Abstract is missing.
- Waterfall Traffic Identification: Optimizing Classification CascadesPawel Foremski, Christian Callegari, Michele Pagano. 1-10 [doi]
- Estimating the Intensity of Long-Range Dependence in Real and Synthetic Traffic TracesJoanna Domanska, Adam Domanski, Tadeusz Czachórski. 11-22 [doi]
- Data Suppression Algorithms for Surveillance Applications of Wireless Sensor and Actor NetworksBartlomiej Placzek, Marcin Bernas. 23-32 [doi]
- Energy Aware Object Localization in Wireless Sensor Network Based on Wi-Fi FingerprintingMarcin Bernas, Bartlomiej Placzek. 33-42 [doi]
- LTE or WiFi? Client-Side Internet Link Selection for SmartphonesPawel Foremski, Krzysztof Grochla. 43-53 [doi]
- IF-MANET: Interoperable Framework for Mobile Ad Hoc NetworksHamid Hassan, Philip Trwoga, Izzet Kale. 54-68 [doi]
- Attractiveness Study of Honeypots and Honeynets in Internet Threat DetectionTomas Sochor, Matej Zuzcak. 69-81 [doi]
- User Trust Levels and Their Impact on System Security and UsabilityHenryk Krawczyk, Pawel Lubomski. 82-91 [doi]
- Deploying Honeypots and Honeynets: Issues of LiabilityPavol Sokol, Maros Andrejko. 92-101 [doi]
- On the Balancing Security Against Performance in Database SystemsDamian Rusinek, Bogdan Ksiezopolski, Adam Wierzbicki. 102-116 [doi]
- Analysis of Objective Trees in Security Management of Distributed Computer Networks of Enterprises and OrganizationsOlga Dolinina, Vadim Kushnikov, Ekaterina Kulakova. 117-126 [doi]
- A Technique for the Botnet Detection Based on DNS-Traffic AnalysisOksana Pomorova, Oleg Savenko, Sergii Lysenko, Andrii Kryshchuk, Kira Bobrovnikova. 127-138 [doi]
- SysML-Based Modeling of Token Passing Paradigm in Distributed Control SystemsMarcin Jamro, Dariusz Rzonca. 139-149 [doi]
- Automatic Scenario Selection of Cyclic Exchanges in Transmission via Two BusesAndrzej Kwiecien, Blazej Kwiecien, Michal Mackowski. 150-161 [doi]
- Ontology-Based Integrated Monitoring of Hadoop Clusters in Industrial Environments with OPC UA and RESTful Web ServicesKamil Folkert, Marcin Fojcik. 162-171 [doi]
- Speech Quality Measurement in IP Telephony Networks by Using the Modular ProbesFilip Rezac, Jan Rozhon, Jiri Slachta, Miroslav Voznak. 172-181 [doi]
- Simulation-Based Analysis of a Platform as a Service Infrastructure Performance from a User PerspectiveWojciech Rzasa. 182-192 [doi]
- Applying Software-Defined Networking Paradigm to Tenant-Perspective Optimization of Cloud Services UtilizationDominique Jullier, Marek Konieczny, Slawomir Zielinski. 193-202 [doi]
- Color-Aware Transmission of SVC Video over DiffServ DomainSlawomir Przylucki, Dariusz Czerwinski. 203-212 [doi]
- Method of Visual Information Processing Based on Grid-CalculationsOlga Dolinina, Alexander Ermakov, Aleksandr Shvarts. 213-221 [doi]
- An Energy Saving Solution in Integrated Access NetworksGlenda Gonzalez, Tülin Atmaca, Tadeusz Czachórski. 222-231 [doi]
- Mobility Robustness in LTE Based on Automatic Neighbor Relation TableKonrad Polys, Krzysztof Grochla. 232-241 [doi]
- Influence of Corpus Size on Speaker VerificationAdam Dustor, Piotr Klosowski, Jacek Izydorczyk, Rafal Kopanski. 242-249 [doi]
- Stopping Criteria Analysis of the OMP Algorithm for Sparse Channels EstimationGrzegorz Dziwoki, Jacek Izydorczyk. 250-259 [doi]
- A Dynamic Energy Efficient Optical Line Terminal Design for Optical Access NetworkÖzgür Can Turna, Muhammed Ali Aydin, Tülin Atmaca. 260-269 [doi]
- Tracing of an Entanglement Level in Short Qubit and Qutrit Spin ChainsMarek Sawerwain, Joanna Wisniewska. 270-279 [doi]
- A Novel Multicast Architecture of Programmable NetworksJakub Kicinski, Michal Hoeft. 280-292 [doi]
- Mobile Offloading Framework: Solution for Optimizing Mobile Applications Using Cloud ComputingHenryk Krawczyk, Michal Nykiel, Jerzy Proficz. 293-305 [doi]
- (r)/∞ Operating in Random EnvironmentChe Soong Kim, Alexander N. Dudin, Sergey Dudin, Olga S. Dudina. 306-315 [doi]
- A Model of Erlang's Ideal Grading with Multi-service Traffic SourcesSlawomir Hanczewski, Maciej Sobieraj, Joanna Weissenberg. 316-325 [doi]
- Asymptotically Work-Conserving Disciplines in Communication SystemsEvsey Morozov, Lyubov Potakhina. 326-335 [doi]
- Unreliable Queueing System with Cold RedundancyValentina I. Klimenok, Vladimir M. Vishnevsky. 336-346 [doi]
- Egalitarian Processor Sharing System with Demands of Random Space RequirementOleg M. Tikhonenko. 347-356 [doi]
- Stochastic Bounds for Markov Chains with the Use of GPUJaroslaw Bylina, Jean-Michel Fourneau, Marek Karwacki, Nihal Pekergin, Franck Quessette. 357-370 [doi]
- An Analysis of the Extracted Parts of Opte Internet TopologyMonika Nycz, Tomasz Nycz, Tadeusz Czachórski. 371-381 [doi]
- Scheduling of Isochronous Data Transactions in Compliance with QoS Restrictions in the USB 3.0 InterfaceAndrzej Kwiecien, Michal Sawicki. 382-388 [doi]
- Applications of Secure Data Exchange Method Using Social Media to Distribute Public KeysPiotr Milczarski, Krzysztof Podlaski, Artur Hlobaz. 389-399 [doi]
- Speaker Verification Performance Evaluation Based on Open Source Speech Processing Software and TIMIT Speech CorpusPiotr Klosowski, Adam Dustor, Jacek Izydorczyk. 400-409 [doi]
- Digital Filter Implementation in Hadoop Data Mining SystemDariusz Czerwinski. 410-420 [doi]
- Decentralized Social Networking Using Named-DataLeonid Zeynalvand, Mohammed Gharib, Ali Movaghar. 421-430 [doi]
- USB Data Capture and Analysis in Windows Using USBPcap and WiresharkWojciech Mielczarek, Tomasz Mon. 431-443 [doi]
- Reliability of Bluetooth Smart Technology for Indoor Localization SystemAndrzej Kwiecien, Michal Mackowski, Marek Kojder, Maciej Manczyk. 444-454 [doi]