Abstract is missing.
- The Interactions of SOAP-Based Web Services for Recording and Replaying Video FilesMiroslav Voznak, Lukas Kapicak, Martin Mikulec, Pavel Nevlud, Jaroslav Zdralek. 1-13 [doi]
- A Friendliness Study of TCP Linux VariantsChristian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe. 14-23 [doi]
- Admission Policy in Web Services Based on Auction ApproachJolanta Wrzuszczak-Noga, Leszek Borzemski. 24-31 [doi]
- Decentralized Algorithm for Joint Data Placement and Rate Allocation in Content-Aware NetworksDariusz Gasior, Maciej Drwal. 32-44 [doi]
- Development of Service Composition by Applying ICT Service MappingJakub M. Tomczak, Katarzyna Cieslinska, Michal Pleszkun. 45-54 [doi]
- The Concept of Using Data Mining Methods for Creating Efficiency and Reliability Model of Middleware ApplicationsKamil Folkert, Michal Bochenek, Lukasz Huczala. 55-62 [doi]
- Transfer of Quantum Continuous Variable and Qudit States in Quantum NetworksMarek Sawerwain, Roman Gielerak. 63-72 [doi]
- Quantum Computer Network Model for a Decision Making AlgorithmJoanna Wisniewska. 73-81 [doi]
- Comparison of AQM Control Systems with the Use of Fluid Flow ApproximationAdam Domanski, Joanna Domanska, Tadeusz Czachórski. 82-90 [doi]
- Testing and Scalability Analysis of Network Management Systems Using Device EmulationKrzysztof Grochla, Leszek Naruszewicz. 91-100 [doi]
- Resource Management in Grid SystemsDariusz Czerwinski, Slawomir Przylucki, Przemyslaw Matejczuk. 101-110 [doi]
- Spatio-temporal Web Performance Forecasting with Sequential Gaussian Simulation MethodLeszek Borzemski, Anna Kaminska-Chuchmala. 111-119 [doi]
- Efficiency of IP Packets Pre-marking for H264 Video Quality Guarantees in Streaming ApplicationsSlawomir Przylucki. 120-129 [doi]
- Universal Web Pages Content ParserPiotr Pawlas, Adam Domanski, Joanna Domanska. 130-138 [doi]
- Using Oracle 11.2g Database Server in Social Network Analysis Based on Recursive SQLLukasz Wycislik, Lukasz Warchal. 139-143 [doi]
- Estimation of Web Page Download TimeKrzysztof Zatwarnicki, Anna Zatwarnicka. 144-152 [doi]
- Improving Packet Reception and Forwarding within Virtualized Xen EnvironmentsTomasz Fortuna, Blazej Adamczyk. 153-160 [doi]
- Virtual Networks with the IPv6 Addressing in the Xen Virtualization EnvironmentKrzysztof Chudzik, Jan Kwiatkowski, Kamil Nowak. 161-170 [doi]
- Multi-agent Based Approach of Botnet Detection in Computer SystemsOleg Savenko, Sergiy Lysenko, Andriy Kryschuk. 171-180 [doi]
- Preventing TMTO Attack in AES-CCMP in IEEE 802.11iIman Saberi, Bahareh Shojaie, Mazleena Salleh, Mahan Niknafskermani, Mohammad Javad Rostami. 181-190 [doi]
- Reverse Engineering of Microprocessor Program CodeAndrzej Kwiecien, Michal Mackowski, Krzysztof Skoroniak. 191-197 [doi]
- Network Malware Activity - A View from Honeypot SystemsMiroslaw Skrzewski. 198-206 [doi]
- The Method of Information Security Based on MicrographicsIvanna Dronjuk, Mariya Nazarkevych, Nikola Medykovski, Olena Gorodetska. 207-215 [doi]
- IP Storage Security AnalysisTomasz Bilski. 216-228 [doi]
