


default search action
CN 2016: Brunów, Poland
- Piotr Gaj, Andrzej Kwiecien, Piotr Stera:
Computer Networks - 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedings. Communications in Computer and Information Science 608, Springer 2016, ISBN 978-3-319-39206-6
Computer Networks Architectures and Protocols
- Lan Wang, Erol Gelenbe:
Real-Time Traffic over the Cognitive Packet Network. 3-21 - Robert R. Chodorek
, Agnieszka Chodorek
:
Expanding the Ns-2 Emulation Environment with the Use of Flexible Mapping. 22-31 - Olga Fedevych
, Ivanna Droniuk
, Maria Nazarkevych
:
Monitoring and Analysis of Measured and Modeled Traffic of TCP/IP Networks. 32-41 - Grazyna Suchacka
, Adam Domanski:
Investigating Long-Range Dependence in E-Commerce Web Traffic. 42-51 - Krzysztof Nowicki, Aleksander Malinowski
, Marcin Sikorski:
More Just Measure of Fairness for Sharing Network Resources. 52-58 - Zbigniew Lipinski
:
Classification of Solutions to the Minimum Energy Problem in One Dimensional Sensor Networks. 59-71 - Bartlomiej Placzek, Marcin Bernas
:
Detection of Malicious Data in Vehicular Ad Hoc Networks for Traffic Signal Control Applications. 72-82 - Oksana Pomorova
, Oleg Savenko
, Sergii Lysenko
, Andrii Kryshchuk, Kira Bobrovnikova
:
Anti-evasion Technique for the Botnets Detection Based on the Passive DNS Monitoring and Active DNS Probing. 83-95 - Rajiv Bagai, Huabo Lu:
Measuring Client-Server Anonymity. 96-106 - Olga Siedlecka-Lamch
, Miroslaw Kurkowski
, Jacek Piatkowski
:
Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption. 107-117 - Tomas Sochor
, Matej Zuzcak
:
High-Interaction Linux Honeypot Architecture in Recent Perspective. 118-131 - Miroslaw Skrzewski:
About the Efficiency of Malware Monitoring via Server-Side Honeypots. 132-140 - Andrzej Kwiecien, Blazej Kwiecien, Michal Mackowski
:
Algorithms for Transmission Failure Detection in a Communication System with Two Buses. 141-153 - Andrzej Kwiecien, Blazej Kwiecien, Michal Mackowski
:
A Failure Influence on Parameters of Real-Time System with Two Buses. 154-167 - Wojciech Rzasa
, Dariusz Rzonca
:
Event-Driven Approach to Modeling and Performance Estimation of a Distributed Control System. 168-179 - Slawomir Przylucki, Dariusz Czerwinski
, Artur Sierszen
:
QoE-Oriented Fairness Control for DASH Systems Based on the Hierarchical Structure of SVC Streams. 180-191 - Adam Domanski, Joanna Domanska
, Tadeusz Czachórski
:
The Impact of the Degree of Self-Similarity on the NLREDwM Mechanism with Drop from Front Strategy. 192-203
Teleinformatics and Telecommunications
- Adam Dustor
:
Influence of Noise and Voice Activity Detection on Speaker Verification. 207-215 - Krzysztof Grochla
, Konrad Polys
:
Load Balancing in LTE by Tx Power Adjustment. 216-225 - Wojciech Mielczarek, Michal Sawicki:
USB 3.1 Gen 1 Hub Time Delay Influence on System Timeout and Bus Clock Synchronization. 226-234
New Technologies
- Marek Sawerwain
, Joanna Wisniewska:
Quantum Network Protocol for Qudits with Use of Quantum Repeaters and Pauli Z-Type Operational Errors. 237-246 - Pawel Lubomski
, Andrzej Kalinowski, Henryk Krawczyk
:
Multi-level Virtualization and Its Impact on System Performance in Cloud Computing. 247-259 - Piotr Zawadzki
:
Ping-Pong Protocol Eavesdropping in Almost Perfect Channels. 260-268
Queueing Theory
- Evsey Morozov
, Ruslana Nekrasova
, Irina Peshkova
, Alexander S. Rumyantsev
:
A Regeneration-Based Estimation of High Performance Multiserver Systems. 271-282 - Slawomir Hanczewski
, Maciej Stasiak
, Joanna Weissenberg, Piotr Zwierzykowski:
Queuing Model of the Access System in the Packet Network. 283-293 - Tadeusz Czachórski
, Adam Domanski, Joanna Domanska
, Artur Rataj:
A Study of IP Router Queues with the Use of Markov Models. 294-305 - Che Soong Kim, Alexander N. Dudin:
Analysis of a Queueing Model with Contingent Additional Server. 306-315 - Valentina I. Klimenok, Vladimir M. Vishnevsky
:
A Dual Tandem Queue with Multi-server Stations and Losses. 316-325
Innovative Applications
- Michal Morawski
, Przemyslaw Ignaciuk
:
Adjustable Sampling Rate - An Efficient Way to Reduce the Impact of Network-Induced Uncertainty in Networked Control Systems? 329-343 - Rosario Giuseppe Garroppo, Loris Gazzarrini, Stefano Giordano
, Michele Pagano
, Luca Tavanti:
A SIP-Based Home Gateway for Domotics Systems: From the Architecture to the Prototype. 344-359 - Marcin Badurowicz
, Tomasz Cieplak
, Jerzy Montusiewicz
:
The Cloud Computing Stream Analysis System for Road Artefacts Detection. 360-369 - Dariusz Czerwinski
, Slawomir Przylucki, Dmitry Mukharsky
:
RSSI-Based Localisation of the Radio Waves Source by Mobile Agents. 370-383 - Dariusz Palka, Marek Zachara, Krzysztof Wójcik
:
Evolutionary Scanner of Web Application Vulnerabilities. 384-396 - Jacek Pekala:
Data Transformation Using Custom Class Generator as Part of Systems Integration in Manufacturing Company. 397-409 - Krzysztof Wójcik
, Bogdan Wzietek, Piotr Wzietek, Marcin Piekarczyk
:
Signal Recognition Based on Multidimensional Optimization of Distance Function in Medical Applications. 410-420 - Daniel Czyczyn-Egird, Rafal Wojszczyk:
Determining the Popularity of Design Patterns Used by Programmers Based on the Analysis of Questions and Answers on Stackoverflow.com Social Network. 421-433

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.