TY - BOOK AU - Saeed,Khalid AU - Homenda,Władysław AU - Chaki,Rituparna ED - International Conference on Computer Information Systems and Industrial Management Applications TI - Computer information systems and industrial management: 16th IFIP TC8 International Conference, CISIM 2017, Bialystok, Poland, June 16-18, 2017, Proceedings T2 - Lecture Notes in Computer Science, SN - 9783319591056 AV - TK5105.5 .I58 2017 U1 - 004.6 23 PY - 2017/// CY - Cham, Switzerland PB - Springer KW - Computer networks KW - Congresses KW - Security measures KW - Database management KW - Réseaux d'ordinateurs KW - Congrès KW - Sécurité KW - Mesures KW - Bases de données KW - Gestion KW - Information retrieval KW - bicssc KW - Artificial intelligence KW - Algorithms & data structures KW - Computer modelling & simulation KW - Information technology: general issues KW - Computers KW - Information Technology KW - bisacsh KW - Intelligence (AI) & Semantics KW - Programming KW - Algorithms KW - Computer Simulation KW - Data Processing KW - fast KW - Congress KW - proceedings (reports) KW - aat KW - Conference papers and proceedings KW - lcgft KW - Actes de congrès KW - rvmgf N1 - International conference proceedings; Includes author index; Algorithms -- Biometrics and pattern recognition applications -- Data analysis and information retrieval.-Engineering of enterprise software products -- Industrial management and other applications -- Modelling and optimization -- Various aspects of computer security N2 - This book constitutes the proceedings of the 16th IFIP TC8 International Conference on Computer Information Systems and Industrial Management, CISIM 2017, held in Bialystok, Poland, in June 2017. The 60 regular papers presented together with 5 keynotes were carefully reviewed and Selected from 85 submissions. They are organized in the following topical sections: algorithms; biometrics and pattern recognition applications; data analysis and information retrieval; engineering of enterprise software products; industrial management and other applications; modelling and optimization; various aspects of computer security UR - https://link.springer.com/10.1007/978-3-319-59105-6 ER -