Michal Choras
Orcid: 0000-0003-1405-9911Affiliations:
- University of Science and Technology (UTP), Bydgoszcz, Poland
According to our database1,
Michal Choras
authored at least 242 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
The survey on the dual nature of xAI challenges in intrusion detection and their potential for AI innovation.
Artif. Intell. Rev., December, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
When explainability turns into a threat - using xAI to fool a fake news detection method.
Comput. Secur., February, 2024
AI vs linguistic-based human judgement: Bridging the gap in pursuit of truth for fake news detection.
Inf. Sci., 2024
Evaluating the necessity of the multiple metrics for assessing explainable AI: A critical examination.
Neurocomputing, 2024
Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity.
Neurocomputing, 2024
Towards explainable fake news detection and automated content credibility assessment: Polish internet and digital media use-case.
Neurocomputing, 2024
Evidence-Based Quality-Aware Agile Software Development Process: Design and Evaluation.
IEEE Access, 2024
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024
Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems.
Proceedings of the Computational Science and Its Applications - ICCSA 2024 Workshops, 2024
From Detection Through Display to Understanding: Bridging AI and UI in Disinformation and Fake News Analysis.
Proceedings of the Advances in Computational Collective Intelligence, 2024
Proceedings of the Advances in Computational Collective Intelligence, 2024
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Proceedings of the Second International Conference on Advances in Computing Research, 2024
A Novel Approach to the Use of Explainability to Mine Network Intrusion Detection Rules.
Proceedings of the Intelligent Information and Database Systems - 16th Asian Conference, 2024
Proceedings of the Intelligent Information and Database Systems - 16th Asian Conference, 2024
Involving Society to Protect Society from Fake News and Disinformation: Crowdsourced Datasets and Text Reliability Assessment.
Proceedings of the Intelligent Information and Database Systems - 16th Asian Conference, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Sensors, December, 2023
The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT.
Neurocomputing, September, 2023
First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions.
Pers. Ubiquitous Comput., April, 2023
<i>Alphabet Flatting</i> as a variant of n-gram feature extraction method in ensemble classification of fake news.
Eng. Appl. Artif. Intell., April, 2023
The Application of Deep Learning Imputation and Other Advanced Methods for Handling Missing Values in Network Intrusion Detection.
Vietnam. J. Comput. Sci., February, 2023
Has the pandemic made us more digitally literate?: Innovative association rule mining study of the relationships between shifts in digital skills and cybersecurity awareness occurring whilst working remotely during the COVID-19 pandemic.
J. Ambient Intell. Humaniz. Comput., 2023
What Will the Future of Cybersecurity Bring Us, and Will It Be Ethical? The Hunt for the Black Swans of Cybersecurity Ethics.
IEEE Access, 2023
Proceedings of the Research and Innovation Forum 2023 - Navigating Shocks and Crises in Uncertain Times, 2023
The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
Improving Siamese Neural Networks with Border Extraction Sampling for the use in Real-Time Network Intrusion Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023
The Need for Practical Legal and Ethical Guidelines for Explainable AI-based Network Intrusion Detection Systems.
Proceedings of the IEEE International Conference on Data Mining, 2023
Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach.
Proceedings of the Applied Intelligence - First International Conference, 2023
The Rise of AI-Powered Writing: How ChatGPT is Revolutionizing Scientific Communication for Better or for Worse.
Proceedings of the Applied Intelligence - First International Conference, 2023
Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Proceedings of the 24th International Conference on Control Systems and Computer Science, 2023
Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems.
Proceedings of the Progress on Pattern Classification, Image Processing and Communications, 2023
Proceedings of the Progress on Pattern Classification, Image Processing and Communications, 2023
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023
Analysis of Extractive Text Summarization Methods as a Binary Classification Problem.
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023
How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes.
Proceedings of the Computer Information Systems and Industrial Management, 2023
Proceedings of the 29th Americas Conference on Information Systems, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Sensors, 2022
Implementation of the BERT-derived architectures to tackle disinformation challenges.
Neural Comput. Appl., 2022
J. Univers. Comput. Sci., 2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Technical solution to counter potential crime: Text analysis to detect fake news and disinformation.
J. Comput. Sci., 2022
How Machine Learning May Prevent the Breakdown of Democracy by Contributing to Fake News Detection.
IT Prof., 2022
A survey on neural networks for (cyber-) security and (cyber-) security of neural networks.
Neurocomputing, 2022
Log. J. IGPL, 2022
Log. J. IGPL, 2022
The double-edged sword of AI: Ethical Adversarial Attacks to counter artificial intelligence for crime.
AI Ethics, 2022
Fake News and Threats to IoT - The Crucial Aspects of Cyberspace in the Times of Cyberwar.
Proceedings of the Research and Innovation Forum 2022: Rupture, 2022
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022
The IoT Threat Landscape vs. Machine Learning, a.k.a. Who Attacks IoT, Why Do They Do It, and How to Prevent It?
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022
Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation.
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022
Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment.
Proceedings of the Intelligent Computing Methodologies - 18th International Conference, 2022
Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques.