- Usage of Pseudo-estimator LAD and SARIMA Models for Network Traffic Prediction: Case StudiesMaciej Szmit, Anna Szmit. 229-236 [doi]
- Anonymization of Web Client Traffic Efficiency StudyTomas Sochor. 237-246 [doi]
- Real-Time Communication Network Concept Based on Frequency Division MultiplexingJacek Stój. 247-260 [doi]
- Introduction to OPC UA PerformanceMarcin Fojcik, Kamil Folkert. 261-270 [doi]
- Analysis of Challenge-Response Authentication in a Networked Control SystemWojciech Rzasa, Dariusz Rzonca, Andrzej Stec, Bartosz Trybus. 271-279 [doi]
- Management of Industrial Networks Based on the FCAPS GuidelinesAndrzej Kwiecien, Karol Opielka. 280-288 [doi]
- The Algorithms of Transmission Failure Detection in Master-Slave NetworksMarcin Sidzina, Blazej Kwiecien. 289-298 [doi]
- Model of the Threshold Mechanism with Double Hysteresis for Multi-service NetworksMaciej Sobieraj, Maciej Stasiak, Piotr Zwierzykowski. 299-313 [doi]
- Modeling of Energy Consumption for Mobile Wireless Ad Hoc and Sensor NetworksJerzy Martyna. 314-323 [doi]
- Simulation Study of the Mobility Models for the Wireless Mobile Ad Hoc and Sensor NetworksJerzy Martyna. 324-333 [doi]
- Realistic Model of Radio Communication in Wireless Sensor NetworksMariusz Slabicki, Bartosz Wojciechowski, Tomasz Surmacz. 334-343 [doi]
- The Evaluation of Unconstrained Multicast Routing Algorithms in Ad-Hoc NetworksMaciej Piechowiak, Piotr Zwierzykowski. 344-351 [doi]
- Performance Evaluation of Cellular Communication Systems for M2M Communication in Smart Grid ApplicationsGanesh Man Shrestha, Jürgen Jasperneite. 352-359 [doi]
- The Weather Impact on Speech Quality in GSM NetworksJan Rozhon, Petr Blaha, Miroslav Voznak, Jan Skapa. 360-369 [doi]
- Tandem Retrial Queueing System with Correlated Arrival Flow and Operation of the Second Station Described by a Markov ChainChe Soong Kim, Alexander N. Dudin, Valentina I. Klimenok. 370-382 [doi]
- On the Stationary Distribution of Tandem Queue Consisting of a Finite Number of StationsValentina I. Klimenok, Alexander N. Dudin, Vladimir Vishnevsky. 383-392 [doi]
- Busy Period Characteristics for Single Server Queue with Random Capacity DemandsOleg M. Tikhonenko, Magdalena Kawecka. 393-400 [doi]
- A CPU-GPU Hybrid Approach to the Uniformization Method for Solving Markovian Models - A Case Study of a Wireless NetworkBeata Bylina, Marek Karwacki, Jaroslaw Bylina. 401-410 [doi]
- A Markovian Model of a Network of Two Wireless DevicesJaroslaw Bylina, Beata Bylina, Marek Karwacki. 411-420 [doi]
- Cost-Oriented Recommendation Model for E-CommerceGrzegorz Chodak, Grazyna Suchacka. 421-429 [doi]
- Uncertainty-Dependent Data Collection in Vehicular Sensor NetworksBartlomiej Placzek. 430-439 [doi]
- Numerical Calculations for Geophysics Inversion Problem Using Apache Hadoop TechnologyLukasz Krauzowicz, Kamil Szostek, Maciej Dwornik, Pawel Oleksik, Adam Piórkowski. 440-447 [doi]
- DCOM and CORBA Efficiency in the Wireless NetworkZdzislaw Onderka. 448-458 [doi]
- VANETs as a Part of Weather Warning SystemsMarcin Bernas. 459-466 [doi]