Abstract is missing.
- Adopting a Digital Business Operating SystemJan Bosch. 1-4 [doi]
- The Role of Computer Science and Software Technology in Organizing Universities for Industry 4.0 and BeyondMehmet Aksit. 5-11 [doi]
- Kestrel-based Search Algorithm (KSA) and Long Short Term Memory (LSTM) Network for feature selection in classification of high-dimensional bioinformatics datasetsIsrael Edem Agbehadji, Richard Millham, Simon James Fong, Hongji Yang. 15-20 [doi]
- News articles similarity for automatic media bias detection in Polish news portalsKatarzyna Baraniak, Marcin Sydow. 21-24 [doi]
- Data Compression Measures for Meta-Learning SystemsMarcin Blachnik, Miroslaw Kordos, Slawomir Golak. 25-28 [doi]
- Deep Evolving Stacking Convex Cascade Neo-Fuzzy Network and Its Rapid LearningYevgeniy Bodyanskiy, Galina Setlak, Olena Vynokurova, Iryna Pliss, Olena O. Boiko. 29-33 [doi]
- Ranking Rough Sets in Pawlak Approximation SpacesZoltán Erno Csajbók, József Ködmön. 35-38 [doi]
- Automatic Assessment of Student Understanding Level using Virtual RealityShota Hashimura, Hiromitsu Shimakawa, Yusuke Kajiwara. 39-45 [doi]
- Efficient Discovery of Top-K Sequential Patterns in Event-Based Spatio-Temporal DataPiotr S. Maciag. 47-56 [doi]
- The Practical Use of Problem Encoding Allowing Cheap Fitness Computation of Mutated IndividualsMichal Przewozniczek, Marcin Komarnicki. 57-65 [doi]
- Representation Matters: An Unexpected Property of Polynomial Rings and its Consequences for Formalizing Abstract Field TheoryChristoph Schwarzweller. 67-72 [doi]
- A Non-Deterministic Strategy for Searching Optimal Number of Trees Hyperparameter in Random ForestKennedy Senagi, Nicolas Jouandeau. 73-80 [doi]
- Testing the Algorithm of Area Optimization by Binary Classification with Use of Three State 2D Cellular Automata in LayersMiroslaw Szaban, Anna Wawrzynczak. 81-84 [doi]
- Modular Multi-Objective Deep Reinforcement Learning with Decision ValuesTomasz Tajmajer. 85-93 [doi]
- Baker's Cyst Classification Using Random ForestsAdam Ciszkiewicz, Grzegorz Milewski, Jacek Lorkowski. 97-100 [doi]
- Barley Variety Recognition with Viewpoint-aware Double-stream Convolutional Neural NetworksPrzemyslaw Dolata, Jacek Reiner. 101-105 [doi]
- Pitfalls in users' evaluation of algorithms for text-based similarity detection in medical educationJakub Scavnický, Matej Karolyi, Petra Ruzicková, Andrea Pokorná, Hana Harazim, Petr Stourac, Martin Komenda. 109-116 [doi]
- Retinal Blood Vessel Segmentation Based on Multi-Scale Deep LearningMing Li, Qingbo Yin, Mingyu Lu. 117-123 [doi]
- Experiments with Classification of MMPI Profiles using Fuzzy Decision TreesKrzysztof Pancerz, Vitaly G. Levashenko, Elena Zaitseva, Jerzy Gomula. 125-128 [doi]
- Imputing Missing Values for Improved Statistical Inference Applied to Intrauterine Growth Restriction ProblemAgnieszka Wosiak, Kinga Glinka, Agata Zamecznik, Katarzyna Niewiadomska-Jarosik. 129-135 [doi]
- Adaptive Supervisor: Method of Reinforcement Learning Fault Elimination by Application of Supervised LearningMateusz Krzyszton. 139-143 [doi]
- Combining the Syntactic and Semantic Representations of Mizar ProofsKarol Pak. 145-153 [doi]
- Modelling Legal Interpretation in Structured Argumentation FrameworkTomasz Zurek, Michal Araszkiewicz. 155-158 [doi]
- A New Subject-based Document Retrieval from Digital Libraries Using Vector Space ModelSayed Mahmood Bakhshayesh, Azadeh Mohebi, Abbas Ahmadi, Amir Badamchi. 161-164 [doi]
- Automatic intonation-based keyword extraction from academic discourseNatalia Bogach, Yurij Lezhenin, Vadim Diachkov, Anton Lamtev, Artyom Zhuikov, Elena Boitsova, Evgeny Pyshkin. 165-168 [doi]
