Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Stasiak, A." wg kryterium: Autor


Wyświetlanie 1-3 z 3
Tytuł:
UML Simulation of a Topology Configuration Model
Autorzy:
Zieliński, Z.
Stasiak, A.
Dąbrowski, W.
Powiązania:
https://bibliotekanauki.pl/articles/307600.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
configuration topology
system modeling
UML model simulation
Opis:
The article presents the application of simulation methods for topological models to analyze and design information systems. By using UML extensions and the UAL language it is possible not only to build a topological model for software, but also to perform efficient simulations of topological models. Additionally, it is possible to take into account the restrictive conditions stored in UAL and OCL languages. To execute the simulation the authors used an simulator from IBM. These concepts and methods are illustrated by examples.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 4; 46-53
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Secured Workstation to Process the Data of Different Classification Levels
Autorzy:
Zieliński, Z.
Furtak, J.
Chudzikiewicz, J.
Stasiak, A.
Brudka, M.
Powiązania:
https://bibliotekanauki.pl/articles/309351.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cryptographic protection
multilevel security
software design
UML
virtualization
Opis:
The paper presents some of the results obtained within the ongoing project related with functional requirements and design models of secure workstation for special applications (SWSA). SWSA project is directed toward the combination of the existing hardware and software virtualization with cryptography and identification technologies to ensure the security of multilevel classified data by means of some formal methods. In the paper the requirements for SWSA, its hardware and software architecture, selected security solution for data processing and utilized approach to designing secure software are presented. The novel method for secure software design employs dedicated tools to verify the confidentiality and the integrity of data using Unified Modeling Language (UML) models. In general, the UML security models are embedded in and simulated with the system architecture models, thus the security problems in SWSA can be detected early during the software design. The application of UML topology models enables also to verify the fundamental requirement for MLS systems, namely the hardware isolation of subjects from different security domains.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 5-12
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Face Tracking and Recognition with the Use of Particle-Filtered Local Features
Autorzy:
Stasiak, Ł. A.
Pacut, A.
Powiązania:
https://bibliotekanauki.pl/articles/308537.pdf
Data publikacji:
2010
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
biometrics
face recognition
particle filtering
video analysis
Opis:
A consistent particle filtering-based framework for the purpose of parallel face tracking and recognition from video sequences is proposed. A novel approach to defining randomized, particle filtering-driven local face features for the purpose of recognition is proposed. The potential of cumulating classification decisions based on the proposed feature set definition is evaluated. By applying cumulation mechanisms to the classification results determined from single frames and with the use of particle-filtered features, good recognition rates are obtained at the minimal computational cost. The proposed framework can operate in real-time on a typical modern PC. Additionally, the application of cumulation mechanisms makes the framework resistant to brief visual distortions, such as occlusions, head rotations or face expressions. A high performance is also obtained on low resolution images (video frames). Since the framework is based on the particle filtering principle, it is easily tunable to various application requirements (security level, hardware constraints).
Źródło:
Journal of Telecommunications and Information Technology; 2010, 4; 26-36
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-3 z 3

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies