Marek R. Ogiela

According to our database1, Marek R. Ogiela authored at least 213 papers between 1998 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Towards cognitive service management and semantic information sharing in the Cloud.
Multimedia Tools Appl., 2018

Averaging of motion capture recordings for movements' templates generation.
Multimedia Tools Appl., 2018

Cognitive cryptography techniques for intelligent information management.
Int J. Information Management, 2018

Bio-inspired and cognitive approaches in cryptography and security applications.
Concurrency and Computation: Practice and Experience, 2018

Intelligent approaches for security technologies.
Concurrency and Computation: Practice and Experience, 2018

Cognitive and Biometric Approaches to Secure Services Management in Cloud-Based Technologies.
IEEE Cloud Computing, 2018

Cognitive systems and operations research in big data and cloud computing.
Annals OR, 2018

Human actions recognition from motion capture recordings using signal resampling and pattern recognition methods.
Annals OR, 2018

Cognitive Informatics Approaches for Data Sharing and Management in Cloud Computing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

How Repetitive are Karate Kicks Performed by Skilled Practitioners?
Proceedings of the 2018 10th International Conference on Computer and Automation Engineering, 2018

Behavioral Security in Cloud and Fog Computing.
Proceedings of the Advances in Internet, 2018

Comparison of Selected Homomorphic Encryption Techniques.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Cognitive Cryptography in Advanced Data Security.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Security of Distributed Ledger Solutions Based on Blockchain Technologies.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Insider Threats and Cryptographic Techniques in Secure Information Management.
IEEE Systems Journal, 2017

Human Actions Analysis: Templates Generation, Matching and Visualization Applied to Motion Capture of Highly-Skilled Karate Athletes.
Sensors, 2017

Optimization and Security Issues for Next Generation Networks - Editorial.
J. Comput. Syst. Sci., 2017

Impact of ubiquitous computing technologies for modern information management.
Int J. Information Management, 2017

New paradigms for information and services management in grid and pervasive computing.
Future Generation Comp. Syst., 2017

Clustering of trending topics in microblogging posts: A graph-based approach.
Future Generation Comp. Syst., 2017

Advanced human motion analysis and visualization: Comparison of mawashi-geri kick of two elite karate athletes.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

The open online repository of karate motion capture data: A tool for scientists and sport educators.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Averaging Three-Dimensional Time-Varying Sequences of Rotations: Application to Preprocessing of Motion Capture Data.
Proceedings of the Image Analysis - 20th Scandinavian Conference, 2017

Behavioral Keys in Cryptography and Security Systems.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2017

Biometric Traits in Multi-secret Digital Steganography.
Proceedings of the New Trends in Image Analysis and Processing - ICIAP 2017, 2017

Personal Data in Cyber Systems Security.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

Application of Cognitive Cryptography in Fog and Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Safety and Standardization of Data Sharing Techniques and Protocols for Management of Strategic Data.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Cognitive Keys in Personalized Cryptography.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Special issue on natural and secure computing in modern soft computing application.
Soft Comput., 2016

Heuristic approach for computer-aided lesion detection in mammograms.
Soft Comput., 2016

Human actions recognition on multimedia hardware using angle-based and coordinate-based features and multivariate continuous hidden Markov model classifier.
Multimedia Tools Appl., 2016

Digital images authentication scheme based on bimodal biometric watermarking in an independent domain.
J. Visual Communication and Image Representation, 2016

The adaptation of GDL motion recognition system to sport and rehabilitation techniques analysis.
J. Medical Systems, 2016

Innovative security technologies against insider threats and data leakage.
Int. J. Comput. Math., 2016

Knowledge Management Approaches for Data Understanding.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Data Understanding Techniques for Management Application and Cryptography.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Efficiency of Strategic Data Sharing and Management Protocols.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Rule-Based Action Recognition: Performance Comparison between Lua and GDL Script Language.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Initial proposition of kinematics model for selected karate actions analysis.
Proceedings of the Ninth International Conference on Machine Vision, 2016

Data-driven approach to human motion modeling with Lua and gesture description language.
Proceedings of the Ninth International Conference on Machine Vision, 2016

Clusters of Trends Detection in Microblogging: Simple Natural Language Processing vs Hashtags - Which is More Informative?
Proceedings of the 10th International Conference on Complex, 2016

Comparison of Biometric and Linguistic Secret Sharing Protocols.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Concealing Additional Secrets Using Sharing Approach in Steganography.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Bio-Inspired Cryptographic Techniques in Information Management Applications.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