- Lithuanian Author Profiling with the Deep LearningJurgita Kapociute-Dzikiene, Robertas Damasevicius. 169-172 [doi]
- Named Property GraphsDominik Tomaszuk, Lukasz Szeremeta. 173-177 [doi]
- Regression Networks for Robust Win-rates Predictions of AI Gaming BotsLing Cen, Andrzej Ruta, Dymitr Ruta, Quang Hieu Vu. 181-184 [doi]
- A Neural Network Approach to Hearthstone Win Rate PredictionJan Jakubik. 185-188 [doi]
- Toward an Intelligent HS Deck Advisor: Lessons Learned from AAIA'18 Data Mining CompetitionAndrzej Janusz, Tomasz Tajmajer, Maciej Swiechowski, Lukasz Grad, Jacek Puczniewski, Dominik Slezak. 189-192 [doi]
- Predicting winrate of Hearthstone decks using their archetypesAnna Sztyber, Jan Betley, Adam Witkowski. 193-196 [doi]
- Predicting Win-rates of Hearthstone Decks: Models and Features that Won AAIA'2018 Data Mining ChallengeQuang Hieu Vu, Dymitr Ruta, Andrzej Ruta, Ling Cen. 197-200 [doi]
- Smart Micro-scale Energy Management and Energy Distribution in Decentralized Self-Powered Networks Using Multi-Agent SystemsStefan Bosse. 203-213 [doi]
- Sensitivity in Multi-Ensemble SchedulingJörg Bremer, Sebastian Lehnhoff. 215-223 [doi]
- A Graph-Theoretic Approach to the Train Marshalling ProblemJens Dörpinghaus, Rainer Schrader. 227-231 [doi]
- Hybrid Ant Colony Optimization Algorithm for Workforce PlanningStefka Fidanova, Gabriel Luque, Olympia Roeva, Marcin Paprzycki, Pawel Gepner. 233-236 [doi]
- Community based influence maximization in the Independent Cascade ModelLászló Hajdu, András Bóta, Miklós Krész. 237-243 [doi]
- Feature Selection in Time-Series Motion DatabasesAntonio Mucherino, Florian Elain, Ludovic Hoyet, Richard Kulpa. 245-248 [doi]
- Computing Edit Distance between Rooted Labeled CaterpillarsKohei Muraka, Takuya Yoshino, Kouichi Hirata. 249-255 [doi]
- A New Monte Carlo Algorithm for Linear Algebraic Systems Based on the "Walk on Equations" AlgorithmVenelin Todorov, Nikolay Ikonomov, Ivan Dimov, Rayna Georgieva. 257-260 [doi]
- Autonomous Graph Partitioning for Multi-Agent Patrolling ProblemsBernát Wiandt, Vilmos Simon. 261-268 [doi]
- Prediction of Alzheimer's Disease in Patients using Features of Pupil Light Reflex to Chromatic StimuliMinoru Nakayama, Wioletta Nowak, Tomasz Krecicki, Andrzej Hachol. 273-277 [doi]
- Towards Amblyopia Therapy Using Mixed Reality TechnologyAdam Nowak, Mikolaj Wozniak, Michal Pieprzowski, Andrzej Romanowski. 279-282 [doi]
- Contextual processing of electrical capacitance tomography measurement data for temporal modeling of pneumatic conveying processAndrzej Romanowski. 283-286 [doi]
- Supporting gastroesophageal reflux disease diagnostics by using wavelet analysis in esophageal pH-metryPiotr Tojza, Grzegorz Redlarski, Maria Janiak. 287-294 [doi]
- Computation of Gauss-Jacobi Quadrature Nodes and Weights with Arbitrary PrecisionDariusz Brzezinski. 297-306 [doi]
- An effective sparse storage scheme for GPU-enabled uniformization methodBeata Bylina, Jaroslaw Bylina, Marek Karwacki. 307-310 [doi]
- Multithreaded Parallelization of the Finite Element Method Algorithms for Solving Physically Nonlinear ProblemsSergiy Fialko, Viktor Karpilovskyi. 311-318 [doi]
- On the energy consumption of Load/Store AVX instructionsThomas Jakobs, Gudula Rünger. 319-327 [doi]
- On the Autotuning Potential of Time-stepping methods from Scientific ComputingNatalia Kalinnik, Robert Kiesel, Thomas Rauber, Marcel Richter, Gudula Rünger. 329-338 [doi]
- Analyzing energy/performance trade-offs with power capping for parallel applications on modern multi and many core processorsAdam Krzywaniak, Jerzy Proficz, Pawel Czarnul. 339-346 [doi]
- Acceleration of 3D ECT image reconstruction in heterogeneous, multi-GPU, multi-node distributed systemMichal Majchrowicz, Pawel Kapusta, Lidia Jackowska-Strumillo, Dominik Sankowski. 347-350 [doi]
- An Experimental Analysis on Scalable Implementations of the Alternating Least Squares AlgorithmDânia Meira, José Viterbo, Flávia Bernardini. 351-359 [doi]
- An Improved Architecture of a Hardware Accelerator for Factoring Integers with Elliptic Curve MethodMichal Andrzejczak. 363-368 [doi]
- Graph-based quantitative description of networks' slices isolationZbigniew Kotulski, Tomasz Nowak, Mariusz Sepczuk, Marcin Alan Tunia. 369-379 [doi]
- Improving pseudorandom generator on cellular automata with bent functionsAlla Levina, Daniyar Mukhamedjanov, Gleb Ryaskin, Dmitrij Kaplun. 381-385 [doi]
- Parametric Hash Function Resistant to Attack by Quantum ComputerPolina Sazonova, Sergey Krendelev. 387-390 [doi]
- A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environmentMichal Srokosz, Damian Rusinek, Bogdan Ksiezopolski. 391-395 [doi]
- On the implementation of new symmetric ciphers based on non-bijective multivariate mapsVasyl Ustimenko, Urszula Romanczuk-Polubiec, Aneta Wróblewska, Monika Polak, Eustrat Zhupa. 397-405 [doi]
- Group Anonymity in Security ProtocolsFerucio Laurentiu Tiplea, Cosmin Vârlan. 407-416 [doi]
- Visualization of logical formulasRadoslaw Klimek. 419-424 [doi]
- Siphon-based deadlock detection in Integrated Model of Distributed Systems (IMDS)Wiktor B. Daszczuk. 425-435 [doi]
- Job-shop scheduling with machine breakdown prediction under completion time constraintLukasz Sobaszek, Arkadiusz Gola, Edward Kozlowski. 437-440 [doi]
- Lecturers' competences configuration model for the timetabling problemJaroslaw Wikarek. 441-444 [doi]
- Generation of Synthetic Business Process Traces using Constraint ProgrammingPiotr Wisniewski 0003, Krzysztof Kluza, Antoni Ligeza, Anna Suchenia. 445-453 [doi]
- Do Actions Speak Louder Than Words? Predicting Influence in Twitter using Language and Action FeaturesFatima Al-Raisi, Shadab Alam, Bruno Vavala, Mao Sheng Liu. 457-464 [doi]
- Towards semantic search for mathematical notationAgnieszka Bier, Zdzislaw Sroczynski. 465-469 [doi]
- What was the Question? A Systematization of Information Retrieval and NLP ProblemsJens Dörpinghaus, Johannes Darms, Marc Jacobs. 471-478 [doi]
- A neural framework for online recognition of handwritten Kanji charactersMalgorzata Grebowiec, Jaroslaw Protasiewicz. 479-483 [doi]
- Automatic Extraction of Synonymous Collocation Pairs from a Text CorpusNina Khairova, Svitlana Petrasova, Wlodzimierz Lewoniewski, Mamyrbayev Orken, Mukhsina Kuralai. 485-488 [doi]
- Evaluating Combinations of Classification Algorithms and Paragraph Vectors for News Article ClassificationJohannes Lindén, Stefan Forsström, Tingting Zhang. 489-495 [doi]
- Voice control in mixed realityDawid Polap. 497-500 [doi]
- Classification of Computer Network Users with Convolutional Neural NetworksJakub Nowak, Marcin Korytkowski, Rafal Scherer. 501-504 [doi]
- Methodology of Constructing and Analyzing the Hierarchical Contextually-Oriented CorporaNina Rizun, Yurii Taranenko. 505-514 [doi]
- A Comparative Study of Classifying Legal Documents with Neural NetworksSamir Undavia, Adam Meyers, John Ortega. 515-522 [doi]
- Immersive Virtual Reality for Earth SciencesIlario Gabriele Gerloni, Vincenza Carchiolo, Fabio Vitello, Eva Sciacca, Ugo Becciani, Alessandro Costa, Simone Riggi, Fabio Luca Bonali, Elena Russo, Luca Fallati, Fabio M. Marchese, Alessandro Tibaldi. 527-534 [doi]
