


default search action
CN 2017: Lądek Zdrój, Poland
- Piotr Gaj, Andrzej Kwiecien, Michal Sawicki:
Computer Networks - 24th International Conference, CN 2017, Lądek Zdrój, Poland, June 20-23, 2017, Proceedings. Communications in Computer and Information Science 718, Springer 2017, ISBN 978-3-319-59766-9
Computer Networks
- Ivanna Dronyuk
, Olga Fedevych:
Traffic Flows Ateb-Prediction Method with Fluctuation Modeling Using Dirac Functions. 3-13 - Wojciech Rzasa
, Marcin Jamro, Dariusz Rzonca
:
Improving Accuracy of a Network Model Basing on the Case Study of a Distributed System with a Mobile Application and an API. 14-27 - Jan Chudzikiewicz
, Tomasz Malinowski
, Zbigniew Zielinski
, Janusz Furtak
:
Method for Determining Effective Diagnostic Structures Within the Military IoT Networks. 28-43 - Jerzy Martyna:
QoS-Based Power Control and Resource Allocation in Cognitive LTE-Femtocell Networks. 44-54 - Jakub Pyda, Wojciech Prokop, Damian Rusinek, Bogdan Ksiezopolski
:
Secure and Reliable Localization in Wireless Sensor Network Based on RSSI Mapping. 55-69 - Slawomir Nowak, Mateusz P. Nowak
, Krzysztof Grochla
, Piotr Pecka
:
Application of Fault-Tolerant GQP Algorithm in Multihop AMI Networks. 70-80 - Serpil Ustebay
, M. Ali Aydin
, Ahmet Sertbas
, Tülin Atmaca:
A Comparative Analysis of N-Nearest Neighbors (N3) and Binned Nearest Neighbors (BNN) Algorithms for Indoor Localization. 81-90 - Michal Hoeft
, Józef Wozniak:
Evaluation of Connectivity Gaps Impact on TCP Transmissions in Maritime Communications. 91-105 - Dariusz Czerwinski
, Slawomir Przylucki, Piotr Wojcicki
, Jaroslaw Sitkiewicz:
Path Loss Model for a Wireless Sensor Network in Different Weather Conditions. 106-117 - Matej Zuzcak
, Tomas Sochor
:
Behavioral Analysis of Bot Activity in Infected Systems Using Honeypots. 118-133 - Artur Hlobaz
, Krzysztof Podlaski
, Piotr Milczarski
:
Enhancements of Encryption Method Used in SDEx. 134-143 - Miroslaw Skrzewski, Pawel Rybka:
The Possibilities of System's Self-defense Against Malicious Software. 144-153 - Christian Callegari, Stefano Giordano
, Michele Pagano
:
Impact of Histogram Construction Techniques on Information - Theoretic Anomaly Detection. 154-165 - Sergii Lysenko
, Oleg Savenko
, Kira Bobrovnikova
, Andrii Kryshchuk, Bohdan Savenko
:
Information Technology for Botnets Detection Based on Their Behaviour in the Corporate Area Network. 166-181 - Andrzej Kwiecien, Michal Mackowski
, Jacek Stój
, Dariusz Rzonca
, Marcin Sidzina
:
Utilization of Redundant Communication Network Throughput for Non-critical Data Exchange in Networked Control Systems. 182-194 - Slawomir Przylucki, Artur Sierszen
, Dariusz Czerwinski
:
Software Defined Home Network for Distribution of the SVC Video Based on the DASH Principles. 195-206
Teleinformatics and Telecommunications
- Bartlomiej Placzek, Marcin Bernas
:
Minimum Transmission Range Estimation for Vehicular Ad Hoc Networks in Signalised Arterials. 209-220 - Adam Kaliszan, Maciej Stasiak
:
The Possibilities and Limitations of the Application of the Convolution Algorithm for Modeling Network Systems. 221-235 - Piotr Zawadzki:
An Efficient Method for Calculation of the Radiation from Copper Installations with Wideband Transmission Systems. 236-244 - Robert Bestak
, Jiri Hlavacek:
A Videoconferencing System Based on WebRTC Technology. 245-255 - Mariusz Glabowski
, Adam Kaliszan, Maciej Stasiak
:
Analytical Modelling of Multi-tier Cellular Networks with Traffic Overflow. 256-268
New Technologies
- Fahad Nife
, Zbigniew Kotulski
:
Multi-level Stateful Firewall Mechanism for Software Defined Networks. 271-286 - Piotr Zawadzki:
Quantum Direct Communication Wiretapping. 287-294 - Joanna Wisniewska
, Marek Sawerwain
:
A Qutrit Switch for Quantum Networks. 295-304 - Waheed Aslam Ghumman, Alexander Schill:
SLA Life Cycle Automation and Management for Cloud Services. 305-318
Queueing Theory
- Tomasz Rak
:
Performance Modeling Using Queueing Petri Nets. 321-335 - Adam Domanski, Joanna Domanska
, Tadeusz Czachórski
, Jerzy Klamka:
Self-similarity Traffic and AQM Mechanism Based on Non-integer Order PI^α D^β Controller. 336-350 - Rosario Delgado
, Evsey Morozov
:
Stability Analysis of a Basic Collaboration System via Fluid Limits. 351-365 - Oleg M. Tikhonenko
, Wojciech M. Kempa
:
Erlang Service System with Limited Memory Space Under Control of AQM Mechanizm. 366-379 - Oleg M. Tikhonenko
, Pawel Zajac:
Queueing Systems with Demands of Random Space Requirement and Limited Queueing or Sojourn Time. 380-391
Innovative Applications
- Arne Neumann, Martin Jan Mytych, Derk Wesemann, Lukasz Wisniewski
, Jürgen Jasperneite
:
Approaches for In-vehicle Communication - An Analysis and Outlook. 395-411 - Serpil Ustebay
, Züleyha Yiner, M. Ali Aydin
, Ahmet Sertbas
, Tülin Atmaca:
An Approach for Evaluating Performance of Magnetic-Field Based Indoor Positioning Systems: Neural Network. 412-421 - Dariusz Rafal Augustyn
:
Improvements of the Reactive Auto Scaling Method for Cloud Platform. 422-431 - Alexander Brovko, Olga N. Dolinina, Vitaly V. Pechenkin
:
Method of the Management of Garbage Collection in the "Smart Clean City" Project. 432-443 - Marcin Bernas
, Bartlomiej Placzek:
Zone-Based VANET Transmission Model for Traffic Signal Control. 444-457

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.