On Using Cognitive Models in Cryptography.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

A Novel Approach to Geocaching Event Prognosis Using Spatiotemporal Data.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Application of Personalized Cryptography in Cloud Environment.
Proceedings of the Advances on P2P, 2016

2015
Natural User Interfaces in Medical Image Analysis - Cognitive Analysis of Brain and Carotid Artery Images
Advances in Computer Vision and Pattern Recognition, Springer, ISBN: 978-3-319-07800-7, 2015

Application of Assistive Computer Vision Methods to Oyama Karate Techniques Recognition.
Symmetry, 2015

Intelligent technologies and applications for big data analytics.
Softw., Pract. Exper., 2015

False and multi-secret steganography in digital images.
Soft Comput., 2015

Biometric watermarks based on face recognition methods for authentication of digital images.
Security and Communication Networks, 2015

Secure ubiquitous computing.
Pervasive and Mobile Computing, 2015

Full body movements recognition - unsupervised learning approach with heuristic R-GDL method.
Digital Signal Processing, 2015

Personalized Cryptography in Data Sharing and Management.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Effectiveness Comparison of Kinect and Kinect 2 for Recognition of Oyama Karate Techniques.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Application of Neural Network for Human Actions Recognition.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

On Using Palm and Finger Movements as a Gesture-Based Biometrics.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Comparison of Cognitive Information Systems Supporting Management Tasks.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Biometric Methods for Advanced Strategic Data Sharing Protocols.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Efficiency of Cognitive Information Systems Supporting Enterprise Management Tasks.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Qualitative Evaluation of Full Body Movements with Gesture Description Language.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

The Touchless Person Authentication Using Gesture-Types Emulation of Handwritten Signature Templates.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Semantic Data Analysis Algorithms Supporting Decision-Making Processes.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Fuzzy Vault Schemes in Multi-secret Digital Steganography.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Human Actions Modelling and Recognition in Low-Dimensional Feature Space.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Usability of the Fuzzy Vault Scheme Applied to Predetermined Palm-Based Gestures as a Secure Behavioral Lock.
Proceedings of the 10th International Conference on P2P, 2015

Bio-inspired Algorithms in Data Management Processes.
Proceedings of the 10th International Conference on P2P, 2015

Learning from Annotated Video: An Initial Study Based on Oyama Karate Tournament Recordings.
Proceedings of the 10th International Conference on P2P, 2015

2014
Protocol for irreversible off-line transactions in anonymous electronic currency exchange.
Soft Comput., 2014

Soft computing for security services in smart and ubiquitous environments.
Soft Comput., 2014

Rule-based approach to recognizing human body poses and gestures in real time.
Multimedia Syst., 2014

Advanced technologies for homeland defense and security.
J. Network and Computer Applications, 2014

Cognitive systems and bio-inspired computing in homeland security.
J. Network and Computer Applications, 2014

Towards Cognitive Cryptography.
J. Internet Serv. Inf. Secur., 2014

Application of centerline detection and deformable contours algorithms to segmenting the carotid lumen.
J. Electronic Imaging, 2014

Cognitive systems for intelligent business information management in cognitive economy.
Int J. Information Management, 2014

Innovative Internet services and bio-inspired technologies in information management.
Int J. Information Management, 2014

Advance in Safe and Useful Social Network Services with Context-Sensitive Data in Cyber-Physical System.
IJDSN, 2014

Improved Cryptographic protocol for digital coin exchange.
Proceedings of the 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), 2014

Cognitive information systems in secure information management and personalized cryptography.
Proceedings of the 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), 2014

Security and Privacy in Distributed Information Management.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Data Mining and Semantic Inference in Cognitive Systems.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Cryptographic Techniques in Advanced Information Management.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Cognitive Management Systems.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Unsupervised Learning of GDL Classifier.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Advanced Techniques for Computer Sharing and Management of Strategic Data.
Proceedings of the Information and Communication Technology, 2014

Protocol for Detection of Counterfeit Transactions in Electronic Currency Exchange.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

Crypto-Biometric Models for Information Secrecy.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

Linguistic Approach to Modeling of Coronary Arteries in Semantic Techniques of Image Retrieval.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Intelligent Bio-inspired Approach for Secrecy Management in the Cloud.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Computer-Aided Enterprise Management.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Recognition of Body Movements Patterns for Immersive Virtual Reality System Interface.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Secure Information Management Using Linguistic Threshold Approach.
Advanced Information and Knowledge Processing, Springer, ISBN: 978-1-4471-5015-2, 2014