- Image Clustering Method based on Particle Swarm OptimizationIgor V. Kotenko, Iuliia Kim, Anastasia Matveeva, Ilya I. Viksnin. 535-544 [doi]
- The impact of parallel programming on faster image filteringKamil Ksiazek, Zbigniew Marszalek, Giacomo Capizzi, Christian Napoli, Dawid Polap, Marcin Wozniak. 545-550 [doi]
- A Multimedia Signal Processing Cloud Concept for Low Delay Audio and Video Streaming via the Public InternetChristoph Kuhr, Alexander Carôt. 551-554 [doi]
- Query by Approximate Shapes Image Retrieval with improved object sketch extraction algorithmStanislaw Deniziak, Tomasz Michno. 555-559 [doi]
- Study of the Influence of a Light Source on the Result of the Reconstruction of the Flaccid Membrane of an Artificial HeartKrzysztof Murawski, Wojciech Sulej. 561-568 [doi]
- Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading ChannelsGuillermo Morales-Luna, Valery I. Korzhik, Aleksandr Gerasimovich, Cuong Nguyen, Vladimir Starostin, Victor Yakovlev, Muaed Kabardov. 569-576 [doi]
- MATLAB Implementation of an Adaptive Neuro-Fuzzy Modeling Approach applied on Nonlinear Dynamic Systems - a Case StudyRoxana-Elena Tudoroiu, Mohammed Zaheeruddin, Nicolae Tudoroiu, Dumitru Dan Burdescu. 577-583 [doi]
- Feature Extraction of Binaural Recordings for Acoustic Scene ClassificationSlawomir Zielinski, Hyunkook Lee. 585-588 [doi]
- Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal MetrologyAlexander Oppermann, Marko Esche, Florian Thiel, Jean-Pierre Seifert. 593-602 [doi]
- Probabilistic Block CipherDmitry Shishlyannikov, Nikita Zbitnev, Dmitry Gridin. 603-606 [doi]
- Volatile memory-centric investigation of SMS-hijacked phones: a Pushbullet case studyMark Vella, Vishwas Rudramurthy. 607-616 [doi]
- Novel Solutions for Smart Cities - Creating Air Pollution Maps Based on Intelligent SensorsMarzena Banach, Tomasz Talaska, Rafal Dlugosz. 619-622 [doi]
- Raspberry Pi as an Inexpensive Platform for Real-Time Traffic Jam Analysis on the RoadRobert Baumgartl, Dirk Müller 0002. 623-627 [doi]
- Rapid Embedded Systems Prototyping - an effective approach to embedded systems developmentRobert Brzoza-Woch, Lukasz Gurdek, Tomasz Szydlo. 629-636 [doi]
- FetchIoT: Efficient Resource Fetching for the Internet of ThingsBadis Djamaa, Mohamed Amine Kouda, Ali Yachir, Tayeb Kenaza. 637-643 [doi]
- Using Publish/Subscribe for Short-lived IoT DataFrank Trethan Johnsen. 645-649 [doi]
- Identifying Hidden Influences of Traffic Incidents' effect in Smart CitiesAttila Matyas Nagy, Vilmos Simon. 651-658 [doi]
- Performance Analysis of Slotted ALOHA Systems with Energy Harvesting Nodes and Retry Limit Using DTMC ModelKatsumi Sakakibara, Yoji Nakata, Kento Takabayashi. 659-663 [doi]
- Universal serial bus as a communication medium for prototype networked data acquisition and control systems - performance optimisation and evaluationAndrzej Tutaj, Jacek Augustyn. 665-674 [doi]
- Attribute Selection with Filter and Wrapper: An Application on Incident Management ProcessClaudio Aparecido Lira do Amaral, Marcelo Fantinato, Sarajane Marques Peres. 679-682 [doi]
- Scoring method versus TOPSIS method in the evaluation of e-bankingWitold Chmielarz, Marek Zborowski. 683-689 [doi]
- Analysis of Selected Internet Platforms of Distributors of Computer Games in the Assessment of UsersWitold Chmielarz, Oskar Szumski. 691-695 [doi]
- Cloud Platform Real-time Measurement and Verification Procedure for Energy Efficiency of Washing MachinesPedram Memari, Seyedeh Samira Mohammadi, Seyed Farid Ghaderi. 697-700 [doi]
