Browse Title Index

Issue Title
Vol 28, No 1&2 (2016) Critical infrastructures risk management: case study Abstract   PDF
Andrzej Białas
Vol 22, No 3 (2010) Critical resources software and control modeling with finite automata Abstract   PDF
B. Schreyer, K. Kosiński
Vol 19, No 3 (2007) Cross-platform solution for telecommunication networks simulation and management Abstract   PDF
I. Dronyuk, R. Koshulinsky
Vol 28, No 3 (2016) Cryptography with right-angled Artin groups Abstract   PDF
Delaram Kahrobaei, Ramon Flores
Vol 29, No 1&2 (2017) Cryptosystems using subgroup distortion Abstract   PDF
Delaram Kahrobaei, Indira Chatterji, Ni Yen Lu
Vol 18, No 3 (2006) Deflection routing in an all-optical network in 2D grid : performance evaluation Abstract   PDF
A. Borrero, F. Quessette
Vol 26, No 1-2 (2014) Designing Human-Computer Interaction for Mobile Devices with the FMX Application Platform Abstract   PDF
Z. Sroczyński
Vol 23, No 1 (2011) Development and implementation of IEC 61131-3 virtual machine Abstract   PDF
B. Trybus
Vol 20, No 3 (2008) Diffusion model of parallel servers - transient state analysis Abstract   PDF
T. Czachórski, J.-M. Fourneau, T. Nycz, F. Pekergin
Vol 25, No 3-4 (2013) EA-MOSGWA : a tool for identifying associated SNPs in Genome Wide Association Studies Abstract   PDF
A. Gola, M. Bogdan, F. Frommlet
Vol 20, No 3 (2008) Efficiency estimation of AX.25 protocol Abstract   PDF
B. Zieliński
Vol 23, No 3-4 (2011) Efficient integration over the unitary group with applications Abstract   PDF
P. Sadowski
Vol 18, No 4 (2006) Estimating the Quality of Ciphers using the Visualisation Method Abstract   PDF
K. Trybicka-Francik
Vol 22, No 2 (2010) Evaluation of possible applications of dynamic routing protocols for load balancing in computer networks Abstract   PDF
K. Zajda
Vol 20, No 4 (2008) Evaluation of the effectiveness of certain spam protecting methods Abstract   PDF
P. Ogonowski
Vol 24, No 4 (2012) Examination of robust D - stability of TCP - DCR protocol Abstract   PDF
J. Klamka, J. Tańcula
Vol 20, No 3 (2008) Experimental rate distortion analysis of image coder with contourlet transform and SPIHT algorithm Abstract   PDF
P. Głomb, S. Nowak, S. Nowak
Vol 20, No 2 (2008) Experimental Study on Parameter Selection for Reinforcement Learning Algorithms Abstract   PDF
R. Zajdel
Vol 19, No 2 (2007) Fast algorithm for the constrained longest common subsequence problem Abstract   PDF
S. Deorowicz
Vol 22, No 1 (2010) Flexible Buffer Management with Thresholds and Blocking for Congestion Control in Multi - Server Computer Systems Abstract   PDF
W. Oniszczuk
Vol 24, No 1 (2012) Foundation for equivalences of BPMN models Abstract   PDF
V. S. W. Lam
Vol 27, No 2 (2015) Fuzzy logic in indoor position determination system Abstract   PDF
Michał Socha, Wojciech Górka, Iwona Kostorz
Vol 19, No 2 (2007) Generalization of Threshold and Retry Models for Multi-service Systems with Finite and Infinite Source Population Abstract   PDF
M. Głąbowski
Vol 22, No 4 (2010) Genetic programming using adaptable stochastic flow of control Abstract   PDF
A. Rataj
Vol 25, No 2 (2013) GPU - Accelerated fluid flow approximation of the Active Queues Management algorithms Abstract   PDF
A. Domański, J. Domańska, T. Czachórski
51 - 75 of 177 Items << < 1 2 3 4 5 6 7 8 > >>