


default search action
CN 2014: Brunów, Poland
- Andrzej Kwiecien, Piotr Gaj, Piotr Stera:
Computer Networks - 21st International Conference, CN 2014, Brunów, Poland, June 23-27, 2014. Proceedings. Communications in Computer and Information Science 431, Springer 2014, ISBN 978-3-319-07940-0 - Loubna Echabbi, Jean-Michel Fourneau, Franck Quessette:
Efficient Packet Selection for Deflection Routing. 1-13 - Pawel Foremski
, Christian Callegari
, Michele Pagano
:
Waterfall: Rapid Identification of IP Flows Using Cascade Classification. 14-23 - Joanna Domanska
, Adam Domanski, Tadeusz Czachórski
:
Modeling Packet Traffic with the Use of Superpositions of Two-State MMPPs. 24-36 - Krzysztof Zatwarnicki
, Anna Zatwarnicka
:
The Cluster-Based Time-Aware Web System. 37-46 - Dariusz Czerwinski:
Influence of the VM Manager on Private Cluster Data Mining System. 47-56 - Adam Domanski, Joanna Domanska
, Sebastian Chmiel:
JavaScript Frameworks and Ajax Applications. 57-68 - Bartlomiej Placzek:
Communication-Aware Algorithms for Target Tracking in Wireless Sensor Networks. 69-78 - Slawomir Nowak, Mateusz Nowak
, Krzysztof Grochla
:
MAGANET - On the Need of Realistic Topologies for AMI Network Simulations. 79-88 - Maciej Piechowiak, Piotr Zwierzykowski:
Topology Properties of Ad-Hoc Networks with Topology Control. 89-98 - Jerzy Martyna:
Modelling and Simulation Analysis of Some Routing Schemes for Mobile Opportunistic Networks. 99-107 - Remigiusz Olejnik
:
Modelling of Half-Duplex Radio Access for HopeMesh Experimental WMN Using Petri Nets. 108-117 - Tomas Sochor
, Matej Zuzcak
:
Study of Internet Threats and Attack Methods Using Honeypots and Honeynets. 118-127 - Anca Jurcut
, Tom Coffey, Reiner Dojen:
On the Prevention and Detection of Replay Attacks Using a Logic-Based Verification Tool. 128-137 - Miroslaw Skrzewski:
System Network Activity Monitoring for Malware Threats Detection. 138-146 - Marcin Jamro, Dariusz Rzonca
:
Measuring, Monitoring, and Analysis of Communication Transactions Performance in Distributed Control System. 147-156 - Jan Rozhon
, Filip Rezac
, Jiri Slachta, Miroslav Voznák
:
Monitoring of Speech Quality in Full-Mesh Networks. 157-166 - Grzegorz Dziwoki
, Jacek Izydorczyk
, Marcin Szebeszczyk:
Time Domain Estimation of Mobile Radio Channels for OFDM Transmission. 167-176 - Adam Dustor
, Piotr Klosowski
, Jacek Izydorczyk
:
Influence of Feature Dimensionality and Model Complexity on Speaker Verification Performance. 177-186 - Marek Sawerwain
, Joanna Wisniewska:
Generation of Entangled Qudits States with XY-Like Dynamics in 1D Qudits Spins. 187-196 - Piotr Zawadzki
:
Effective Noise Estimation for Secure Quantum Direct Communication over Imperfect Channels. 197-204 - Piotr Zawadzki
:
Ping-Pong Protocol Strengthening against Pavičić's Attack. 205-212 - Tomasz Nycz, Monika Nycz
, Tadeusz Czachórski
:
A Numerical Comparison of Diffusion and Fluid-Flow Approximations Used in Modelling Transient States of TCP/IP Networks. 213-222 - Evsey Morozov
, Ruslana Nekrasova
, Lyubov Potakhina, Oleg M. Tikhonenko
:
Asymptotic Analysis of Queueing Systems with Finite Buffer Space. 223-232 - Slawomir Hanczewski
, Maciej Stasiak
:
Modeling of Video on Demand Systems. 233-242 - Pawel Mrozowski, Andrzej Chydzinski
:
Performance Evaluation of Routers with the Dropping-Function Queueing. 243-252 - Zdzislaw Onderka:
Deterministic Control of the Scalable High Performance Distributed Computations. 253-264 - Oksana Pomorova
, Oleg Savenko
, Sergiy Lysenko
, Andrii Kryshchuk, Andrii Nicheporuk
:
A Technique for Detection of Bots Which Are Using Polymorphic Code. 265-276 - Artur Hlobaz
, Krzysztof Podlaski
, Piotr Milczarski
:
Applications of QR Codes in Secure Mobile Data Exchange. 277-286 - Blazej Kwiecien, Marcin Sidzina
, Edward Hrynkiewicz:
Industrial Implementation of Failure Detection Algorithm in Communication System. 287-297 - Andrzej Kwiecien, Michal Mackowski
, Jacek Stój
, Marcin Sidzina
:
Influence of Electromagnetic Disturbances on Multi-network Interface Node. 298-307 - Piotr Klosowski
, Adam Dustor
, Jacek Izydorczyk
, Jan Kotas, Jacek Slimok:
Speech Recognition Based on Open Source Speech Processing Software. 308-317 - Adam Czyszczon, Aleksander Zgrzywa:
Automatic RESTful Web Service Identification and Information Extraction. 318-327 - Dariusz Ruminski
, Krzysztof Walczak
, Jacek Chmielewski:
Generating User Interfaces for XML Schema Documents with a Presentation Language. 328-337 - Radoslaw Boronski, Grzegorz Bocewicz
:
Relational Database Index Selection Algorithm. 338-347

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.