- Comparative Analysis of Big Data and BI ProjectsGloria J. Miller. 701-705 [doi]
- Applying Formal Methods to Specify Security Requirements in Multi-Agent SystemsVinitha Hannah Subburaj, Joseph E. Urban. 707-714 [doi]
- An Approach to Transforming Requirements into Evaluable UI Design for Contextual Practice - A Design Science Research PerspectiveMatthias Walter. 715-724 [doi]
- The ICT Adoption in Government Units in the Context of the Sustainable Information SocietyEwa Ziemba. 725-733 [doi]
- A Geofencing Algorithm Fit for Supply Chain ManagementVincenza Carchiolo, Paolo Walter Modica, Mark Philip Loria, Marco Toja, Michele Malgeri. 737-746 [doi]
- Enhancing Project Management for Cyber-physical Systems DevelopmentMarcelo Fantinato, Filipe Palma, Laura Rafferty, Patrick Hung. 747-750 [doi]
- Towards a Language to Support Value Cocreation: An Extension to the ArchiMate Modeling FrameworkChristophe Feltus, Erik H. A. Proper, Kazem Haki. 751-760 [doi]
- An Exploration of BPM Adoption Factors: Initial Steps for Model DevelopmentRenata Gabryelczyk. 761-768 [doi]
- MCDA-based Approach to Sustainable Supplier SelectionArtur Karczmarczyk, Jaroslaw Watróbski, Grzegorz Ladorucki, Jaroslaw Jankowski. 769-778 [doi]
- Information System Backsourcing: A Systematic Literature AnalysisChristian Leyh, Thomas Schäffer, Trung Duc Nguyen. 779-788 [doi]
- Prospective Financial Assessment Based on Real Options in Small and Medium-Sized CompanyBartlomiej Nita, Piotr Oleksyk, Jerzy Korczak, Helena Dudycz. 789-793 [doi]
- e-Assessment Management System for Comprehensive Assessment of Medical Students KnowledgeJaroslav Majerník. 795-799 [doi]
- Collective clustering of marketing data - recommendation system UpsailyMaciej Pondel, Jerzy Korczak. 801-810 [doi]
- Utilizing online collaborative games to facilitate Agile Software DevelopmentAdam Przybylek, Wojciech Kowalski. 811-815 [doi]
- Towards a Framework for Semi-Automated Annotation of Human Order Picking Activities Using Motion CapturingChristopher Reining, Fernando Moya Rueda, Michael ten Hompel, Gernot A. Fink. 817-821 [doi]
- The model of local e-administration developmentAgnieszka Agata Tomaszewicz. 823-826 [doi]
- RC-ASEF: An open-source tool-supported requirements elicitation framework for context-aware systems developmentUnai Alegre Ibarra, Juan Carlos Augusto, Carl Evans. 829-838 [doi]
- Performance evaluation of trading strategies in multi-agent systems - Case of A-TraderMarcin Hernes, Jerzy Korczak. 839-844 [doi]
- Mining e-mail message sequences from log dataPawel Weichbroth. 845-848 [doi]
- Model-driven Query Generation for ElasticsearchBerkay Akdal, Zehra Gül Çabuk Keskin, Erdem Eser Ekinci, Geylani Kardas. 853-862 [doi]
- Approaches to Semantic Mutation of Behavioral State Machines in Model-Driven Software DevelopmentAnna Derezinska, Lukasz Zaremba. 863-866 [doi]
- Reverse Engineering of Legacy Software Interfaces to a Model-Based ApproachMathijs Schuts, Jozef Hooman, Ivan Kurtev, Dirk-Jan Swagerman. 867-876 [doi]
- Optimizing the Number of Bluetooth Beacons with Proximity Approach at Decision Points for Intermodal Navigation of Blind PedestriansJakub Berka, Jan Balata, Zdenek Míkovec. 879-886 [doi]
- A mixed reality application for sketching in prototyping workshopsKatia Cirillo, Nico Koprowski, Sascha Herr, Omar Sánchez. 887-891 [doi]
- Stereoscopy in Graphics APIs for CAVE ApplicationsJerzy Redlarski, Robert Trzosowski, Mateusz Kowalski, Blazej Kowalski, Jacek Lebiedz. 893-896 [doi]
