default search action
Annales UMCS, Informatica, Volume 16
Volume 16, Number 1, October 2016
- Jaroslaw Bernacki:
Recommending learning material in Intelligent Tutoring Systems. 1 - Piotr Wisniewski, Marta Burzanska, Przemyslaw Krukowski:
Extending DQL with Recursive Facilities. 12 - Karol Kuczynski, Rafal Stegierski, Waldemar Suszynski, Dawid Królica:
Remote Access Environment for Computer Networking Laboratory: Challenges and Solutions. 21 - Anna Kurzydlowska, Dorota Stempien:
Centre of Information Technologies for Humanities and Social Sciences - a milestone towards cybernation of Polish Humanities. 30 - Barbara Lukawska, Grzegorz Lukawski, Krzysztof Sapiecha:
An implementation of articial advisor for dynamic classication of objects. 40 - Grzegorz Pawinski, Krzysztof Sapiecha:
A Low-cost Multicomputer for solving the RCPSP. 50 - Waldemar Suszynski, Wieslawa Kuniszyk-Józkowiak, Ireneusz Codello, Rafal Stegierski, Karol Kuczynski, Janusz Jaszczuk:
Analysis of surface myoelectric signals by linear prediction method. 62
Volume 16, Number 2, December 2017
- Arnaja Sen, Dhaval Popat, Hardik Shah, Priyanka Kuwor, Era Johri:
Music Playlist Generation using Facial Expression Analysis and Task Extraction. 1 - Michal Chromiak:
Heterogeneous Indexing Register for Object Database. 7 - Pawel Dymora, Miroslaw Mazurek, Slawomir Jaskólka:
VoIP Anomaly Detection - selected methods of statistical analysis. 14 - Mariusz Nycz, Miroslaw Hajder, Alicja Gerka:
New architecture of system intrusion detection and prevention. 20 - Pawel Kaplanski, Alessandro Seganti, Krzysztof Cieslinski, Aleksandra Chrabrowa, Jerzy Koziolkiewicz, Marcin Bryk, Iwona Lugowska:
Opening Access To Practice-based Evidence in Clinical Decision Support Systems with Natural Query Language. 25 - Kazimierz Kielkowicz, Damian Grela:
FLC control for tuning exploration phase in bio-inspired metaheuristic. 32 - Mariusz Nycz, Miroslaw Hajder, Sara Nienajadlo:
Methods for increasing security of web servers. 39 - Dominik Strzalka:
Some preliminary results of memory cache analysis with the use of non-extensive. 43 - Syed Aqib Haider:
Matroids And Greedy Algorithms. A Deeper Justification of Using Greedy Approach To Find A Maximal set of a Matroid. 48
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.