


default search action
CN 2015: Brunów, Poland
- Piotr Gaj, Andrzej Kwiecien, Piotr Stera:
Computer Networks - 22nd International Conference, CN 2015, Brunów, Poland, June 16-19, 2015. Proceedings. Communications in Computer and Information Science 522, Springer 2015, ISBN 978-3-319-19418-9 - Pawel Foremski
, Christian Callegari
, Michele Pagano
:
Waterfall Traffic Identification: Optimizing Classification Cascades. 1-10 - Joanna Domanska
, Adam Domanski, Tadeusz Czachórski
:
Estimating the Intensity of Long-Range Dependence in Real and Synthetic Traffic Traces. 11-22 - Bartlomiej Placzek, Marcin Bernas
:
Data Suppression Algorithms for Surveillance Applications of Wireless Sensor and Actor Networks. 23-32 - Marcin Bernas
, Bartlomiej Placzek:
Energy Aware Object Localization in Wireless Sensor Network Based on Wi-Fi Fingerprinting. 33-42 - Pawel Foremski
, Krzysztof Grochla
:
LTE or WiFi? Client-Side Internet Link Selection for Smartphones. 43-53 - Hamid Hassan, Philip Trwoga, Izzet Kale:
IF-MANET: Interoperable Framework for Mobile Ad Hoc Networks. 54-68 - Tomas Sochor
, Matej Zuzcak
:
Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection. 69-81 - Henryk Krawczyk
, Pawel Lubomski
:
User Trust Levels and Their Impact on System Security and Usability. 82-91 - Pavol Sokol
, Maros Andrejko:
Deploying Honeypots and Honeynets: Issues of Liability. 92-101 - Damian Rusinek, Bogdan Ksiezopolski
, Adam Wierzbicki
:
On the Balancing Security Against Performance in Database Systems. 102-116 - Olga N. Dolinina, Vadim A. Kushnikov, Ekaterina Kulakova
:
Analysis of Objective Trees in Security Management of Distributed Computer Networks of Enterprises and Organizations. 117-126 - Oksana Pomorova
, Oleg Savenko
, Sergii Lysenko
, Andrii Kryshchuk, Kira Bobrovnikova
:
A Technique for the Botnet Detection Based on DNS-Traffic Analysis. 127-138 - Marcin Jamro, Dariusz Rzonca
:
SysML-Based Modeling of Token Passing Paradigm in Distributed Control Systems. 139-149 - Andrzej Kwiecien, Blazej Kwiecien, Michal Mackowski
:
Automatic Scenario Selection of Cyclic Exchanges in Transmission via Two Buses. 150-161 - Kamil Folkert, Marcin Fojcik
:
Ontology-Based Integrated Monitoring of Hadoop Clusters in Industrial Environments with OPC UA and RESTful Web Services. 162-171 - Filip Rezac
, Jan Rozhon
, Jiri Slachta, Miroslav Voznák
:
Speech Quality Measurement in IP Telephony Networks by Using the Modular Probes. 172-181 - Wojciech Rzasa
:
Simulation-Based Analysis of a Platform as a Service Infrastructure Performance from a User Perspective. 182-192 - Dominique Jullier, Marek Konieczny
, Slawomir Zielinski
:
Applying Software-Defined Networking Paradigm to Tenant-Perspective Optimization of Cloud Services Utilization. 193-202 - Slawomir Przylucki, Dariusz Czerwinski
:
Color-Aware Transmission of SVC Video over DiffServ Domain. 203-212 - Olga Dolinina, Alexander Ermakov, Aleksandr Shvarts
:
Method of Visual Information Processing Based on Grid-Calculations. 213-221 - Glenda Gonzalez, Tülin Atmaca, Tadeusz Czachórski
:
An Energy Saving Solution in Integrated Access Networks. 222-231 - Konrad Polys
, Krzysztof Grochla
:
Mobility Robustness in LTE Based on Automatic Neighbor Relation Table. 232-241 - Adam Dustor
, Piotr Klosowski
, Jacek Izydorczyk
, Rafal Kopanski:
Influence of Corpus Size on Speaker Verification. 242-249 - Grzegorz Dziwoki
, Jacek Izydorczyk
:
Stopping Criteria Analysis of the OMP Algorithm for Sparse Channels Estimation. 250-259 - Özgür Can Turna, Muhammed Ali Aydin
, Tülin Atmaca:
A Dynamic Energy Efficient Optical Line Terminal Design for Optical Access Network. 260-269 - Marek Sawerwain
, Joanna Wisniewska:
Tracing of an Entanglement Level in Short Qubit and Qutrit Spin Chains. 270-279 - Jakub Kicinski, Michal Hoeft
:
A Novel Multicast Architecture of Programmable Networks. 280-292 - Henryk Krawczyk
, Michal Nykiel, Jerzy Proficz
:
Mobile Offloading Framework: Solution for Optimizing Mobile Applications Using Cloud Computing. 293-305 - Che Soong Kim, Alexander N. Dudin, Sergey A. Dudin
, Olga S. Dudina
:
Multi-server Queueing System MAP/M/N(r)/∞ Operating in Random Environment. 306-315 - Slawomir Hanczewski
, Maciej Sobieraj
, Joanna Weissenberg:
A Model of Erlang's Ideal Grading with Multi-service Traffic Sources. 316-325 - Evsey Morozov
, Lyubov Potakhina:
Asymptotically Work-Conserving Disciplines in Communication Systems. 326-335 - Valentina I. Klimenok, Vladimir M. Vishnevsky
:
Unreliable Queueing System with Cold Redundancy. 336-346 - Oleg M. Tikhonenko
:
Egalitarian Processor Sharing System with Demands of Random Space Requirement. 347-356 - Jaroslaw Bylina, Jean-Michel Fourneau, Marek Karwacki, Nihal Pekergin, Franck Quessette:
Stochastic Bounds for Markov Chains with the Use of GPU. 357-370 - Monika Nycz
, Tomasz Nycz, Tadeusz Czachórski:
An Analysis of the Extracted Parts of Opte Internet Topology. 371-381 - Andrzej Kwiecien, Michal Sawicki:
Scheduling of Isochronous Data Transactions in Compliance with QoS Restrictions in the USB 3.0 Interface. 382-388 - Piotr Milczarski
, Krzysztof Podlaski
, Artur Hlobaz
:
Applications of Secure Data Exchange Method Using Social Media to Distribute Public Keys. 389-399 - Piotr Klosowski
, Adam Dustor
, Jacek Izydorczyk
:
Speaker Verification Performance Evaluation Based on Open Source Speech Processing Software and TIMIT Speech Corpus. 400-409 - Dariusz Czerwinski
:
Digital Filter Implementation in Hadoop Data Mining System. 410-420 - Leonid Zeynalvand, Mohammed Gharib
, Ali Movaghar
:
Decentralized Social Networking Using Named-Data. 421-430 - Wojciech Mielczarek, Tomasz Mon:
USB Data Capture and Analysis in Windows Using USBPcap and Wireshark. 431-443 - Andrzej Kwiecien, Michal Mackowski
, Marek Kojder, Maciej Manczyk:
Reliability of Bluetooth Smart Technology for Indoor Localization System. 444-454

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.