


default search action
Annales UMCS, Informatica, Volume 16
Volume 16, Number 1, October 2016
- Jaroslaw Bernacki:

Recommending learning material in Intelligent Tutoring Systems. 1 - Piotr Wisniewski, Marta Burzanska, Przemyslaw Krukowski:

Extending DQL with Recursive Facilities. 12 - Karol Kuczynski

, Rafal Stegierski, Waldemar Suszynski, Dawid Królica:
Remote Access Environment for Computer Networking Laboratory: Challenges and Solutions. 21 - Anna Kurzydlowska, Dorota Stempien:

Centre of Information Technologies for Humanities and Social Sciences - a milestone towards cybernation of Polish Humanities. 30 - Barbara Lukawska, Grzegorz Lukawski, Krzysztof Sapiecha:

An implementation of articial advisor for dynamic classication of objects. 40 - Grzegorz Pawinski, Krzysztof Sapiecha:

A Low-cost Multicomputer for solving the RCPSP. 50 - Waldemar Suszynski, Wieslawa Kuniszyk-Józkowiak, Ireneusz Codello, Rafal Stegierski, Karol Kuczynski

, Janusz Jaszczuk:
Analysis of surface myoelectric signals by linear prediction method. 62
Volume 16, Number 2, December 2017
- Arnaja Sen, Dhaval Popat, Hardik Shah, Priyanka Kuwor, Era Johri:

Music Playlist Generation using Facial Expression Analysis and Task Extraction. 1 - Michal Chromiak:

Heterogeneous Indexing Register for Object Database. 7 - Pawel Dymora, Miroslaw Mazurek, Slawomir Jaskólka:

VoIP Anomaly Detection - selected methods of statistical analysis. 14 - Mariusz Nycz

, Miroslaw Hajder
, Alicja Gerka
:
New architecture of system intrusion detection and prevention. 20 - Pawel Kaplanski, Alessandro Seganti, Krzysztof Cieslinski, Aleksandra Chrabrowa, Jerzy Koziolkiewicz, Marcin Bryk, Iwona Lugowska:

Opening Access To Practice-based Evidence in Clinical Decision Support Systems with Natural Query Language. 25 - Kazimierz Kielkowicz, Damian Grela:

FLC control for tuning exploration phase in bio-inspired metaheuristic. 32 - Mariusz Nycz

, Miroslaw Hajder, Sara Nienajadlo:
Methods for increasing security of web servers. 39 - Dominik Strzalka:

Some preliminary results of memory cache analysis with the use of non-extensive. 43 - Syed Aqib Haider:

Matroids And Greedy Algorithms. A Deeper Justification of Using Greedy Approach To Find A Maximal set of a Matroid. 48

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














