


default search action
Annales UMCS, Informatica, Volume 12
Volume 12, Number 1, June 2012
- Mariusz Maciuk, Wieslawa Kuniszyk-Józkowiak, Anna Doboszynska, Marta Maciuk:

Analysis of lung auscultatory phenomena using the Wigner-Ville Distribution. 7-16 - Grzegorz Pawinski, Krzysztof Sapiecha:

Resource Allocation Optimization in Critical Chain Method. 17-29 - Tadeusz Zloto, Pawel Ptak, Tomasz Prauzner:

Analysis of signals from inductive sensors by means of the DasyLab software. 31-37 - Bartosz Ziólko, Maciej Kruk:

Automatic reasoning in the Planet Wars game. 39-45 - Zbigniew Omiotek:

A method for QoS differentiation in DiffServ networks based on the long-term properties of a video stream. 47-56 - Pawel Dymora, Miroslaw Mazurek, Dominik Strzalka, Marcin Piekos:

Influence of batch structure on cluster computing performance - complex systems approach. 57-66 - Khalil Challita:

The Meeting Businessmen Problem: Requirements and Limitations. 67-77 - Artur Kornatka:

Generating of Business Database Application Elements. 79-87
Volume 12, Number 2, June 2012
- Joanna Kapusta, Ryszard Smarzewski:

Fast multidimensional Bernstein-Lagrange algorithms. 7-18 - Wieslawa Kuniszyk-Józkowiak, Janusz Jaszczuk, Tomasz Sacewicz, Ireneusz Codello:

Time-frequency Analysis of the EMG Digital Signals. 19-25 - Halina Bielak, Michal Panczyk:

A self-stabilizing algorithm for finding weighted centroid in trees. 27-37 - Ireneusz Codello, Wieslawa Kuniszyk-Józkowiak, Elzbieta Smolka, Adam Kobus:

Automatic disordered sound repetition recognition in continuous speech using CWT and kohonen network. 39-48 - Pawel Dymora, Miroslaw Mazurek, Dominik Strzalka:

Long-range dependencies in reading memory pages in the man-computer system interaction. 49-58 - Pawel Dymora, Miroslaw Mazurek, Slawomir Nieroda:

Sensor network infrastructure for intelligent building monitoring and management system. 59-71 - Alina-Mihaela Badescu:

A comparison of different modulation techniques performances in an underground multiuser communications scenario. 73-85 - Tomasz Prauzner, Pawel Ptak:

The role of standardization in the development of e-learning. 87-92
Volume 12, Number 3, September 2012
- Tomasz Bilski, Krzysztof Bucholc, Anna Grocholewska-Czurylo, Janusz Stoklosa:

Parameterized Hash Functions. 11-24 - Mateusz Buczek:

Attacks on StreamHash 2. 25-35 - Sébastien Varrette, Jakub Muszynski, Pascal Bouvry

:
Hash function generation by means of Gene Expression Programming. 37-53 - Renata Kawa, Mieczyslaw Kula:

A Remark on Hierarchical Threshold Secret Sharing. 55-64 - Vasyl Ustimenko, Aneta Wróblewska:

Dynamical systems as the main instrument for the constructions of new quadratic families and their usage in cryptography. 65-74 - Mariusz Borowski, Marek Lesniewicz

, Robert Wicik, Marcin Grzonkowski:
Generation of random keys for cryptographic systems. 75-87 - Urszula Romanczuk, Vasyl Ustimenko:

On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2. 89-106 - Monika Polak, Vasyl Ustimenko:

LDPC Codes Based on Algebraic Graphs. 107-119 - Ashraf M. Emam, Mahmoud M. Ouf:

Performance Evaluation of Different Universal Steganalysis Techniques in JPG Files. 121-139
Volume 12, Number 4, December 2012
- Nicolas Bernard, Franck Leprévost:

Hardened Bloom Filters, with an Application to Unobservability. 11-22 - Vaidas Juzonis, Nikolaj Goranin

, Antanas Cenys, Dmitrij Olifer:
Specialized Genetic Algorithm Based Simulation Tool Designed For Malware Evolution Forecasting. 23-37 - Franciszek Seredynski, Jaroslaw Skaruz, Adrian Piraszewski:

Image reconstruction with the use of evolutionary algorithms and cellular automata. 39-49 - Urszula Krawczyk, Piotr Sapiecha:

Automatic detection of DoS vulnerabilities of cryptographic protocols. 51-67 - Bogdan Ksiezopolski

, Damian Rusinek, Adam Wierzbicki:
On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML). 69-81 - Xiaobing He, Pawel Szalachowski, Zbigniew Kotulski

, Nikos Fotiou, Giannis F. Marias, George C. Polyzos, Hermann de Meer:
Energy-aware Key Management in Mobile Wireless Sensor Networks. 83-96 - Grzegorz Orynczak, Zbigniew Kotulski

:
Notary-based self-healing mechanism for centralized peer-to-peer infrastructures. 97-112 - Marcin Alan Tunia:

Distributed Social Network - data security. 113-122 - Wioletta Wójtowicz, Marek R. Ogiela:

Security issues on digital watermarking algorithms. 123-139

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