- Assessing the Communicability of Human-Data Interaction Mechanisms in Transparency Enhancing ToolsPatrick Santos, Luciana Salgado, José Viterbo. 897-906 [doi]
- The functional design method for buildings (FDM) with gamification of information models and AI help to design safer buildingsJukka Selin, Markku Rossi. 907-911 [doi]
- An Analysis of Game-Related Emotions Using EMOTIV EPOCAlicja Wieczorkowska, Jerzy Kosinski, Krzysztof Szklanny, Marcin Wichrowski. 913-917 [doi]
- Exploring EMG gesture recognition - interactive armband for audio playback controlMikolaj Wozniak, Patryk Pomykalski, Dawid Sielski, Krzysztof Grudzien, Natalia Paluch, Zbigniew Chaniecki. 919-923 [doi]
- Lessons Learned on Communication Channels and Practices in Agile Software DevelopmentMuhammad Ovais Ahmad, Valentina Lenarduzzi, Markku Oivo, Davide Taibi. 929-938 [doi]
- Model Driven Architecture and Agile Methodologies: Reflexion and discussion of their combinationImane Essebaa, Salima Chantit. 939-948 [doi]
- Scrum Adoption Challenges Detection Model: SACDMRidewaan Hanslo, Ernest Mnkandla. 949-957 [doi]
- Assessing Effectiveness of Recommendations to Requirements-Related Problems through Interviews with ExpertsAleksander Jarzebowicz, Wojciech Slesinski. 959-968 [doi]
- Agile to Lean Software Development Transformation: a Systematic Literature ReviewFilip Kiss, Bruno Rossi 0001. 969-973 [doi]
- Problems and Solutions of Software Design in Scrum ProjectsJakub Miler, Kamil Kajdy. 975-978 [doi]
- Hard lessons learned: A model that facilitates the selection of methods of IT project managementKrzysztof Redlarski. 979-983 [doi]
- The Role of a Software Product Manager in Various Business EnvironmentsOlga Springer, Jakub Miler. 985-994 [doi]
- What Can Go Wrong in a Software Project? Have Fun Solving ItMiguel Ehécatl Morales-Trujillo, Gabriel Alberto García-Mireles, Polina Maslova. 995-1004 [doi]
- Usability attributes revisited: a time-framed knowledge mapPawel Weichbroth. 1005-1008 [doi]
- MaliciousIDE - software development environment that evokes emotionsMichal Wróbel, Adam Zielke. 1009-1012 [doi]
- Improved Analogy-based Effort Estimation with Incomplete Mixed DataIbtissam Abnane, Ali Idri. 1015-1024 [doi]
- A Cost Model for Hybrid Storage Systems in a Cloud FederationsAmina Chikhaoui, Kamel Boukhalfa, Jalil Boukhobza. 1025-1034 [doi]
- Interactive development of cyber physical systems using UETPN modelAttila Ors Kilyen, Tiberiu Letia. 1035-1042 [doi]
- The Evolution of a Healthcare Software Framework: Reuse, Evaluation and Lessons LearnedAlessandra A. Macedo, José Augusto Baranauskas, Renato Bulcão Neto. 1043-1051 [doi]
- Deep Object Comparison for Interface-based Regression Testing of Software ComponentsTomas Potuzak, Richard Lipka. 1053-1062 [doi]
- ECG Signal Analysis for Troponin Level Assessment and Coronary Artery Disease Detection: the NEEDED Study 2014Dominika Dlugosz, Aleksandra Królak, Trygve Eftestøl, Stein Ørn, Tomasz Wiktorski, Kay Raymond Jenssen Oskal, Martin Nygård. 1065-1068 [doi]
- The Design of Digital Filter System used in Stimulation with Tomatis MethodKrzysztof Józwiak, Michal Bujacz, Aleksandra Królak. 1069-1072 [doi]
- New Grid for Particle Filtering of Multivariable Nonlinear ObjectsPiotr Kozierski, Jacek Michalski, Talar Sadalla, Wojciech Giernacki, Joanna Zietkiewicz, Szymon Drgas. 1073-1077 [doi]
- UAV downwash dynamic texture features for terrain classification on autonomous navigationJoão Pedro Matos-Carvalho, José Manuel Fonseca, André Damas Mora. 1079-1083 [doi]
- MDPC decoding algorithms and their impact on the McEliece cryptosystemArtur Janoska. 1085-1089 [doi]