ PEJAS -- ntegrated Payment System for Public Key Infrastructure Services 47 -- JERZY PEJAS, IMED EL FRAY -- Some .methods of the analysis and risk assssment in the PKI system -- services providers 61 -- IGOR MARGASITNSK, KRZYSZTOF SZCZYPIORSKI -- VAST: Versatile Anonymous System for Web Users 71 -- BARTOSZ SKOL, N. YARMOLIK -- Cryptography and Steganography: teachng experien 83 -- MAREK ICKIE WICZ EUGENIUSZ KURIA TA -- Analysis of non-linear pseudo-noise sequences 9 -- JAiNSZ GORSK, ALEKSANDER JARZJ BOWICZ, -- RAFA LESZCZYNA, JAKUB MILER, MARCIAN OLSZEWSKI -- Tool support for detecting defects in object-oriented models 103 -- /ODZ/MIERZ CHOCIANOWICZ, JERZY PEJAS, ANDRZEJ RUCIASKJ -- The Proposal of Protocol for Electronic Signature Creation -- in Public Environment 13 -- KRZYZTOF CIIMIIELM -- On Arithmetic Subtraction Linear Approximation 25 -- . BERCZYNSK YYA. KRA VTSOK PEJS, D. SUROVYATKINA -- Secure Data Transmission via Modulation -- of the Chaotic Sequence Parameters 135 -- Biometric Systerms -- LEONID KOMPANETS -- Some Advances and Challenges in Live Biometrics, Personnel -- Management, and Other "Human Being" Applications 145 -- GEORGY KUKHARE V ADAM KUZMISKI -- An environment for recognition systems modeling 157 -- GEORGI KUKHAREV PAWEL MASICZ, PIOTR MASICZ -- Modified Gradient Method for Face Localization 165 -- ADAMNOWOSIELSKI -- Three stage face recognition algorithm for visitor identification system 177 -- KHALIDSA EED, MARCIN WERDONI -- A New Approach for Hand-Palm Recognition 185 -- KHALID SAEED PIOTR CHARKIEWICZ -- An Experimental Criterion for Face Classification 195 -- DARIUSZ FREJLICHOWSKI -- Contour Objects Recognition Based On UNL-ourier Descriptors 203 -- MA RIUSZ ORA WSKJ, PA WE FORCZMAJOISKI -- Sonar Image Simulation by Means of Ray Tracing and Image Processing 209 -- LIMING CHEN. GEORGY KUKHA REK TOMASZ PONIKOWSKI -- The PCA Reconstruction Based Approach for Extending Facial Image -- Databases for Face Recognition Systems 215 -- EDWARD POLROLNICZAK -- Investigation of fingerprint verification algorithm based -- on local centers method 22 -- LEONID KOMPANETS, MARIUSZ KUBANEK, SZYMON RYDZEK -- Czestochowa's Precise Model of a Face Based on the Facial Asymmetry, -- Ophthalmogeometry, and Brain Asymmetry Phenomena: -- the Idea and Algorithm Sketch 239 -- Chapter 3 -- Methods of Artificial Inte igence -- and Intelligent Agents -- CISELLA FACCHINETTI, ILDA MANNINO, -- GIOVANNI MASTROLEO, STEFANO SORIANI -- A fuzzy expert approach for comparing alternative end ses for -- requalification of contaminated sites 255 -- PAWEL BANAS -- Training assisting program with hybrid decision supporting system 267 -- ADAAM SZUSTALEWICZ -- Numerical problems with evaluating the fractal dimension of real data 273 -- ZBYIGN[EW PIE TRZYKO WSKJ -- Multi-stage ship control in a fuzzy environment 285 -- AN)DRZEJI PEGAi -- Informative value of the possibilistic extension principle 301 -- ROMAN SMIERZCIL4LSK! -- Inteligent M arine Control Systems 311 -- RE ER IZABELA -- How to deal with the data in a bankruptcy modelling 321 -- PIOTR LIPINSKI -- Dependency Mining in Large Sets of Stock Market Trading Rules 329 -- ANNA BARTKOWIAK, JOANNA ZDZIAREK, -- NIKI EVELPIDOU, ANDREAS VASSILOPOULOS -- Choosing representative data items: Kohonen, -- Neural Gas or Mixture Model?..l 337 -- MARCIN PLUCINSKI -- Applicaton of the Ant Colony Algorithm for the Path Planning 345 -- VICTOR MA MAEK DMITRYA, JUDI -- pplication of fizzy logic for track corrector formation -- into flight simulator 353 -- PRZEMYSLA W KLFSK -- Algorithm for Automatic Definition of Validated and Non-Validated -- Region i Multi-Dimensional Space 361 -- WALERY ROGOZA -- Adaptive simuation of separable dynamica systems in the neural -- netw ork basis 37 -- KOICHI KASHIWAGI YOSHINOBU HIGAMl, SHIN-YA KOBAYASHI -- huprovement of the processors operaing ratio in task scheduling using -- the deadline method 87
Bibliography Includes bibliographical references and index
Subject Computer security.
Biometric identification.
Artificial intelligence.
Author Piegat, Andrzej, 1947-
Pejaþs, Jerzy, 1954-
LC no. 2004059649
ISBN 1402077769 alkaline paper