Browse Title Index


 
Issue Title
 
Vol 19, No 1 (2007) Personalized database views and triggers Abstract   PDF
J. Rykowski
 
Vol 28, No 4 (2016) Post-Quantum Cryptography: generalized ElGamal cipher over GF(251^8) Abstract   PDF   SUP1   SUP2
Juan Pedro Hecht
 
Vol 24, No 2 (2012) Prioritized epoch - incremental Q - learning algorithm Abstract   PDF
R. Zajdel
 
Vol 22, No 4 (2010) Priority levels and heuristic rules in the structural recognition of mathematical formulae Abstract   PDF
S. Sroczyński
 
Vol 20, No 2 (2008) Priority Preemptive Queues - Transient State Models Abstract   PDF
T. Czachórski, T. Nycz, F. Pekergin
 
Vol 21, No 3-4 (2009) Priority Registers Mechanism for fair access to ring-type OPS network Abstract   PDF
M. Nowak, P. Pecka
 
Vol 22, No 4 (2010) Progressive 3D meshes transmission: traffic generating and simulation evaluation Abstract   PDF
S. Nowak, J. Domańska, M. Nowak, P. Głomb
 
Vol 19, No 3 (2007) Quality of service in optical burst switched networks Abstract   PDF
S. Kaczmarek, P. Kostecki
 
Vol 21, No 3-4 (2009) Quantum cryptography Abstract   PDF
A. Grzywak, G. Pilch-Kowalczyk
 
Vol 22, No 1 (2010) Quantum Cryptography - The Issue of Security in Selected Quantum Protocols and the Issue of Data Credibility Abstract   PDF
M. Krzyszkowska-Pytel
 
Vol 27, No 1 (2015) Quantum image classification using principal component analysis Abstract   PDF
Mateusz Ostaszewski, Piotr Gawron, Przemysław Sadowski
 
Vol 20, No 2 (2008) Random generalization by feedforward neural networks Abstract   PDF
A. Rataj
 
Vol 26, No 3-4 (2014) Realistic modelling of facial expressions using volume morphing Abstract   PDF
P. Kowalski
 
Vol 25, No 3-4 (2013) Relative and non - relative databases performance with an Android platform application Abstract   PDF
P. Buchwald, M. Rostański, A. Jurasz
 
Vol 24, No 2 (2012) Representation of direct product of permutation groups as symmetry groups of boolean functions Abstract   PDF
P. Jasionowski
 
Vol 28, No 4 (2016) Revisiting the Futamura Projections: A Diagrammatic Approach Abstract   PDF
Brandon M. Williams, Saverio Perugini
 
Vol 26, No 1-2 (2014) Risk management approach in the ValueSec project Abstract   PDF
A. Białas
 
Vol 25, No 1 (2013) SAMEE : the nonlinear adaptive method for predicting work effort of information systems development Abstract   PDF
D. Augustyn, L. Warchal
 
Vol 23, No 2 (2011) Scattered context grammars generating sentences followed by derivation tree Abstract   PDF
A. Meduna, S. Židek
 
Vol 25, No 3-4 (2013) Searching for quantum circuits preparing maximally multipartite Abstract   PDF
Przemysław Sadowski
 
Vol 28, No 3 (2016) Secure gateway for Internet of Things with internal AAA mechanism Abstract   PDF
Dominik Samociuk, Błazej Adamczyk
 
Vol 23, No 2 (2011) Security of the quantum direct communication based on pairs of completely entangled qudits Abstract   PDF
P. Zawadzki
 
Vol 20, No 4 (2008) Selected problems in electronic medical records implementation Abstract   PDF
G. Pilch-Kowalczyk
 
Vol 18, No 2 (2006) Self-organization in the Informatics Systems of the Direct Production of Materials Abstract   PDF
S. Nowak
 
Vol 21, No 3-4 (2009) Simulation models of fair scheduling for the TCP and UDP streams Abstract   PDF
S. Nowak, J. Domańska, A. Domański
 
126 - 150 of 177 Items << < 1 2 3 4 5 6 7 8 > >>