default search action
CN 2011: Ustron, Poland
- Andrzej Kwiecien, Piotr Gaj, Piotr Stera:
Computer Networks - 18th Conference, CN 2011, Ustron, Poland, June 14-18, 2011. Proceedings. Communications in Computer and Information Science 160, Springer 2011, ISBN 978-3-642-21770-8 - Roman Gielerak, Marek Sawerwain:
π-local Operations in Composite Quantum Systems with Applications to Multipartite Entanglement. 1-10 - Marek Sawerwain, Roman Gielerak:
Quantum Information Transfer Protocols: A Model and Its Numerical Simulations. 11-18 - Remigiusz Olejnik:
An Impact of the Nanoscale Network-on-Chip Topology on the Transmission Delay. 19-26 - Jerzy Martyna:
The Least Squares SVM Approach for a Non-linear Channel Prediction in the MIMO System. 27-36 - Joanna Domanska, Adam Domanski, Dariusz Rafal Augustyn:
The Impact of the Modified Weighted Moving Average on the Performance of the RED Mechanism. 37-44 - Krzysztof Zatwarnicki:
Identification of the Web Server. 45-54 - Lukasz Warchal, Lukasz Wycislik:
Maintenance of Custom Applications in the Grid Environment - On Basis of Oracle Enterprise Manager Grid Control and Logback Logging Utility. 55-60 - Oleg M. Tikhonenko:
Queueing Systems with Common Buffer: A Theoretical Treatment. 61-69 - Stanislaw Widel, Jaroslaw Flak, Piotr Gaj:
Analysis of Time Measurements in Network Systems Using Decomposition on Subprocesses. 70-79 - Jaroslaw Bylina, Beata Bylina:
A Markovian Queuing Model of a WLAN Node. 80-86 - Józef Wozniak, Przemyslaw Machan, Krzysztof Gierlowski, Michal Hoeft, Michal Lewczuk:
Comparative Analysis of IP-Based Mobility Protocols and Fast Handover Algorithms in IEEE 802.11 Based WLANs. 87-101 - Leszek Borzemski, Anna Kaminska-Chuchmala:
3D Web Performance Forecasting Using Turning Bands Method. 102-113 - Krzysztof Nowicki, Mariusz Stankiewicz, Aniela Mrugalska, Tomasz Mrugalski, Józef Wozniak:
Knowledge Managemenent in the IPv6 Migration Process. 114-124 - Przemyslaw Skurowski, Robert Wojcicki:
Lightweight Multiresolution Jitter Analysis for Packet Networks. 125-134 - Agnieszka Brachman, Jakub Mieszczanin:
Scheduling Algorithms for Different Approaches to Quality of Service Provisioning. 135-143 - Slawomir Przylucki:
Assessment of the QoE in Voice Services Based on the Self-Organizing Neural Network Structure. 144-153 - Slawomir Przylucki, Daniel Sawicki:
Coloring VBR Streams Inside the DiffServ Domain. 154-163 - Mateusz Nowak, Slawomir Nowak, Piotr Pecka, Krzysztof Grochla:
Content Identification in PI CAN Network. 164-172 - Leszek Borzemski, Marcin Wojtkiewicz:
Evaluation of Chaotic Internet Traffic Predictor Using MAPE Accuracy Measure. 173-182 - Grazyna Suchacka:
Generating Bursty Web Traffic for a B2C Web Server. 183-190 - HeeKyoung Yi, PyungKoo Park, Seungwook Min, JaeCheol Ryou:
DDoS Detection Algorithm Using the Bidirectional Session. 191-203 - Miroslaw Skrzewski:
Analyzing Outbound Network Traffic. 204-213 - Dariusz Czerwinski:
Numerical Performance in the Grid Network Relies on a Grid Appliance. 214-223 - Maciej Szmit, Anna Szmit:
Use of Holt-Winters Method in the Analysis of Network Traffic: Case Study. 224-231 - Asjad Amin, Kanwal Afreen, Abida Shaheen, Tayyabah Nadeem, Nida Rashid:
