Browse Title Index


 
Issue Title
 
Vol 22, No 3 (2010) A comparison of various types of TNC controllers Abstract   PDF
B. Zieliński
 
Vol 22, No 1 (2010) A Lagrangean Relaxation Algorithm for Flow Optimization in Survivable MPLS Networks Abstract   PDF
K. Walkowiak
 
Vol 20, No 2 (2008) A language for security issues specification during the IT security development process Abstract   PDF
A. Białas
 
Vol 18, No 4 (2006) A model of TCP flows dynamics Abstract   PDF
T. Czachórski, K. Grochla, F. Pekergin
 
Vol 26, No 1-2 (2014) A Modern Approach to the Asynchronous Sequential Circuit Synthesis Abstract   PDF
P. Czekalski, K. Tokarz, B. Pochopień
 
Vol 28, No 3 (2016) A Modularity Bug in Java 8 Abstract   PDF
Simon Kramer
 
Vol 18, No 4 (2006) A New Approach for Investigation on Closed Type Network with Combination of HOL and Multi-Level RR Priorities Scheduling Strategies Abstract   PDF
W. Oniszczuk
 
Vol 22, No 3 (2010) A new method for computing blocking probabilities in cellular mobile communication networks Abstract   PDF
J. Martyna
 
Vol 28, No 1&2 (2016) A New Proposal for Person Identification Based on the Dynamics of Typing: Preliminary Results Abstract   PDF
Krisztian Buza, Dora Neubrandt
 
Vol 18, No 3 (2006) A semiglobal binarization method for embedded environments Abstract   PDF
A. Rataj
 
Vol 18, No 3 (2006) A theoretical model of the Shapiro finite state automaton built on DNA Abstract   PDF
T. Krasiński, S. Sakowski
 
Vol 20, No 1 (2008) Adaptation of symbiotic adaptive neuroevolution in assembler encoding Abstract   PDF
T. Praczyk
 
Vol 24, No 2 (2012) Adapting the RANSAC algorithm to detect 2nd - degree manifolds in 2D and 3D Abstract   PDF
L. Luchowski
 
Vol 23, No 1 (2011) Adaptive improvement of resource utilization in goal-oriented multi-user systems Abstract   PDF
M. Młyński
 
Vol 24, No 3 (2012) Adaptive threads co-operation schemes in a parallel heuristic algorithm for the vehicle routing problem with time windows Abstract   PDF
J. Nalepa, Z. J. Czech
 
Vol 22, No 2 (2010) An analytical model for lifetime of hierarchical wireless ad hoc and sensor networks Abstract   PDF
J. Martyna
 
Vol 21, No 1 (2009) An analytical model of TNC controller Abstract   PDF
B. Zieliński
 
Vol 24, No 2 (2012) An efficient and provably - secure digital signature scheme based on elliptic curve bilinear pairings Abstract   PDF
S. K. H. Islam, G. P. Biswas
 
Vol 24, No 4 (2012) An improved ID - based client authentication with key agreement scheme on ECC for mobile client - server environments Abstract   PDF
S. K. H. Islam, G. P. Biswas
 
Vol 25, No 1 (2013) Analysis and computer modeling of magnetoelastic characteristics of FeNi-based amorphous ring-shaped core under uniform compressive and tensile stresses Abstract   PDF
J. Salach, R. Szewczyk, A. Bieńkowski, D. Jackiewicz
 
Vol 25, No 1 (2013) Analysis of CHOKe - family active queue management Abstract   PDF
A. Domański, J. Domańska, J. Klamka
 
Vol 24, No 3 (2012) Analysis of new method of initialisation of neuro - fuzzy systems with support vector machines Abstract   PDF
K. Simiński
 
Vol 28, No 1&2 (2016) Analysis of SQL Injection Detection Techniques Abstract   PDF
Jai Puneet Singh
 
Vol 19, No 4 (2007) Analytical method of calculating blocking probability in 3G networks with spreading spectrum and a finite number of traffic sources Abstract   PDF
M. Stasiak, A. Wiśniewski, P. Zwierzykowski
 
Vol 19, No 1 (2007) Application of r-contiguous-bits scheme borrowed from immune systems to characteristic points of radar image identification Abstract   PDF
T. Praczyk
 
1 - 25 of 172 Items 1 2 3 4 5 6 7 > >>