Maciej Czekaj, Ernest Jamro
FLOW CACHING EFFECTIVENESS
IN PACKET FORWARDING APPLICATIONS
|
Computer Science 20 (2) (2019), 145-163 |
Pełny tekst/Article:
pdf (761kB)
|
 |
Elżbieta Kuligowska, Maciej Czuchry, Krzysztof Chyży, Tomasz Kundera, Carole Roskowiński, Marta A. Dziełak
INSTALLATION AND TESTING
THE LOFAR SOFTWARE
ON ACC CYFRONET CLUSTER
PROMETHEUS
|
Computer Science 20 (2) (2019), 165-177 |
Pełny tekst/Article:
pdf (405kB)
|
 |
Marek Retinger
A CLIENT-BASED ENCRYPTION MODEL
FOR SECURE DATA STORING IN PUBLICLY AVAILABLE STORAGE SYSTEMS
|
Computer Science 20 (2) (2019), 179-194 |
Pełny tekst/Article:
pdf (682kB)
|
 |
Aybeyan Selimi, Samedin Krrabaj, Muzafer Saračević, Selver Pepić
MEMOIZATION METHOD FOR STORING
MINIMUM-WEIGHT TRIANGULATION
OF CONVEX POLYGON
|
Computer Science 20 (2) (2019), 195-211 |
Pełny tekst/Article:
pdf (721kB)
|
 |
Murat Yilmaz, Ferhat Ozgur Catak, Ensar Gul
SENSOR-BASED CYBERATTACK DETECTION
IN CRITICAL INFRASTRUCTURES USING DEEP LEARNING ALGORITHMS
|
Computer Science 20 (2) (2019), 213-243 |
Pełny tekst/Article:
pdf (840kB)
|
 |
Satya Prakash Sahoo, Manas Ranjan Kabat
MULTI-CONSTRAINED MULTICAST
ROUTING IMPROVED BY HYBRID BACTERIA FORAGING/PARTICLE SWARM
OPTIMIZATION
|
Computer Science 20 (2) (2019), 245-269 |
Pełny tekst/Article:
pdf (1,1MB)
|