Bandwidth Efficient TCP Frame Design without Acknowledgment Number Field. 232-241 - Asjad Amin, Danyal Shafi, Zeeshan Ahmed, Waqas Anjum, Muhammad Owais, Faheem Akram:
Incorporating Small Length Data Cells in TCP Frame to Reduce Retransmission of Corrupted Packets. 242-252 - Ivanna Dronjuk, Mariya Nazarkevych, Oleksandra Myroniuk:
Information Protection Based on the Theory of Ateb-Functions. 253-260 - Krystian Baniak:
Revocable Anonymity in Network Monitoring Systems. 261-270 - Miroslaw Skrzewski:
Flow Based Algorithm for Malware Traffic Detection. 271-280 - Iosif Androulidakis:
Intercepting Mobile Phone Calls and Short Messages Using a GSM Tester. 281-288 - Wojciech Bylica, Bogdan Ksiezopolski:
On Scalable Security Audit for Web Application According to ISO 27002. 289-297 - Maciej Szmit, Anna Szmit:
DNS Pseudo-Random Number Generators Weakness. 298-305 - Arkadiusz Jestratjew, Andrzej Kwiecien:
Using HTTP as Field Network Transfer Protocol. 306-313 - Andrzej Kwiecien, Jacek Stój:
Genius Network Communication Process Registration and Analysis. 314-321 - Blazej Kwiecien, Jacek Stój:
Network Integration on the Control Level. 322-327 - Piotr Gaj:
The Concept of a Multi-network Approach for a Dynamic Distribution of Application Relationships. 328-337 - Michal Bochenek, Marcin Fojcik, Rafal Cupek:
OPC Historical Data Access - OPC Foundation Toolkit Improvement Suggestions. 338-347 - Kamil Folkert, Marcin Fojcik, Rafal Cupek:
Efficiency of OPC UA Communication in Java-Based Implementations. 348-357 - Rafal Cupek, Lukasz Huczala:
Field Level Industrial Ethernet Network Data Analysis. 358-366 - Andrzej Kwiecien, Karol Opielka:
Industrial Networks in Explosive Atmospheres. 367-378 - Andrzej Kwiecien, Marcin Sidzina:
The Method of Reducing the Cycle of Programmable Logic Controller (PLC) Vulnerable "to Avalanche of Events". 379-385 - Pawel Szalachowski, Zbigniew Kotulski, Bogdan Ksiezopolski:
Secure Position-Based Selecting Scheme for WSN Communication. 386-397 - Dariusz Rzonca, Andrzej Stec, Bartosz Trybus:
Data Acquisition Server for Mini Distributed Control System. 398-406 - Damian Parniewicz, Maciej Stasiak, Piotr Zwierzykowski:
Multicast Connections in Mobile Networks with Embedded Threshold Mechanism. 407-416 - Andrzej Kwiecien, Michal Mackowski, Krzysztof Skoroniak:
The Analysis of Microprocessor Instruction Cycle. 417-426 - Andrzej Kwiecien, Michal Mackowski, Krzysztof Skoroniak:
Instruction Prediction in Microprocessor Unit. 427-433 - Blazej Kwiecien:
Optimization for Database Migration Using Network Socket Option. 434-438 - Artur Frankiewicz:
Self-adapting Algorithm for Transmission Power Control in Integrated Meter Reading Systems Based on Wireless Sensor Networks. 439-447 - Arkadiusz Biernacki:
Simulating Performance of a BitTorrent-Based P2P TV System. 448-458 - Arkadiusz Sochan, Przemyslaw Glomb, Krzysztof Skabek, Michal Romaszewski, Sebastian Opozda:
Virtual Museum as an Example of 3D Content Distribution in the Architecture of a Future Internet. 459-464
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.