Abstract is missing.
- Synchronization Algorithm for Timed Colored Petri Nets and Ns-2 SimulatorsWojciech Rzasa. 1-10 [doi]
- Experimental Results of Dynamic Load Scheduling in the CMS Data Acquisition SystemMichal Simon, Hannes Sakulin, Stanislaw Kozielski. 11-20 [doi]
- Client-Side Processing Environment Based on Component Platforms and Web BrowsersAdam Piórkowski, Przemyslaw Szemla. 21-30 [doi]
- Study of the Character of APRS Traffic in AX.25 NetworkRemigiusz Olejnik. 31-37 [doi]
- Modelling the Pertubation of Traffic Based on Ateb-functionsMykola Medykovsky, Ivanna Droniuk, Maria Nazarkevich, Olga Fedevych. 38-44 [doi]
- Spatial Econometrics Models in Web Server's PerformanceLeszek Borzemski, Anna Kaminska-Chuchmala. 45-54 [doi]
- Empirical Web Performance Evaluation with MWING System and Turning Bands MethodLeszek Borzemski, Michal Danielak, Anna Kaminska-Chuchmala. 55-63 [doi]
- A Note on the Local Minimum Problem in Wireless Sensor NetworksAdam Czubak. 64-75 [doi]
- Lessons Learned from the Deployment of Wireless Sensor NetworksTomasz R. Surmacz, Mariusz Slabicki, Bartosz Wojciechowski, Maciej Nikodem. 76-85 [doi]
- Analysis and Optimization of LEACH Protocol for Wireless Sensor NetworksBlazej Adamczyk. 86-94 [doi]
- Performance Analysis of IEEE 802.11 EDCA for a Different Number of Access Categories and Comparison with DCFOlga Leontyeva, Kvitoslava Obelovska. 95-104 [doi]
- Simulation Comparison of LEACH-Based Routing Protocols for Wireless Sensor NetworksAgnieszka Brachman. 105-113 [doi]
- Routing Protocols for Border Surveillance Using ZigBee-Based Wireless Sensor NetworksHoda Sharei-Amarghan, Alireza Keshavarz-Haddad, Gaëtan Garraux. 114-123 [doi]
- Quantitative Risk Analysis for Data Storage SystemsTomasz Bilski. 124-135 [doi]
- Onion Routing Efficiency for Web Anonymization in Various ConfigurationsTomas Sochor. 136-145 [doi]
- Multi-agent Based Approach for Botnet Detection in a Corporate Area Network Using Fuzzy LogicOksana Pomorova, Oleg Savenko, Sergii Lysenko, Andrii Kryshchuk. 146-156 [doi]
- Monitoring System's Network Activity for Rootkit Malware DetectionMiroslaw Skrzewski. 157-165 [doi]
- Research of Failure Detection Algorithms of Transmission Line and Equipment in a Communication System with a Dual BusBlazej Kwiecien, Marcin Sidzina. 166-176 [doi]
- The Concept of Using Multi-protocol Nodes in Real-Time Distributed Systems for Increasing Communication ReliabilityAndrzej Kwiecien, Marcin Sidzina, Michal Mackowski. 177-188 [doi]
- Bandwidth Optimization Method for Non-critical Data Transmission in Real-Time Communication SystemsRafal Cupek, Kamil Folkert, Mateusz Starzyk. 189-199 [doi]
- Communication Performance Tests in Distributed Control SystemsMarcin Jamro, Dariusz Rzonca, Bartosz Trybus. 200-209 [doi]
- Some Problems of Integrating Industrial Network Control Systems Using Service Oriented ArchitectureMarcin Fojcik, Joar Sande. 210-221 [doi]
- OFDM Transmission with Non-binary LDPC Coding in Wireless NetworksGrzegorz Dziwoki, Marcin Kucharczyk, Wojciech Sulek. 222-231 [doi]
- Spectrum Access Game for Cognitive Radio Networks with Incomplete InformationJerzy Martyna. 232-239 [doi]
- Performance Modeling of Opportunistic NetworksJerzy Martyna. 240-251 [doi]
- Differential Two-Pulses Position Modulation for Synchronized Wireless Optical CommunicationsMehdi Rouissat, Riad Ahmed Borsali. 252-257 [doi]
- Extending the TLS Protocol by EAP Handshake to Build a Security Architecture for Heterogenous Wireless NetworkKrzysztof Grochla, Piotr Stolarz. 258-267 [doi]
- Conservative Graph Coloring: A Robust Method for Automatic PCI Assignment in LTELukasz Chrost, Krzysztof Grochla. 268-276 [doi]
- Network Coding-Based QoS and Security for Dynamic Interference-Limited NetworksAmin Mohajer, Mojtaba Mazoochi, Freshteh Atri Niasar, Ali Azami Ghadikolayi, Mohammad Nabipour. 277-289 [doi]
