Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica

Title Publication Date Language Citations
Matroids And Greedy Algorithms. A Deeper Justification of Using Greedy Approach To Find A Maximal set of a Matroid2017/12/22
New architecture of system intrusion detection and prevention2017/12/22
Methods for increasing security of web servers2017/12/22
FLC control for tuning exploration phase in bio-inspired metaheuristic2017/12/22
Heterogeneous Indexing Register for Object Database2017/12/22
Some preliminary results of memory cache analysis with the use of non-extensive2017/12/22
Music Playlist Generation using Facial Expression Analysis and Task Extraction2017/12/22
Implementation of perceptual measure Picture Quality Scale with neural network to evaluate distortions in compressed images2008/01/01
Test scenarios generation for a class of processes defined in the BPEL language2008/01/01
Development of heart motion reconstruction framework based on the 4D echocardiographic data2008/01/01
A procedure of verification of comprehensive tests for selection of candidates for operators of mobile robot2008/01/01
Hierarchical graph transformations with meta-rules2008/01/01
An efficient algorithm for multivariate Maclaurin-Newton transformation2008/01/01
Numerical analysis of controllability of a parabolic system with the delayed controls and non-zero boundary conditions2008/01/01
New steerable pyramid steganography algorithm resistant to the Fisher Linear Discriminant steganalysis2008/01/01
A weighted extremal problem for the Bézier curves of degree n with jacobi densities2008/01/01
Combining message encryption and authentication2011/01/01
On the key expansion of D(n, K)-based cryptographical algorithm2011/01/01
Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote22011/01/01
Generating elements of orders dividing p6 ± p5 + p4 ± p3 + p2 + p ± 12011/01/01
Non—cryptographic methods for improving real time transmission security and integrity2011/01/01
The security of the multi-application public transport card2011/01/01
Security problems of systems of extremely weak devices2011/01/01
Evolution of the StreamHash hash function family2011/01/01
Small prototype acquisition system with secure remote data access2011/01/01
Effective reduction of cryptographic protocols specification for model-checking with Spin2011/01/01
Mobile identity management system in heterogeneous wireless networks2011/01/01
Implementation of the DSSS method in watermarking digital audio objects2011/01/01
Secure time information in the internet key exchange protocol2011/01/01
Performance of algebraic graphs based stream-ciphers using large finite fields2011/01/01