Proceedings of the Artificial Intelligence and Soft Computing, 2022
Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022
Fast Hybrid Oracle-Explainer Approach to Explainability Using Optimized Search of Comprehensible Decision Trees.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022
Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good.
Pers. Ubiquitous Comput., 2021
A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment.
Pattern Anal. Appl., 2021
Multim. Tools Appl., 2021
Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Intelligent operator: Machine learning based decision support and explainer for human operators and service providers in the fog, cloud and edge networks.
J. Inf. Secur. Appl., 2021
Neurocomputing, 2021
Strategies to manage quality requirements in agile software development: a multiple case study.
Empir. Softw. Eng., 2021
Entropy, 2021
Who Will Score? A Machine Learning Approach to Supporting Football Team Building and Transfers.
Entropy, 2021
Editorial: Applying Machine Learning for Combating Fake News and Internet/Media Content Manipulation.
Appl. Soft Comput., 2021
Advanced Machine Learning techniques for fake news (online disinformation) detection: A systematic mapping study.
Appl. Soft Comput., 2021
IEEE Access, 2021
Proceedings of the Intelligent Computing Theories and Application, 2021
The Proposition of Balanced and Explainable Surrogate Method for Network Intrusion Detection in Streamed Real Difficult Data.
Proceedings of the Advances in Computational Collective Intelligence, 2021
Proceedings of the Computational Science - ICCS 2021, 2021
Proceedings of the Computational Science - ICCS 2021, 2021
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021
Using Machine Learning to Detect the Signs of Radicalization and Hate Speech on Twitter.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021
Proceedings of the Computer Information Systems and Industrial Management, 2021
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021
Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Common Representational Model and Ontologies for Effective Law Enforcement Solutions.
Vietnam. J. Comput. Sci., 2020
IEEE Technol. Soc. Mag., 2020
Data-driven and tool-supported elicitation of quality requirements in agile companies.
Softw. Qual. J., 2020
Sensors, 2020
J. Univers. Comput. Sci., 2020
J. Univers. Comput. Sci., 2020
J. Intell. Fuzzy Syst., 2020
Future Gener. Comput. Syst., 2020
Measuring and Improving Agile Processes in a Small-Size Software Development Company.
IEEE Access, 2020
Proceedings of the Product-Focused Software Process Improvement, 2020
Achieving Explainability of Intrusion Detection System by Hybrid Oracle-Explainer Approach.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Computational Science - ICCS 2020, 2020
Proceedings of the Computational Science - ICCS 2020, 2020
Machine Learning - The Results Are Not the only Thing that Matters! What About Security, Explainability and Fairness?
Proceedings of the Computational Science - ICCS 2020, 2020
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Real-time stream processing tool for detecting suspicious network patterns using machine learning.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Mob. Inf. Syst., 2019
J. Univers. Comput. Sci., 2019
J. Univers. Comput. Sci., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Log. J. IGPL, 2019
Increasing product owners' cognition and decision-making capabilities by data analysis approach.
Cogn. Technol. Work., 2019
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection.
Complex., 2019
Clust. Comput., 2019
Continuously Assessing and Improving Software Quality With Software Analytics Tools: A Case Study.
IEEE Access, 2019
Proceedings of the Quality of Information and Communications Technology, 2019
Proceedings of the Image Processing and Communications, 2019
Proceedings of the Image Processing and Communications, 2019
Proceedings of the 17th International Conference on High Performance Computing & Simulation, 2019
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019
The Feasibility of Deep Learning Use for Adversarial Model Extraction in the Cybersecurity Domain.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019
Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection.
Proceedings of the Intelligent Computing Theories and Application, 2019
The Identification and Creation of Ontologies for the Use in Law Enforcement AI Solutions - MAGNETO Platform Use Case.
Proceedings of the Computational Collective Intelligence - 11th International Conference, 2019
Proceedings of the Computational Science - ICCS 2019, 2019
Fault-Prone Software Classes Recognition via Artificial Neural Network with Granular Dataset Balancing.
Proceedings of the Progress in Computer Recognition Systems, 2019
Proceedings of the Computer Information Systems and Industrial Management, 2019
Proceedings of the Computer Information Systems and Industrial Management, 2019
Proceedings of the Computer Analysis of Images and Patterns, 2019
SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection.
Secur. Commun. Networks, 2018
Advanced Analysis of Data Streams for Critical Infrastructures Protection and Cybersecurity.
J. Univers. Comput. Sci., 2018
A scalable distributed machine learning approach for attack detection in edge computing environments.
J. Parallel Distributed Comput., 2018
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018
Proceedings of the Image Processing and Communications Challenges 10, 2018
Proceedings of the Image Processing and Communications Challenges 10, 2018
Proceedings of the Image Processing and Communications Challenges 10, 2018
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018
Proceedings of the Contemporary Complex Systems and Their Dependability, 2018
Proceedings of the Computer Information Systems and Industrial Management, 2018
Q-Rapids Tool Prototype: Supporting Decision-Makers in Managing Quality in Rapid Software Development.
