|
Issue |
Title |
|
Vol 5, No 1 (2006) |
Computer program for visual diagnosis of the speech disorders |
Abstract
PDF
|
Marek Wiśniewski, Wiesława Kuniszyk-Jóźkowiak, Elżbieta Smółka, Waldemar Suszyński |
|
Vol 1, No 1 (2003) |
Computer programme for speech impediment diagnosis and therapy |
Details
PDF
|
Mariusz Dzieńkowski, Wiesława Kuniszyk-Jóźkowiak, Elżbieta Smołka, Waldemar Suszyński |
|
Vol 2, No 1 (2004) |
Computer simulation of the potential distribution inside the plasma chamber of negative ion source |
Abstract
PDF
|
Juliusz Sielanko, Marcin Turek, A. Tanga |
|
Vol 2, No 1 (2004) |
Computer speech echo-corrector |
Abstract
PDF
|
Mariusz Dzieńkowski, Wiesława Kuniszyk-Jóźkowiak, Elżbieta Smołka, Waldemar Suszyński |
|
Vol 7, No 1 (2007) |
Computer-based system for training and selecting mobile robot operators – evolving software tools |
Abstract
PDF
|
Krzysztof Sapiecha, Mariusz Bedla, Barbara Łukawska, Paweł Paduch |
|
Vol 1, No 1 (2003) |
Concurrent programming and futures |
Abstract
PDF
|
Andrzej Daniluk |
|
Vol 13, No 1 (2013) |
Content Repository in Object Oriented data model |
Abstract
PDF
|
Dariusz Dobrowolski, Michał Chromiak |
|
Vol 9, No 1 (2009) |
Contests Hosting Service as a tool to teach programming |
Abstract
PDF
|
Rafał Kluszczyński, Łukasz Mikulski, Marek Nowicki, Piotr Bała |
|
Vol 8, No 2 (2008) |
Controllability of second order infinite dimensional dynamical systems with delays |
Abstract
PDF
|
Jerzy Respondek |
|
Vol 8, No 1 (2008) |
Controllability of second order infinite dimensional dynamical systems with delays |
Abstract
PDF
|
Jerzy Respondek |
|
Vol 13, No 1 (2013) |
Convergent traffic in the environment of wireless MESH technology |
Abstract
PDF
|
Andrzej Paszkiewicz, Marek Bolanowski, Przemysław Zapała |
|
Vol 5, No 1 (2006) |
Counting solutions of equations over two-element algebras |
Abstract
PDF
|
Jacek Krzaczkowski |
|
Vol 5, No 1 (2006) |
Cracking WPA? Is it possible? |
Abstract
PDF
|
Ryszard Haraszczuk |
|
Vol 5, No 1 (2006) |
Credibility coefficients based on frequent sets |
Abstract
PDF
|
Roman Podraża, Mariusz Walkiewicz, Andrzej Dominik |
|
Vol 14, No 1 (2014) |
Cryptographic Applications of the Duplex Construction |
Abstract
PDF
|
Mariusz Borowski |
|
Vol 11, No 2 (2011) |
Cryptographic properties of modified AES-like S-boxes |
Abstract
PDF
|
Anna Grocholewska-Czuryło |
|
Vol 2, No 1 (2004) |
Cryptographic protocol for electronic auctions with extended requirements |
Abstract
PDF
|
Bogdan Księżopolski, Zbigniew Kotulski |
|
Vol 11, No 4 (2011) |
Cryptographic software: vulnerabilities in implementations |
Abstract
PDF
|
Michał Łuczaj |
|
Vol 10, No 1 (2010) |
Current challenges in content based image retrieval by means of low-level feature combining |
Abstract
PDF
|
Paweł Forczmański, Dariusz Frejlichowski |
|
Vol 2, No 1 (2004) |
Customer Relationship Management system models application in higher education |
Abstract
PDF
|
Grzegorz Futa |
|
Vol 7, No 1 (2007) |
Data mining techniques for portal participants profiling |
Abstract
PDF
|
Danuta Zakrzewska, Justyna Kapka |
|
Vol 1, No 1 (2003) |
Databases for physical magnitudes |
Abstract
PDF
|
Bartłomiej Bielecki, Zdzisław Łojewski |
|
Vol 3, No 1 (2005) |
Decidability vs. undecidability. Logico-philosophico-historical remarks |
Abstract
PDF
|
Roman Murawski |
|
Vol 5, No 1 (2006) |
Design and implementation of the middle-class web-portal for cooperation with students team |
Abstract
PDF
|
Roman Pszonczenko, Ścibór Sobieski |
|
Vol 8, No 2 (2008) |
Designing cryptographically strong S-boxes with the use of cellular automata |
Abstract
PDF
|
Mirosław Szaban, Franciszek Seredyński |
|
101 - 125 of 459 Items |
<< < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 > >> |