2013
Cognitive analysis system for description and recognition of pathological changes in coronary arteries structure.
Mathematical and Computer Modelling, 2013

Special Issue on "Advances in mobile, ubiquitous and cognitive computing".
Mathematical and Computer Modelling, 2013

Automatic segmentation of the carotid artery bifurcation region with a region-growing approach.
J. Electronic Imaging, 2013

Mobile and internet services in ubiquitous and pervasive computing environments.
Inf. Sci., 2013

Modern cognitive and ubiquitous computing.
Neurocomputing, 2013

Application of neural networks in detection of abnormal brain perfusion regions.
Neurocomputing, 2013

Cognitive and secure computing in Information Management.
Int J. Information Management, 2013

Real-Time Recognition of Selected Karate Techniques Using GDL Approach.
Proceedings of the Image Processing and Communications Challenges 5, 2013

Cognitive Information Systems in Ubiquitous Computing.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Dependence of Kinect sensors number and position on gestures recognition with Gesture Description Language semantic classifier.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

Information Splitting Using Crypto-biometrics Approach.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Matrix-Based Hierarchical Graph Matching in Off-Line Handwritten Signatures Recognition.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013

Intelligent UBMSS Systems for Strategic Information Management.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

Computer Karate Trainer in Tasks of Personal and Homeland Security Defense.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Recent Advances in Pattern Classification.
Proceedings of the Computational Intelligence Paradigms in Advanced Pattern Classification, 2012

Advances in Cognitive Information Systems.
Cognitive Systems Monographs 17, Springer, ISBN: 978-3-642-25246-4, 2012

Security issues on digital watermarking algorithms.
Annales UMCS, Informatica, 2012

Defending against insider threats and internal data leakage.
Security and Communication Networks, 2012

Strategic Information Splitting Using Biometric Patterns.
J. Internet Serv. Inf. Secur., 2012

Personal Identification Based on Cognitive Analysis of Selected Medical Visualization.
J. Internet Serv. Inf. Secur., 2012

Framework for cognitive analysis of dynamic perfusion computed tomography with visualization of large volumetric data.
J. Electronic Imaging, 2012

DNA-like linguistic secret sharing for strategic information systems.
Int J. Information Management, 2012

Towards context, cognitive, and secure computing.
Computers & Mathematics with Applications, 2012

Linguistic protocols for secure information management and sharing.
Computers & Mathematics with Applications, 2012

Visualization of perfusion abnormalities with GPU-based volume rendering.
Computers & Graphics, 2012

Data Analysis Systems and Cognitive Modelling Processes.
Proceedings of the Agent and Multi-Agent Systems. Technologies and Applications, 2012

Data Aggregation Techniques in Heart Vessel Modelling and Recognition of Pathological Changes.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Random Graph Languages for Distorted and Ambiguous Patterns: Single Layer Model.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Cognitive Analysis Systems for 3D Image Data Interpretation.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Neural Network Approach for Identification of Selected Brain Perfusion Abnormalities.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Secure Information Sharing Using Personal Biometric Characteristics.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

Visual Image Biometric Identification in Secure Urban Computing.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

Semantic Description and Recognition of Human Body Poses and Movement Sequences with Gesture Description Language.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

Medical Visualizations in Secure Bio Computing.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Segmentation and Visualization of Tubular Structures in Computed Tomography Angiography.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

Semantic Techniques of Image Retrieval - The Example of a Structural Analysis of Coronary Arteries.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges Algorithm.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
Hierarchical Graph-Grammar Model for Secure and Efficient Handwritten Signatures Classification.
J. UCS, 2011

Intelligent image content semantic description for cardiac 3D visualisations.
Eng. Appl. of AI, 2011

A system for detecting and describing pathological changes using dynamic perfusion computer tomography brain maps.
Comp. in Bio. and Med., 2011

Towards New Classes of Intelligent Cognitive Information Systems for Semantic Pattern Classification.
Computing and Informatics, 2011

Computer-aided Intelligent Diagnostics of Dynamic Perfusion CT Maps.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

