|
Issue |
Title |
|
Vol 10, No 2 (2010) |
Learning with a game |
Abstract
PDF
|
Zuzana Kureková, Lucia Záhumenská |
|
Vol 10, No 2 (2010) |
Level-oriented universal visual representation environment |
Abstract
PDF
|
Leszek Rybicki, Marta Burzańska |
|
Vol 5, No 1 (2006) |
Linux based Live CD on optical disks |
Abstract
PDF
|
Michał Chromiak, Andrzej Góźdź |
|
Vol 14, No 3 (2014) |
Liquid computing and analysis of sound signals |
Abstract
PDF
|
Rafał Cebryk, Grzegorz M. Wójcik |
|
Vol 1, No 1 (2003) |
Liquid state machine built of Hodgkin-Huxley neurons-pattern recognition and informational entropy |
Abstract
PDF
|
Wiesław A. Kamiński, Grzegorz M. Wójcik |
|
Vol 14, No 3 (2014) |
Load balancing of communication channels with the use of routing protocols |
Abstract
PDF
|
Franciszek Grabowski, Marek Bolanowski, Andrzej Paszkiewicz |
|
Vol 12, No 2 (2012) |
Long-range dependencies in reading memory pages in the man-computer system interaction |
Abstract
PDF
|
Paweł Dymora, Mirosław Mazurek, Dominik Strzałka |
|
Vol 6, No 1 (2007) |
Markowitz scheme for the sparse WZ factorization |
Abstract
PDF
|
Beata Bylina, Jarosław Bylina |
|
Vol 4, No 1 (2006) |
Mathematical foundations of the infinity computer |
Abstract
PDF
|
Yaroslav D. Sergeyev |
|
Vol 10, No 2 (2010) |
Mathematics in Physics, Physics in Mathematics |
Abstract
PDF
|
Eva Mokráňová |
|
Vol 16, No 2 (2016) |
Matroids And Greedy Algorithms. A Deeper Justification of Using Greedy Approach To Find A Maximal set of a Matroid |
Abstract
PDF
|
Syed Aqib Haider |
|
Vol 3, No 1 (2005) |
Metadata in the e-learning repository |
Abstract
PDF
|
Dariusz Dobrowolski |
|
Vol 16, No 2 (2016) |
Methods for increasing security of web servers |
Abstract
PDF
|
Mariusz Nycz, Mirosław Hajder, Sara Nienajadlo |
|
Vol 11, No 2 (2011) |
Methods of encrypting monotonic access structures |
Abstract
PDF
|
Jakub Derbisz |
|
Vol 3, No 1 (2005) |
Microprocessor controller for EL-1 ID ellipsometer |
Abstract
PDF
|
Jerzy Kotliński |
|
Vol 10, No 1 (2010) |
Middleware non-repudiation service for the data warehouse |
Abstract
PDF
|
Bogdan Księżopolski, Zbigniew Kotulski |
|
Vol 2, No 1 (2004) |
Mind and information processing: some considerations |
Abstract
PDF
|
Jerzy Mycka |
|
Vol 4, No 1 (2006) |
Mining of an electrocardiogram |
Abstract
PDF
|
Urszula Markowska-Kaczmar, Bartosz Kordas |
|
Vol 11, No 3 (2011) |
Mobile identity management system in heterogeneous wireless networks |
Abstract
PDF
|
Zbigniew Kotulski, Łukasz Kucharzewski |
|
Vol 4, No 1 (2006) |
Model of mapping activities and competence in ICT projects |
Abstract
PDF
|
Kazimierz Frączkowski |
|
Vol 7, No 1 (2007) |
Model of rule engines applied in the intelligent systems |
Abstract
PDF
|
Barbara Gocłowska, Monika Puchacz |
|
Vol 10, No 2 (2010) |
Modelling 3D scene based on rapid face tracking and objects recognition |
Abstract
PDF
|
Krzysztof Dmitruk, Grzegorz M. Wójcik |
|
Vol 10, No 2 (2010) |
Modelling role hierarchy structure using the Formal Concept Analysis |
Abstract
PDF
|
Ścibor Sobieski, Bartosz Zieliński |
|
Vol 4, No 1 (2006) |
Models and methods for biometric motion identification Bartosz |
Abstract
PDF
|
Bartosz Jabłoński, Ryszard Klempous, Damian Majchrzak |
|
Vol 11, No 4 (2011) |
Models of analysis for enterprise information technology strategy |
Abstract
PDF
|
Marcin W. Mastalerz |
|
226 - 250 of 459 Items |
<< < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 > >> |