Abstract is missing.
- Application Level Execution Model for Transparent Distributed ComputingRazvan-Mihai Aciu, Horia Ciocarlie. 1-10 [doi]
- Software Support of the Risk Reduction Assessment in the ValueSec Project Flood Use CaseJacek Baginski. 11-24 [doi]
- Risk Assessment Aspects in Mastering the Value Function of Security MeasuresAndrzej Bialas. 25-39 [doi]
- Reduction of Computational Cost in Mutation Testing by Sampling MutantsIlona Bluemke, Karol Kulesza. 41-51 [doi]
- Use of Neural Network Algorithms in Prediction of XLPE HV Insulation Properties under Thermal AgingBoukezzi Larbi, Boubakeur Ahmed. 53-61 [doi]
- Computer Simulation Analysis of Cluster Model of Totally-Connected Flows on the Chain MailAlexander P. Buslaev, Pavel M. Strusinskiy. 63-73 [doi]
- Assessment of Network Coding Mechanism for the Network Protocol Stack 802.15.4/6LoWPANMichal Bylak, Dariusz Laskowski. 75-82 [doi]
- Reliability Analysis of Discrete Transportation Systems Using Critical StatesDariusz Caban, Tomasz Walkowiak. 83-92 [doi]
- A Reference Model for the Selection of Open Source Tools for Requirements ManagementBartosz Chrabski, Cezary Orlowski. 93-107 [doi]
- A Probabilistic Approach to the Count-To-Infinity Problem in Distance-Vector Routing AlgorithmsAdam Czubak. 109-118 [doi]
- A Quality Estimation of Mutation Clustering in C# ProgramsAnna Derezinska. 119-129 [doi]
- Using Virtualization Technology for Fault-Tolerant Replication in LANFernando Dettoni, Lau Cheuk Lung, Aldelir Fernando Luiz. 131-140 [doi]
- Quantification of Simultaneous-AND Gates in Temporal Fault TreesErnest Edifor, Martin Walker, Neil A. Gordon. 141-151 [doi]
- Improving of Non-Interactive Zero-Knowledge Arguments Using Oblivious TransferAlexander Frolov. 153-171 [doi]
- Virtual Environment for Implementation and Testing Private Wide Area Network SolutionsMariusz Gola, Adam Czubak. 173-182 [doi]
- Optimization of Privacy Preserving Mechanisms in Mining Continuous PatternsMarcin Gorawski, Pawel Jureczek. 183-194 [doi]
- Technical and Program Aspects on Monitoring of Highway Flows (Case Study of Moscow City)M. G. Gorodnichev, A. N. Nigmatulin. 195-204 [doi]
- Integral Functionals of semi-Markov Processes in Reliability ProblemsFranciszek Grabski. 205-213 [doi]
- Generating Repair Rules for Database Integrity MaintenanceFeras Hanandeh, Yaser Quasmeh. 215-224 [doi]
- Optimization Algorithm for the Preservation of Sensor CoverageCodruta-Mihaela Istin, Horia Ciocarlie, Razvan Aciu. 225-235 [doi]
- Methods for Detecting and Analyzing Hidden FAT32 Volumes Created with the Use of Cryptographic ToolsIreneusz Jozwiak, Michal Kedziora, Aleksandra Melinska. 237-244 [doi]
- Critical Infrastructures Safety Assessment Combining Fuzzy Models and Bayesian Belief Network under UncertaintiesVyacheslav S. Kharchenko, Eugene Brezhniev, Vladimir V. Sklyar, Artem Boyarchuk. 245-254 [doi]
- Towards Evolution Methodology for Service-Oriented SystemsSzymon Kijas, Andrzej Zalewski. 255-273 [doi]
- The LVA-Index in ClusteringPiotr Lasek. 275-283 [doi]
- Three Different Approaches in Pedestrian Dynamics Modeling - A Case StudyRobert Lubas, Janusz Miller, Marcin Mycek, Jakub Porzycki, Jaroslaw Was. 285-294 [doi]