Image Based Crypto-biometric Key Generation.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Semantic Analysis Processes in UBIAS Systems for Cognitive Data Interpretation.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Secure Information Management Protocol Based on Linguistic Sharing Techniques.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Intelligent Image Content Description and Analysis for 3D Visualizations of Coronary Vessels.
Proceedings of the Intelligent Information and Database Systems, 2011

Intelligent Information System for Interpretation of Dynamic Perfusion Brain Maps.
Proceedings of the Intelligent Information and Database Systems, 2011

Augmented Reality Approaches in Intelligent Health Technologies and Brain Lesion Detection.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Automatic Detection and Lesion Description in Cerebral Blood Flow and Cerebral Blood Volume Perfusion Maps.
Signal Processing Systems, 2010

Discretization as the enabling technique for the Naïve Bayes and semi-Naïve Bayes-based classification.
Knowledge Eng. Review, 2010

The use of mathematical linguistic methods in creating secret sharing threshold algorithms.
Computers & Mathematics with Applications, 2010

Pattern Recognition Methods in Analisys of Selected Neurodengerative Lesions.
Bio-Algorithms and Med-Systems, 2010

Ubiquitous Computing in Creation of Cognitive Systems for Medical Images Interpretation.
Proceedings of the Ubiquitous Computing and Multimedia Applications, 2010

Grammar Encoding in DNA-Like Secret Sharing Infrastructure.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Augmented Reality Interface for Visualization of Volumetric Medical Data.
Proceedings of the Image Processing and Communications Challenges 2, 2010

Cognitive Informatics for New Classes of Economic and Financial Information Systems.
Proceedings of the Advances in Software Engineering, 2010

Towards New Classes of Cognitive Vision Systems.
Proceedings of the CISIS 2010, 2010

Cognitive approach to bio-inspired medical image understanding.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2009
Cognitive Techniques in Visual Data Interpretation
Studies in Computational Intelligence 228, Springer, ISBN: 978-3-642-02692-8, 2009

Effective Filtration Techniques for Gallbladder Ultrasound Images with Variable Contrast.
Signal Processing Systems, 2009

Mathematical Linguistics in Cognitive Medical Image Interpretation Systems.
Journal of Mathematical Imaging and Vision, 2009

New approach to gallbladder ultrasonic images analysis and lesions recognition.
Comp. Med. Imag. and Graph., 2009

Notes on a Linguistic Description as the Basis for Automatic Image Understanding.
Applied Mathematics and Computer Science, 2009

Image Content Analysis for Cardiac 3D Visualizations.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009

UBIAS - Type Cognitive Systems for Medical Pattern Interpretation.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009

UBIAS Systems supporting interpretation of radiological images.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

Security of Linguistic Threshold Schemes in Multimedia Systems.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

Secret Sharing Protocol for Linguistic Threshold Schemes.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Automatic Information Processing and Understanding in Cognitive Business Systems.
Proceedings of the ICEIS 2009, 2009

Secure Information Splitting Using Grammar Schemes.
Proceedings of the New Challenges in Computational Collective Intelligence [selected papers from the 1st International Conference on Collective Intelligence, 2009

Shadow Generation Protocol in Linguistic Threshold Schemes.
Proceedings of the Security Technology, 2009

2008
Modern Computational Intelligence Methods for the Interpretation of Medical Images.
Studies in Computational Intelligence 84, Springer, ISBN: 978-3-540-75399-5, 2008

The automatic understanding approach to systems analysis and design.
Int J. Information Management, 2008

Cognitive techniques in medical information systems.
Comp. in Bio. and Med., 2008

Cognitive Modeling in Medical Pattern Semantic Understanding.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Medical pattern understanding based on cognitive linguistic formalisms and computational intelligence methods.
Proceedings of the International Joint Conference on Neural Networks, 2008

Comparative Analysis of the Impact of Discretization on the Classification with Naïve Bayes and Semi-Naïve Bayes Classifiers.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

Linguistic Approach to Cryptographic Data Sharing.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Cognitive Approach to Medical Pattern Recognition, Structure Modelling and Image Understanding.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

AI-Cognitive Description in Visual Medical Pattern Mining and Retrieval.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2007
Graph-Based Semantic Description in Medical Knowledge Representation and 3D Coronary Vessels Recognition.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Automatic Segmentation of Neoplastic Hepatic Disease Symptoms in CT Images.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

Automatic Segmentation of Single and Multiple Neoplastic Hepatic Lesions in CT Images.
Proceedings of the Nature Inspired Problem-Solving Methods in Knowledge Engineering, 2007

