Abstract is missing.
- On Fuzzy RDM-ArithmeticAndrzej Piegat, Marek Landowski. 3-16 [doi]
- Hidden Markov Models with Affix Based Observation in the Field of Syntactic AnalysisMarcin Pietras. 17-26 [doi]
- Opinion Acquisition: An Experiment on Numeric, Linguistic and Color Coded Rating Scale ComparisonOlga Pilipczuk, Galina Cariowa. 27-36 [doi]
- A Weather Forecasting System Using Intelligent BDI Multiagent-Based Group Method of Data HandlingWalery Rogoza, Michal Zablocki. 37-48 [doi]
- Comparison of RDM Complex Interval Arithmetic and Rectangular Complex ArithmeticMarek Landowski. 49-57 [doi]
- Homogeneous Ensemble Selection - Experimental StudiesRobert Burduk, Paulina Heda. 58-67 [doi]
- Deterministic Method for the Prediction of Time SeriesWalery Rogoza. 68-80 [doi]
- A Study on Directionality in the Ulam Square with the Use of the Hough TransformLeszek J. Chmielewski, Arkadiusz Orlowski, Maciej Janowicz. 81-90 [doi]
- Ontological Approach Towards Semantic Data Filtering in the Interface Design Applied to the Interface Design and Dialogue Creation for the "Robot-Aircraft Designer" Informational SystemNikolay Borgest, Maksim Korovin. 93-101 [doi]
- Real-Time System of Delivering Water-Capsule for FirefightingGrzegorz Smigielski, Roman Dygdala, Hubert Zarzycki, Damian Lewandowski. 102-111 [doi]
- Evaluation of Influence Exerted by a Malicious Group's Various Aims in the External GridKosuke Yamaguchi, Tsutomu Inamoto, Keiichi Endo, Yoshinobu Higami, Shinya Kobayashi. 112-122 [doi]
- Subject-Specific Methodology in the Frequency Scanning Phase of SSVEP-Based BCIIzabela Rejer, Lukasz Cieszynski. 123-132 [doi]
- S-boxes Cryptographic Properties from a Statistical AngleAnna Grocholewska-Czurylo. 133-145 [doi]
- Wavelet Transform in Detection of the Subject Specific Frequencies for SSVEP-Based BCIIzabela Rejer. 146-155 [doi]
- Data Scheme Conversion Proposal for Information Security Monitoring SystemsTomasz Klasa, Imed El Fray. 156-166 [doi]
- Non-standard Certification Models for Pairing Based CryptographyTomasz Hyla, Jerzy Pejas. 167-181 [doi]
- An Algorithm for the Vandermonde Matrix-Vector Multiplication with Reduced Multiplicative ComplexityAleksandr Cariow, Galina Cariowa. 185-194 [doi]
- The Use of the Objective Digital Image Quality Assessment Criterion Indication to Create Panoramic PhotographsJakub Peksinski, Grzegorz Mikolajczak, Janusz Pawel Kowalski. 195-204 [doi]
- Human Face Detection in Thermal Images Using an Ensemble of Cascading ClassifiersPawel Forczmanski. 205-215 [doi]
- Accuracy of High-End and Self-build Eye-Tracking SystemsRadoslaw Mantiuk. 216-227 [doi]
- Mouth Features Extraction for Emotion AnalysisRobert Staniucha, Adam Wojciechowski. 228-237 [doi]
- Sensitivity of Area-Perimeter Relation for Image Analysis and Image Segmentation PurposesDorota Oszutowska-Mazurek, Przemyslaw Mazurek. 238-248 [doi]
- Vocal Tract Resonance Analysis Using LTAS in the Context of the Singer's Level of AdvancementEdward Pólrolniczak, Michal Kramarczyk. 249-257 [doi]
- Parallel Facial Recognition System Based on 2DHMMJanusz Bobulski. 258-265 [doi]
- System of Acoustic Assistance in Spatial Orientation for the BlindMariusz Kubanek, Filip Depta, Dorota Smorawa. 266-277 [doi]
- Performance and Energy Efficiency in Distributed ComputingAndriy Luntovskyy. 281-292 [doi]
- The Approach to Web Services CompositionAlexander Koval, Larisa Globa, Rina Novogrudska. 293-304 [doi]
- Loop Nest Tiling for Image Processing and Communication ApplicationsWlodzimierz Bielecki, Marek Palkowski. 305-314 [doi]
- Tile Merging Technique to Generate Valid Tiled Code by Means of the Transitive Closure of a Dependence GraphWlodzimierz Bielecki, Piotr Skotnicki. 315-327 [doi]
- Performance Evaluation of Impact of State Machine Transformation and Run-Time Library on a C# ApplicationAnna Derezinska, Marian Szczykulski. 328-340 [doi]
- The Method of Evaluating the Usability of the Website Based on Logs and User PreferencesLuiza Fabisiak. 341-354 [doi]
- Ontology-Based Approaches to Big Data AnalyticsAgnieszka Konys. 355-365 [doi]