default search action
Annales UMCS, Informatica, Volume 12
Volume 12, Number 1, June 2012
- Mariusz Maciuk, Wieslawa Kuniszyk-Józkowiak, Anna Doboszynska, Marta Maciuk:
Analysis of lung auscultatory phenomena using the Wigner-Ville Distribution. 7-16 - Grzegorz Pawinski, Krzysztof Sapiecha:
Resource Allocation Optimization in Critical Chain Method. 17-29 - Tadeusz Zloto, Pawel Ptak, Tomasz Prauzner:
Analysis of signals from inductive sensors by means of the DasyLab software. 31-37 - Bartosz Ziólko, Maciej Kruk:
Automatic reasoning in the Planet Wars game. 39-45 - Zbigniew Omiotek:
A method for QoS differentiation in DiffServ networks based on the long-term properties of a video stream. 47-56 - Pawel Dymora, Miroslaw Mazurek, Dominik Strzalka, Marcin Piekos:
Influence of batch structure on cluster computing performance - complex systems approach. 57-66 - Khalil Challita:
The Meeting Businessmen Problem: Requirements and Limitations. 67-77 - Artur Kornatka:
Generating of Business Database Application Elements. 79-87
Volume 12, Number 2, June 2012
- Joanna Kapusta, Ryszard Smarzewski:
Fast multidimensional Bernstein-Lagrange algorithms. 7-18 - Wieslawa Kuniszyk-Józkowiak, Janusz Jaszczuk, Tomasz Sacewicz, Ireneusz Codello:
Time-frequency Analysis of the EMG Digital Signals. 19-25 - Halina Bielak, Michal Panczyk:
A self-stabilizing algorithm for finding weighted centroid in trees. 27-37 - Ireneusz Codello, Wieslawa Kuniszyk-Józkowiak, Elzbieta Smolka, Adam Kobus:
Automatic disordered sound repetition recognition in continuous speech using CWT and kohonen network. 39-48 - Pawel Dymora, Miroslaw Mazurek, Dominik Strzalka:
Long-range dependencies in reading memory pages in the man-computer system interaction. 49-58 - Pawel Dymora, Miroslaw Mazurek, Slawomir Nieroda:
Sensor network infrastructure for intelligent building monitoring and management system. 59-71 - Alina-Mihaela Badescu:
A comparison of different modulation techniques performances in an underground multiuser communications scenario. 73-85 - Tomasz Prauzner, Pawel Ptak:
The role of standardization in the development of e-learning. 87-92
Volume 12, Number 3, September 2012
- Tomasz Bilski, Krzysztof Bucholc, Anna Grocholewska-Czurylo, Janusz Stoklosa:
Parameterized Hash Functions. 11-24 - Mateusz Buczek:
Attacks on StreamHash 2. 25-35 - Sébastien Varrette, Jakub Muszynski, Pascal Bouvry:
Hash function generation by means of Gene Expression Programming. 37-53 - Renata Kawa, Mieczyslaw Kula:
A Remark on Hierarchical Threshold Secret Sharing. 55-64 - Vasyl Ustimenko, Aneta Wróblewska:
Dynamical systems as the main instrument for the constructions of new quadratic families and their usage in cryptography. 65-74 - Mariusz Borowski, Marek Lesniewicz, Robert Wicik, Marcin Grzonkowski:
Generation of random keys for cryptographic systems. 75-87 - Urszula Romanczuk, Vasyl Ustimenko:
On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2. 89-106 - Monika Polak, Vasyl Ustimenko:
LDPC Codes Based on Algebraic Graphs. 107-119 - Ashraf M. Emam, Mahmoud M. Ouf:
Performance Evaluation of Different Universal Steganalysis Techniques in JPG Files. 121-139
Volume 12, Number 4, December 2012
- Nicolas Bernard, Franck Leprévost:
Hardened Bloom Filters, with an Application to Unobservability. 11-22 - Vaidas Juzonis, Nikolaj Goranin, Antanas Cenys, Dmitrij Olifer:
Specialized Genetic Algorithm Based Simulation Tool Designed For Malware Evolution Forecasting. 23-37 - Franciszek Seredynski, Jaroslaw Skaruz, Adrian Piraszewski:
Image reconstruction with the use of evolutionary algorithms and cellular automata. 39-49 - Urszula Krawczyk, Piotr Sapiecha:
Automatic detection of DoS vulnerabilities of cryptographic protocols. 51-67 - Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki:
On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML). 69-81 - Xiaobing He, Pawel Szalachowski, Zbigniew Kotulski, Nikos Fotiou, Giannis F. Marias, George C. Polyzos, Hermann de Meer:
Energy-aware Key Management in Mobile Wireless Sensor Networks. 83-96 - Grzegorz Orynczak, Zbigniew Kotulski:
Notary-based self-healing mechanism for centralized peer-to-peer infrastructures. 97-112 - Marcin Alan Tunia:
Distributed Social Network - data security. 113-122 - Wioletta Wójtowicz, Marek R. Ogiela:
Security issues on digital watermarking algorithms. 123-139
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.