- The End-To-End Rate Adaptation Application for Real-Time Video MonitoringPiotr Lubkowski, Dariusz Laskowski. 295-305 [doi]
- Discrete Transportation Systems Quality Performance Analysis by Critical States DetectionJacek Mazurkiewicz, Tomasz Walkowiak. 307-314 [doi]
- An Expanded Concept of the Borrowed Time as a Mean of Increasing the Average Speed Isotropy on Regular GridsMarcin Mycek. 315-324 [doi]
- Freshness Constraints in the RT FrameworkWojciech Pikulski, Krzysztof Sacha. 325-334 [doi]
- Transformational Modeling of BPMN Business Process in SOA ContextAndrzej Ratkowski. 335-344 [doi]
- Algorithmic and Information Aspects of the Generalized Transportation Problem for Linear Objects on a Two Dimensional LatticeAnton Shmakov. 345-352 [doi]
- Reliability Assessment of Supporting Satellite System EGNOSMiroslaw Siergiejczyk, Adam Rosinski, Karolina Krzykowska. 353-363 [doi]
- Vbam - Byzantine Atomic Multicast in LAN Based on Virtualization TechnologyMarcelo Ribeiro Xavier Silva, Lau Cheuk Lung, Leandro Quibem Magnabosco, Luciana de Oliveira Rech. 365-374 [doi]
- An Approach to Automated Verification of Multi-Level Security System ModelsAndrzej Stasiak, Zbigniew Zielinski. 375-388 [doi]
- A Web Service-Based Platform for Distributed Web Applications IntegrationPawel Stelmach, Lukasz Falas. 389-398 [doi]
- Universal Platform for Composite Data Stream Processing Services ManagementPawel Stelmach, Patryk Schauer, Adam Kokot, Maciej Demkiewicz. 399-407 [doi]
- Proposal of Cost-Effective Tenant-Based Resource Allocation Model for a SaaS SystemWojciech Stolarz, Marek Woda. 409-420 [doi]
- Automatic Load Testing of Web Application in SaaS ModelEmil Stupiec, Tomasz Walkowiak. 421-430 [doi]
- Implementing Salsa20 vs. AES and Serpent Ciphers in Popular-Grade FPGA DevicesJaroslaw Sugier. 431-438 [doi]
- On Testing Wireless Sensor NetworksTomasz R. Surmacz, Bartosz Wojciechowski, Maciej Nikodem, Mariusz Slabicki. 439-448 [doi]
- Towards Precise Architectural Decision ModelsMarcin Szlenk. 449-458 [doi]
- Slot Selection Algorithms for Economic Scheduling in Distributed Computing with High QoS RatesVictor V. Toporkov, Anna S. Toporkova, Alexey Tselishchev, Dmitry Yemelyanov. 459-468 [doi]
- K-Induction Based Verification of Real-Time Safety Critical SystemsTamás Tóth, András Vörös, István Majzik. 469-478 [doi]
- Native Support for Modbus RTU Protocol in Snort Intrusion Detection SystemWojciech Tylman. 479-487 [doi]
- SCADA Intrusion Detection Based on Modelling of Allowed Communication PatternsWojciech Tylman. 489-500 [doi]
- System for Estimation of Patient's State - Discussion of the ApproachWojciech Tylman, Tomasz Waszyrowski, Andrzej Napieralski, Marek Kaminski, Zbigniew Kulesza, Rafal Kotas, Pawel Marciniak, Radoslaw Tomala, Maciej Wenerski. 501-511 [doi]
- Dependability Aspects of Autonomic Cooperative Computing SystemsMichal Wódczak. 513-521 [doi]
- Life Cycle Cost through ReliabilityManac'h Yann-Guirec, Benfriha Khaled, Aoussat Améziane. 523-530 [doi]
- Verification of Infocommunication System Components for Modeling and Control of Saturated Traffic in MegalopolisMarina V. Yashina, Andrew V. Provorov. 531-542 [doi]
- Shuffle-Based Verification of Component CompatibilityWlodzimierz M. Zuberek. 543-552 [doi]