Cognitive Computing in Analysis of 2D/3D Medical Images.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Graph-based semantic description and information extraction in analysis of 3D coronary vessels visualizations.
Proceedings of the Advances in Intelligent and Distributed Computing, 2007

Why Automatic Understanding?
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

A New Approach to the Computer Support of Strategic Decision Making in Enterprises by Means of a New Class of Understanding Based Management Support Systems.
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007

Cognitive Informatics in Automatic Pattern Understanding.
Proceedings of the Six IEEE International Conference on Cognitive Informatics, 2007

2006
Image languages in intelligent radiological palm diagnostics.
Pattern Recognition, 2006

Graph image language techniques supporting radiological, hand image interpretations.
Computer Vision and Image Understanding, 2006

Automatic Image Understanding a New Paradigm for Intelligent Medical Image Analysis.
Bio-Algorithms and Med-Systems, 2006

Picture grammars in 3D modeling of medical structures.
Bio-Algorithms and Med-Systems, 2006

Application of graph grammars for syntactic description of coronary arteries spatial structures.
Bio-Algorithms and Med-Systems, 2006

Cognitive Approach to Visual Data Interpretation in Medical Information and Recognition Systems.
Proceedings of the Advances in Machine Vision, 2006

Graph-Based Structural Data Mining in Cognitive Pattern Interpretation.
Proceedings of the Grammatical Inference: Algorithms and Applications, 2006

Cognitive Analysis Techniques in Business Planning and Decision Support Systems.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

Cognitive Analysis in Diagnostic DSS-Type IT Systems.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

2005
Nonlinear processing and semantic content analysis in medical imaging-a cognitive approach.
IEEE Trans. Instrumentation and Measurement, 2005

Picture Languages in Medical Pattern Knowledge Representation and Understanding.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005

New Proposition for Intelligent Systems Design: Artificial Understanding of the Images as the Next Step of Advanced Data Analysis after Automatic Classification and Pattern Recognition.
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005

Intelligent Semantic Information Retrieval in Medical Pattern Cognitive Analysis.
Proceedings of the Computational Science and Its Applications, 2005

2004
Medical Image Understanding Technology - Artificial Intelligence and Soft-Computing for Image Understanding
Studies in Fuzziness and Soft Computing 156, Springer, ISBN: 978-3-642-53578-9, 2004

Picture Languages in Intelligent Retrieval of Visual Data Semantic Information.
Proceedings of the Practical Aspects of Knowledge Management, 5th International Conference, 2004

Picture Languages in Cognitive Approach to Medical Visualization Understanding.
Proceedings of the Intelligent Information Processing and Web Mining, 2004

Cognitive Reasoning in Intelligent Medical Information Systems - Visual Data Perception Algorithms in Medical Decision support Systems.
Proceedings of the ICEIS 2004, 2004

The New Concept in Computer Vision: Automatic Understanding of the Images.
Proceedings of the Artificial Intelligence and Soft Computing, 2004

2003
Artificial intelligence structural imaging techniques in visual pattern analysis and medical data understanding.
Pattern Recognition, 2003

Cognitive Vision Systems in Medical Applications.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003

Visual signal processing and image understanding in biomedical systems.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Content-Based Reasoning in Intelligent Medical Information Systems.
Proceedings of the ICEIS 2003, 2003

Artificial Intelligence Techniques in Retrieval of Visual Data Semantic Information.
Proceedings of the Web Intelligence, 2003

2002
Syntactic reasoning and pattern recognition for analysis of coronary artery images.
Artificial Intelligence in Medicine, 2002

2001
Image Understanding Methods in Biomedical Informatics and Digital Imaging.
Journal of Biomedical Informatics, 2001

Knowledge discovery approach to automated cardiac SPECT diagnosis.
Artificial Intelligence in Medicine, 2001

Semantic-Oriented Syntactic Algorithms For Content Recognition And Understanding Of Images In Medical Databases.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001

Automatic understanding of selected diseases on the basis of structural analysis of medical images.
Proceedings of the IEEE International Conference on Acoustics, 2001

2000
Application of syntactic methods of pattern recognition for data mining and knowledge discovery in medicine.
Proceedings of the Data Mining and Knowledge Discovery: Theory, 2000

1998
Languages of shape feature description and syntactic methods for recognition of morphological changes in organs in analysis of selected x-ray images.
Proceedings of the Medical Imaging 1998: Image Processing, 1998


  Loading...