- Simple Communication with FPGA Device over Ethernet InterfaceMarcin Kucharczyk, Grzegorz Dziwoki. 290-299 [doi]
- Evaluation and Development Perspectives of Stream Data Processing SystemsMarcin Gorawski, Anna Gorawska, Krzysztof Pasterak. 300-311 [doi]
- The Use of a Cloud Computing and the CUDA Architecture in Zero-Latency Data WarehousesMarcin Gorawski, Damian Lis, Michal Gorawski. 312-322 [doi]
- MViewer: Visualization of Protein Molecular Structures Stored in the PDB, mmCIF and PDBML Data FormatsDawid Stanek, Dariusz Mrozek, Bozena Malysiak-Mrozek. 323-333 [doi]
- CASSERT: A Two-Phase Alignment Algorithm for Matching 3D Structures of ProteinsDariusz Mrozek, Bozena Malysiak-Mrozek. 334-343 [doi]
- Transfers of Entangled Qudit States in Quantum NetworksMarek Sawerwain, Joanna Wisniewska. 344-353 [doi]
- An Analysis of the Ping-Pong Protocol Operation in a Noisy Quantum ChannelPiotr Zawadzki. 354-362 [doi]
- Comparison of CHOKe and gCHOKe Active Queues Management Algorithms with the Use of Fluid Flow ApproximationAdam Domanski, Joanna Domanska, Tadeusz Czachórski. 363-371 [doi]
- Modeling Data Stream Intensity in Distributed Stream Processing SystemMarcin Gorawski, Pawel Marks, Michal Gorawski. 372-383 [doi]
- Modeling Operation of Web ServiceKrzysztof Zatwarnicki, Anna Zatwarnicka. 384-393 [doi]
- Total Volume Distribution for Multiserver Queueing Systems with Random Capacity DemandsOleg M. Tikhonenko, Magdalena Kawecka. 394-405 [doi]
- R with Session Arrivals Operating in Random EnvironmentChe Soong Kim, Alexander Dudin, Sergey Dudin, Olga Dudina. 406-415 [doi]
- Tandem Queueing System with Correlated Input and Cross-TrafficValentina Klimenok, Alexander N. Dudin, Vladimir M. Vishnevsky. 416-425 [doi]
- Analytical and Numerical Means to Model Transient States in Computer NetworksTadeusz Czachórski, Monika Nycz, Tomasz Nycz, Ferhan Pekergin. 426-435 [doi]
- The Queueing Model of a Multiservice System with Dynamic Resource Sharing for Each Class of CallsSlawomir Hanczewski, Maciej Stasiak, Joanna Weissenberg. 436-445 [doi]
- Scheduler for Virtualization of Links with Partial Performance IsolationTomasz Fortuna, Andrzej Chydzinski. 446-455 [doi]
- Biometric Voice Identification Based on Fuzzy Kernel ClassifierAdam Dustor, Piotr Klosowski. 456-465 [doi]
- Automatic Speech Segmentation for Automatic Speech TranslationPiotr Klosowski, Adam Dustor. 466-475 [doi]
- WSN Power Conservation Using Mobile Sink for Road Traffic MonitoringMarcin Bernas. 476-484 [doi]
- Optimizing Data Collection for Object Tracking in Wireless Sensor NetworksBartlomiej Placzek, Marcin Bernas. 485-494 [doi]
- Data Security in Microprocessor UnitsAndrzej Kwiecien, Michal Mackowski, Marcin Sidzina. 495-506 [doi]
- The Concept of Software-Based Techniques of Increasing Immunity of Microprocessor Unit to Electromagnetic DisturbancesAndrzej Kwiecien, Michal Mackowski, Krzysztof Skoroniak. 507-516 [doi]
- Hardware Aspects of Data Transmission in Coal Mines with Explosion HazardMarek Kryca. 517-530 [doi]
- Planning-Based Method for Communication Protocol Negotiation in a Composition of Data Stream Processing ServicesPawel Stelmach, Pawel Swiatek, Lukasz Falas, Patryk Schauer, Adam Kokot, Maciej Demkiewicz. 531-540 [doi]
- Users in IT Product Development ProcessMalgorzata Pankowska. 541-551 [doi]
- Automatic Customer Segmentation for Social CRM SystemsAdam Czyszczon, Aleksander Zgrzywa. 552-561 [doi]
- Practical Aspects of Log File Analysis for E-CommerceGrazyna Suchacka, Grzegorz Chodak. 562-572 [doi]
- Multi-criteria Index Selection for Grouped SQL QueriesRadoslaw Boronski, Grzegorz Bocewicz. 573-581 [doi]
- Applying the Bidding Mechanism in Web Services with Quality of ServiceJolanta Wrzuszczak-Noga, Leszek Borzemski. 582-591 [doi]