Abstract is missing.
- Real-Time Traffic over the Cognitive Packet NetworkLan Wang, Erol Gelenbe. 3-21 [doi]
- Expanding the Ns-2 Emulation Environment with the Use of Flexible MappingRobert R. Chodorek, Agnieszka Chodorek. 22-31 [doi]
- Monitoring and Analysis of Measured and Modeled Traffic of TCP/IP NetworksOlga Fedevych, Ivanna Droniuk, Maria Nazarkevych. 32-41 [doi]
- Investigating Long-Range Dependence in E-Commerce Web TrafficGrazyna Suchacka, Adam Domanski. 42-51 [doi]
- More Just Measure of Fairness for Sharing Network ResourcesKrzysztof Nowicki, Aleksander Malinowski, Marcin Sikorski. 52-58 [doi]
- Classification of Solutions to the Minimum Energy Problem in One Dimensional Sensor NetworksZbigniew Lipinski. 59-71 [doi]
- Detection of Malicious Data in Vehicular Ad Hoc Networks for Traffic Signal Control ApplicationsBartlomiej Placzek, Marcin Bernas. 72-82 [doi]
- Anti-evasion Technique for the Botnets Detection Based on the Passive DNS Monitoring and Active DNS ProbingOksana Pomorova, Oleg Savenko, Sergii Lysenko, Andrii Kryshchuk, Kira Bobrovnikova. 83-95 [doi]
- Measuring Client-Server AnonymityRajiv Bagai, Huabo Lu. 96-106 [doi]
- Probabilistic Model Checking of Security Protocols without Perfect Cryptography AssumptionOlga Siedlecka-Lamch, Miroslaw Kurkowski, Jacek Piatkowski. 107-117 [doi]
- High-Interaction Linux Honeypot Architecture in Recent PerspectiveTomas Sochor, Matej Zuzcak. 118-131 [doi]
- About the Efficiency of Malware Monitoring via Server-Side HoneypotsMiroslaw Skrzewski. 132-140 [doi]
- Algorithms for Transmission Failure Detection in a Communication System with Two BusesAndrzej Kwiecien, Blazej Kwiecien, Michal Mackowski. 141-153 [doi]
- A Failure Influence on Parameters of Real-Time System with Two BusesAndrzej Kwiecien, Blazej Kwiecien, Michal Mackowski. 154-167 [doi]
- Event-Driven Approach to Modeling and Performance Estimation of a Distributed Control SystemWojciech Rzasa, Dariusz Rzonca. 168-179 [doi]
- QoE-Oriented Fairness Control for DASH Systems Based on the Hierarchical Structure of SVC StreamsSlawomir Przylucki, Dariusz Czerwinski, Artur Sierszen. 180-191 [doi]
- The Impact of the Degree of Self-Similarity on the NLREDwM Mechanism with Drop from Front StrategyAdam Domanski, Joanna Domanska, Tadeusz Czachórski. 192-203 [doi]
- Influence of Noise and Voice Activity Detection on Speaker VerificationAdam Dustor. 207-215 [doi]
- Load Balancing in LTE by Tx Power AdjustmentKrzysztof Grochla, Konrad Polys. 216-225 [doi]
- USB 3.1 Gen 1 Hub Time Delay Influence on System Timeout and Bus Clock SynchronizationWojciech Mielczarek, Michal Sawicki. 226-234 [doi]
- Quantum Network Protocol for Qudits with Use of Quantum Repeaters and Pauli Z-Type Operational ErrorsMarek Sawerwain, Joanna Wisniewska. 237-246 [doi]
- Multi-level Virtualization and Its Impact on System Performance in Cloud ComputingPawel Lubomski, Andrzej Kalinowski, Henryk Krawczyk. 247-259 [doi]
- Ping-Pong Protocol Eavesdropping in Almost Perfect ChannelsPiotr Zawadzki. 260-268 [doi]
- A Regeneration-Based Estimation of High Performance Multiserver SystemsEvsey Morozov, Ruslana Nekrasova, Irina Peshkova, Alexander Rumyantsev. 271-282 [doi]
- Queuing Model of the Access System in the Packet NetworkSlawomir Hanczewski, Maciej Stasiak, Joanna Weissenberg, Piotr Zwierzykowski. 283-293 [doi]
- A Study of IP Router Queues with the Use of Markov ModelsTadeusz Czachórski, Adam Domanski, Joanna Domanska, Artur Rataj. 294-305 [doi]
- Analysis of a Queueing Model with Contingent Additional ServerChe Soong Kim, Alexander N. Dudin. 306-315 [doi]
- A Dual Tandem Queue with Multi-server Stations and LossesValentina I. Klimenok, Vladimir Vishnevsky. 316-325 [doi]
- Adjustable Sampling Rate - An Efficient Way to Reduce the Impact of Network-Induced Uncertainty in Networked Control Systems?Michal Morawski, Przemyslaw Ignaciuk. 329-343 [doi]
- A SIP-Based Home Gateway for Domotics Systems: From the Architecture to the PrototypeRosario Giuseppe Garroppo, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Luca Tavanti. 344-359 [doi]
- The Cloud Computing Stream Analysis System for Road Artefacts DetectionMarcin Badurowicz, Tomasz Cieplak, Jerzy Montusiewicz. 360-369 [doi]
- RSSI-Based Localisation of the Radio Waves Source by Mobile AgentsDariusz Czerwinski, Slawomir Przylucki, Dmitry Mukharsky. 370-383 [doi]
- Evolutionary Scanner of Web Application VulnerabilitiesDariusz Palka, Marek Zachara, Krzysztof Wójcik. 384-396 [doi]
- Data Transformation Using Custom Class Generator as Part of Systems Integration in Manufacturing CompanyJacek Pekala. 397-409 [doi]
- Signal Recognition Based on Multidimensional Optimization of Distance Function in Medical ApplicationsKrzysztof Wójcik, Bogdan Wzietek, Piotr Wzietek, Marcin Piekarczyk. 410-420 [doi]
- Determining the Popularity of Design Patterns Used by Programmers Based on the Analysis of Questions and Answers on Stackoverflow.com Social NetworkDaniel Czyczyn-Egird, Rafal Wojszczyk. 421-433 [doi]