Proceedings of the Information Systems in the Big Data Era, 2018
Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Secur. Commun. Networks, 2017
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures.
J. Comput. Sci., 2017
Proceedings of the Image Processing and Communications Challenges 9, 2017
Proceedings of the Image Processing and Communications Challenges 9, 2017
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017
Proceedings of the 10th International Conference on Computer Recognition Systems CORES 2017, 2017
Proceedings of the Computer Information Systems and Industrial Management, 2017
Proceedings of the Advances in Cybersecurity, 2017
2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Proposal and comparison of network anomaly detection based on long-memory statistical models.
Log. J. IGPL, 2016
The HTTP Content Segmentation Method Combined with AdaBoost Classifier for Web-Layer Anomaly Detection System.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016
Proceedings of the Image Processing and Communications Challenges 8, 2016
Proceedings of the Image Processing and Communications Challenges 8, 2016
Proceedings of the Hybrid Artificial Intelligent Systems - 11th International Conference, 2016
Proceedings of the Computer Information Systems and Industrial Management, 2016
2015
Finger Knuckle Print Identification with Hierarchical Model of Local Gradient Features.
Proceedings of the New Trends in Intelligent Information and Database Systems, 2015
J. Ambient Intell. Humaniz. Comput., 2015
Log. J. IGPL, 2015
Proceedings of the Image Processing and Communications Challenges 7, 2015
Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption.
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015, 2015
Proceedings of the International Joint Conference, 2015
Proceedings of the International Joint Conference, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
Adapting an Ensemble of One-Class Classifiers for a Web-Layer Anomaly Detection System.
Proceedings of the 10th International Conference on P2P, 2015
2014
End-users needs and requirements for tools to support critical infrastructures protection.
CoRR, 2014
Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach.
Proceedings of the Image Processing and Communications Challenges 6, 2014
Proceedings of the Computer Information Systems and Industrial Management, 2014
2013
Comprehensive Approach to Information Sharing for increased Network Security and Survivability.
Cybern. Syst., 2013
Proceedings of the Image Processing and Communications Challenges 5, 2013
Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013, 2013
Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013, 2013
2012
Pattern Anal. Appl., 2012
Expert Syst. J. Knowl. Eng., 2012
The human role in tools for improving robustness and resilience of critical infrastructures.
Cogn. Technol. Work., 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
A Concept of Unobtrusive Method for Complementary Emotive User Profiling and Personalization for IPTV Platforms.
Proceedings of the Image Processing and Communications Challenges 4, 2012
Proceedings of the Image Processing and Communications Challenges 4, 2012
Proceedings of the Image Processing and Communications Challenges 4, 2012
2011
Proceedings of the Computer Recognition Systems 4, 2011
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Proceedings of the Image Processing and Communications Challenges 3, 2011
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011
Network Event Correlation and Semantic Reasoning for Federated Networks Protection System.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011
2010
Intersection Approach to Vulnerability Handling.
Proceedings of the WEBIST 2010, 2010
Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection.
Proceedings of the Mobile Lightweight Wireless Systems, 2010
Proceedings of the Image Processing and Communications Challenges 2, 2010
Proceedings of the Image Processing and Communications Challenges 2, 2010
Proceedings of the Trends in Applied Intelligent Systems, 2010
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010
Image Recognition Techniques Applied to Automated and Objective QoE Assessment of Mobile WWW Services.
Proceedings of the Computer Vision and Graphics - International Conference, 2010
2009
Proceedings of the Progress in Computer Vision and Image Analysis, 2009
Proceedings of the Computer Recognition Systems 3, 2009
Proceedings of the Computer Recognition Systems 3, 2009
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009
Proceedings of the Advances in Biometrics, Third International Conference, 2009
Proceedings of the Adaptive and Natural Computing Algorithms, 9th International Conference, 2009
Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis.
Proceedings of the Critical Information Infrastructures Security, 2009
2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Proceedings of the Image Analysis and Recognition, 5th International Conference, 2008
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008
2007
Pattern Anal. Appl., 2007
Web Security Enhancement based on Keystroke Dynamics.
Proceedings of the WEBIST 2007, 2007
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007
Proceedings of the Pattern Recognition and Image Analysis, Third Iberian Conference, 2007
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007
Proceedings of the Advances in Information Processing and Protection., 2007
2006
Ear Biometrics in Passive Human Identification Systems.
Proceedings of the Pattern Recognition in Information Systems, 2006
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006
Stereo disparity estimation using discrete orthogonal moments.
Proceedings of the ICINCO 2006, 2006
Proceedings of the Artificial Intelligence and Soft Computing, 2006
Proceedings of the Articulated Motion and Deformable Objects, 4th International Conference, 2006
Proceedings of the Biometrics, 2006
2005
Proceedings of the Computer Recognition Systems, 2005
2004
Proceedings of the Artificial Intelligence and Soft Computing, 2004
Proceedings of the Articulated Motion and Deformable Objects, Third International Workshop, 2004
2002
Proceedings of the Articulated Motion and Deformable Objects Second International Workshop, 2002