Home
Research Trends
Scientific Articles
Journals
Scientific Journals
Open Access Journals
Journals Search
Contact
Sign Up
Login
Language
English
German
Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica
Title
Publication Date
Language
Citations
Matroids And Greedy Algorithms. A Deeper Justification of Using Greedy Approach To Find A Maximal set of a Matroid
2017/12/22
New architecture of system intrusion detection and prevention
2017/12/22
Methods for increasing security of web servers
2017/12/22
FLC control for tuning exploration phase in bio-inspired metaheuristic
2017/12/22
Heterogeneous Indexing Register for Object Database
2017/12/22
Some preliminary results of memory cache analysis with the use of non-extensive
2017/12/22
Music Playlist Generation using Facial Expression Analysis and Task Extraction
2017/12/22
Implementation of perceptual measure Picture Quality Scale with neural network to evaluate distortions in compressed images
2008/01/01
Test scenarios generation for a class of processes defined in the BPEL language
2008/01/01
Development of heart motion reconstruction framework based on the 4D echocardiographic data
2008/01/01
A procedure of verification of comprehensive tests for selection of candidates for operators of mobile robot
2008/01/01
Hierarchical graph transformations with meta-rules
2008/01/01
An efficient algorithm for multivariate Maclaurin-Newton transformation
2008/01/01
Numerical analysis of controllability of a parabolic system with the delayed controls and non-zero boundary conditions
2008/01/01
New steerable pyramid steganography algorithm resistant to the Fisher Linear Discriminant steganalysis
2008/01/01
A weighted extremal problem for the Bézier curves of degree n with jacobi densities
2008/01/01
Combining message encryption and authentication
2011/01/01
On the key expansion of D(n, K)-based cryptographical algorithm
2011/01/01
Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2
2011/01/01
Generating elements of orders dividing p6 ± p5 + p4 ± p3 + p2 + p ± 1
2011/01/01
Non—cryptographic methods for improving real time transmission security and integrity
2011/01/01
The security of the multi-application public transport card
2011/01/01
Security problems of systems of extremely weak devices
2011/01/01
Evolution of the StreamHash hash function family
2011/01/01
Small prototype acquisition system with secure remote data access
2011/01/01
Effective reduction of cryptographic protocols specification for model-checking with Spin
2011/01/01
Mobile identity management system in heterogeneous wireless networks
2011/01/01
Implementation of the DSSS method in watermarking digital audio objects
2011/01/01
Secure time information in the internet key exchange protocol
2011/01/01
Performance of algebraic graphs based stream-ciphers using large finite fields
2011/01/01
«
‹ Pervious
Next ›
»