Browse Title Index


 
Issue Title
 
Vol 11, No 4 (2011) Reliability of feedback fechanism based on root cause defect analysis - case study Abstract   PDF
Marek G. Stochel
 
Vol 16, No 1 (2016) Remote Access Environment for Computer Networking Laboratory: Challenges and Solutions Abstract   PDF
Karol Kuczyński, Rafał Stęgierski, Waldemar Suszyński, Dawid Królica
 
Vol 12, No 1 (2012) Resource Allocation Optimization in Critical Chain Method Abstract   PDF
Grzegorz Pawiński, Krzysztof Sapiecha
 
Vol 5, No 1 (2006) Robustness of data hiding in image the Fourier spectrum Abstract   PDF
Piotr Kopniak
 
Vol 2, No 1 (2004) RT-level fast fault simulator Abstract   PDF
Stanisław Deniziak, Krzysztof Sapiecha
 
Vol 4, No 1 (2006) Rule extraction from a neural network by hierarchical multiobjective genetic algorithm Abstract   PDF
Urszula Markowska-Kaczmar, Krystyna Mularczyk
 
Vol 7, No 1 (2007) Rule languages used in Tutorial chatbots programming Abstract   PDF
Barbara Gocłowska, Michał Kufel, Monika Puchacz, Radosław Świech
 
Vol 1, No 1 (2003) SATVAL - Monte Carlo computer code for windows system Abstract   PDF
Juliusz Sielanko, Marcin Smolira
 
Vol 10, No 1 (2010) SDDSfL vs. local disk - a comparative study for Linux Abstract   PDF
Arkadiusz Chrobot, Maciej Lasota, Grzegorz Łukawski, Krzysztof Sapiecha
 
Vol 7, No 1 (2007) Searching for efficient cellular automata based keys applied in symmetric key cryptography Abstract   PDF
Mirosław Szaban, Franciszek Seredyński
 
Vol 8, No 1 (2008) SecMon: end-to-end quality and security monitoring system Abstract   PDF
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedler, Zbigniew Kotulski, Radu Lupu, Wojciech Mazurczyk
 
Vol 8, No 2 (2008) SecMon: end-to-end quality and security monitoring system Abstract   PDF
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedler, Zbigniew Kotulski, Radu Lupu, Wojciech Mazurczyk
 
Vol 1, No 1 (2003) Second order approximation for the customer time in queue distribution under the FIFO service discipline Abstract   PDF
Łukasz Kruk, John Lehoczky, Steven Shreve
 
Vol 11, No 3 (2011) Secure time information in the internet key exchange protocol Abstract   PDF
Zbigniew Kotulski, Paweł Szałachowski
 
Vol 12, No 4 (2012) Security issues on digital watermarking algorithms Abstract   PDF
Wioletta Wójtowicz, Marek R. Ogiela
 
Vol 11, No 3 (2011) Security problems of systems of extremely weak devices Abstract   PDF
Marek Klonowski
 
Vol 3, No 1 (2005) Semantic tree method - historical perspective and applications Abstract   PDF
Izabela Bondecka-Krzykowska
 
Vol 13, No 1 (2013) Semi-automatic watershed merging method Abstract   PDF
Jakub Smołka, Maria Skublewska-Paszkowska
 
Vol 7, No 1 (2007) Sensitivity of DEA models to measurement errors Abstract   PDF
Joanicjusz Nazarko, Joanna Urban
 
Vol 12, No 2 (2012) Sensor network infrastructure for intelligent building monitoring and management system Abstract   PDF
Paweł Dymora, Mirosław Mazurek, Sławomir Nieroda
 
Vol 3, No 1 (2005) Shape analysis of MR brain images based on the fractal dimension Abstract   PDF
Olena Buczko, Paweł Mikołajczak
 
Vol 7, No 1 (2007) Shape description of MR brain images Abstract   PDF
Olena Buczko, Paweł Mikołajczak
 
Vol 1, No 1 (2003) Shifting technique vs. pointer structures in unsymmetric sparse linear equations systems solver Abstract   PDF
Marek Stabrowski
 
Vol 5, No 1 (2006) Sigma-if neural network as the use of selective attention technique in classification and knowledge discovery problems solving Abstract   PDF
Maciej Huk
 
Vol 9, No 1 (2009) Simple cable-pulley manipulator system for remote translocation of radioactive materials Abstract   PDF
Janusz Baczyński, Michał Baczyński
 
326 - 350 of 449 Items << < 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 > >>