|
Issue |
Title |
|
Vol 28, No 1&2 (2016) |
Critical infrastructures risk management: case study |
Abstract
PDF
|
Andrzej Białas |
|
Vol 22, No 3 (2010) |
Critical resources software and control modeling with finite automata |
Abstract
PDF
|
B. Schreyer, K. Kosiński |
|
Vol 19, No 3 (2007) |
Cross-platform solution for telecommunication networks simulation and management |
Abstract
PDF
|
I. Dronyuk, R. Koshulinsky |
|
Vol 28, No 3 (2016) |
Cryptography with right-angled Artin groups |
Abstract
PDF
|
Delaram Kahrobaei, Ramon Flores |
|
Vol 29, No 1&2 (2017) |
Cryptosystems using subgroup distortion |
Abstract
PDF
|
Delaram Kahrobaei, Indira Chatterji, Ni Yen Lu |
|
Vol 18, No 3 (2006) |
Deflection routing in an all-optical network in 2D grid : performance evaluation |
Abstract
PDF
|
A. Borrero, F. Quessette |
|
Vol 26, No 1-2 (2014) |
Designing Human-Computer Interaction for Mobile Devices with the FMX Application Platform |
Abstract
PDF
|
Z. Sroczyński |
|
Vol 23, No 1 (2011) |
Development and implementation of IEC 61131-3 virtual machine |
Abstract
PDF
|
B. Trybus |
|
Vol 20, No 3 (2008) |
Diffusion model of parallel servers - transient state analysis |
Abstract
PDF
|
T. Czachórski, J.-M. Fourneau, T. Nycz, F. Pekergin |
|
Vol 25, No 3-4 (2013) |
EA-MOSGWA : a tool for identifying associated SNPs in Genome Wide Association Studies |
Abstract
PDF
|
A. Gola, M. Bogdan, F. Frommlet |
|
Vol 20, No 3 (2008) |
Efficiency estimation of AX.25 protocol |
Abstract
PDF
|
B. Zieliński |
|
Vol 23, No 3-4 (2011) |
Efficient integration over the unitary group with applications |
Abstract
PDF
|
P. Sadowski |
|
Vol 18, No 4 (2006) |
Estimating the Quality of Ciphers using the Visualisation Method |
Abstract
PDF
|
K. Trybicka-Francik |
|
Vol 22, No 2 (2010) |
Evaluation of possible applications of dynamic routing protocols for load balancing in computer networks |
Abstract
PDF
|
K. Zajda |
|
Vol 20, No 4 (2008) |
Evaluation of the effectiveness of certain spam protecting methods |
Abstract
PDF
|
P. Ogonowski |
|
Vol 24, No 4 (2012) |
Examination of robust D - stability of TCP - DCR protocol |
Abstract
PDF
|
J. Klamka, J. Tańcula |
|
Vol 20, No 3 (2008) |
Experimental rate distortion analysis of image coder with contourlet transform and SPIHT algorithm |
Abstract
PDF
|
P. Głomb, S. Nowak, S. Nowak |
|
Vol 20, No 2 (2008) |
Experimental Study on Parameter Selection for Reinforcement Learning Algorithms |
Abstract
PDF
|
R. Zajdel |
|
Vol 19, No 2 (2007) |
Fast algorithm for the constrained longest common subsequence problem |
Abstract
PDF
|
S. Deorowicz |
|
Vol 22, No 1 (2010) |
Flexible Buffer Management with Thresholds and Blocking for Congestion Control in Multi - Server Computer Systems |
Abstract
PDF
|
W. Oniszczuk |
|
Vol 24, No 1 (2012) |
Foundation for equivalences of BPMN models |
Abstract
PDF
|
V. S. W. Lam |
|
Vol 27, No 2 (2015) |
Fuzzy logic in indoor position determination system |
Abstract
PDF
|
Michał Socha, Wojciech Górka, Iwona Kostorz |
|
Vol 19, No 2 (2007) |
Generalization of Threshold and Retry Models for Multi-service Systems with Finite and Infinite Source Population |
Abstract
PDF
|
M. Głąbowski |
|
Vol 22, No 4 (2010) |
Genetic programming using adaptable stochastic flow of control |
Abstract
PDF
|
A. Rataj |
|
Vol 25, No 2 (2013) |
GPU - Accelerated fluid flow approximation of the Active Queues Management algorithms |
Abstract
PDF
|
A. Domański, J. Domańska, T. Czachórski |
|
51 - 75 of 177 Items |
<< < 1 2 3 4 5 6 7 8 > >> |