|
Issue |
Title |
|
Vol 3, No 1 (2005) |
Models of multichannel interconnection systems |
Abstract
PDF
|
Mirosław Hajder, Paweł Dymora, Marek Bolanowski |
|
Vol 14, No 1 (2014) |
Modified Alternating Step Generators with Non-Linear Scrambler |
Abstract
PDF
|
Robert Wicik, Tomasz Rachwalik, Rafał Gliwa |
|
Vol 5, No 1 (2006) |
Multi-channel recorder for forces and accelerations |
Abstract
PDF
|
Krzysztof Gołacki, Jerzy Kotliński, Paweł Rowiński |
|
Vol 5, No 1 (2006) |
Multi-channel recorder for I-V curves |
Abstract
PDF
|
Jerzy Kotliński |
|
Vol 2, No 1 (2004) |
Multi-class 3D region growing algorithm |
Abstract
PDF
|
Jakub Smółka |
|
Vol 1, No 1 (2003) |
Multi-class region growing algorithm |
Abstract
PDF
|
Jakub Smółka |
|
Vol 5, No 1 (2006) |
Multilevel near optimal thresholding applied to watershed grouping |
Abstract
PDF
|
Jakub Smołka |
|
Vol 4, No 1 (2006) |
Multimedia in management facing globalization processes and cognitivistics |
Abstract
PDF
|
Jerzy Wąchol |
|
Vol 1, No 1 (2003) |
Multiple choice tests in VBA with on the fly question modification |
Abstract
PDF
|
Jerzy L.kacperski |
|
Vol 16, No 2 (2016) |
Music Playlist Generation using Facial Expression Analysis and Task Extraction |
Abstract
PDF
|
Arnaja Sen, Dhaval Popat, Hardik Shah, Priyanka Kuwor, Era Johri |
|
Vol 6, No 1 (2007) |
Neural activity and new methods of computational analysis in the model of mammalian brain cortex |
Abstract
PDF
|
Grzegorz M. Wójcik, Marek Falski, Jan Ruthe, Michał Żukowski, Dorota Stanisławek, Wiesław A. Kamiński |
|
Vol 16, No 2 (2016) |
New architecture of system intrusion detection and prevention |
Abstract
PDF
|
Mariusz Nycz, Mirosław Hajder, Alicja Gerka |
|
Vol 3, No 1 (2005) |
New GUI of the S AT VAL code |
Abstract
PDF
|
Marcin Smolira, Juliusz Sielanko |
|
Vol 5, No 1 (2006) |
New security and control protocol for VoIP based on steganography and digital watermarking |
Abstract
PDF
|
Wojciech Mazurczyk, Zbigniew Kotulski |
|
Vol 8, No 2 (2008) |
New steerable pyramid steganography algorithm resistant to the Fisher Linear Discriminant steganalysis |
Abstract
PDF
|
Piotr Kopniak |
|
Vol 1, No 1 (2003) |
Newton-like method for singular 2-regular system of nonlinear equations |
Abstract
PDF
|
Stanisław Grzegórski, Edyta Łukasik |
|
Vol 11, No 3 (2011) |
Non—cryptographic methods for improving real time transmission security and integrity |
Abstract
PDF
|
Zbigniew Kotulski, Grzegorz Oryńczak |
|
Vol 1, No 1 (2003) |
Nonlinear weighted median filters in dyadic decomposition of images |
Abstract
PDF
|
Agnieszka Lisowska |
|
Vol 12, No 4 (2012) |
Notary-based self-healing mechanism for centralized peer-to-peer infrastructures |
Abstract
PDF
|
Grzegorz Oryńczak, Zbigniew Kotulski |
|
Vol 9, No 1 (2009) |
Numerical analysis of EM estimation of mixture model parameters |
Abstract
PDF
|
Małgorzata Plechawska, Łukasz Wójcik, Andrzej Polański |
|
Vol 9, No 1 (2009) |
Numerical schemes for a system of one-dimensional hyperbolic equations |
Abstract
PDF
|
Krzysztof Murawski |
|
Vol 4, No 1 (2006) |
On asymptotic behaviour of a binary genetic algorithm |
Abstract
PDF
|
Witold Kosiński, Stefan Kotowski, Jolanta Socała |
|
Vol 10, No 1 (2010) |
On departure process in the batch arrival queue with single vacation and setup time |
Abstract
PDF
|
Wojciech M. Kempa |
|
Vol 11, No 2 (2011) |
On LDPC codes corresponding to affine parts of generalized polygons |
Abstract
PDF
|
Monika Polak, Vasyl Ustimenko |
|
Vol 14, No 1 (2014) |
On Multivariate Cryptosystems Based on Computable Maps with Invertible Decomposition |
Abstract
PDF
|
Vasyl Ustimenko |
|
251 - 275 of 459 Items |
<< < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 > >> |