Search dblp for Publications

export results for "toc:db/journals/umcs/umcs12.bht:"

 download as .bib file

@article{DBLP:journals/umcs/Badescu12,
  author       = {Alina{-}Mihaela Badescu},
  title        = {A comparison of different modulation techniques performances in an
                  underground multiuser communications scenario},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {2},
  pages        = {73--85},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0015-1},
  doi          = {10.2478/V10065-012-0015-1},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/Badescu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/BernardL12,
  author       = {Nicolas Bernard and
                  Franck Lepr{\'{e}}vost},
  title        = {Hardened Bloom Filters, with an Application to Unobservability},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {4},
  pages        = {11--22},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0018-y},
  doi          = {10.2478/V10065-012-0018-Y},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/BernardL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/BielakP12,
  author       = {Halina Bielak and
                  Michal Panczyk},
  title        = {A self-stabilizing algorithm for finding weighted centroid in trees},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {2},
  pages        = {27--37},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0035-x},
  doi          = {10.2478/V10065-012-0035-X},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/BielakP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/BilskiBGS12,
  author       = {Tomasz Bilski and
                  Krzysztof Bucholc and
                  Anna Grocholewska{-}Czurylo and
                  Janusz Stoklosa},
  title        = {Parameterized Hash Functions},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {3},
  pages        = {11--24},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0025-z},
  doi          = {10.2478/V10065-012-0025-Z},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/BilskiBGS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/BorowskiLWG12,
  author       = {Mariusz Borowski and
                  Marek Lesniewicz and
                  Robert Wicik and
                  Marcin Grzonkowski},
  title        = {Generation of random keys for cryptographic systems},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {3},
  pages        = {75--87},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0033-z},
  doi          = {10.2478/V10065-012-0033-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/BorowskiLWG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/Buczek12,
  author       = {Mateusz Buczek},
  title        = {Attacks on StreamHash 2},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {3},
  pages        = {25--35},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0024-0},
  doi          = {10.2478/V10065-012-0024-0},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/Buczek12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/Challita12,
  author       = {Khalil Challita},
  title        = {The Meeting Businessmen Problem: Requirements and Limitations},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {1},
  pages        = {67--77},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0003-5},
  doi          = {10.2478/V10065-012-0003-5},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/Challita12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/CodelloKSK12,
  author       = {Ireneusz Codello and
                  Wieslawa Kuniszyk{-}J{\'{o}}zkowiak and
                  Elzbieta Smolka and
                  Adam Kobus},
  title        = {Automatic disordered sound repetition recognition in continuous speech
                  using {CWT} and kohonen network},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {2},
  pages        = {39--48},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0014-2},
  doi          = {10.2478/V10065-012-0014-2},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/CodelloKSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/DymoraMN12,
  author       = {Pawel Dymora and
                  Miroslaw Mazurek and
                  Slawomir Nieroda},
  title        = {Sensor network infrastructure for intelligent building monitoring
                  and management system},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {2},
  pages        = {59--71},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0010-6},
  doi          = {10.2478/V10065-012-0010-6},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/DymoraMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/DymoraMS12,
  author       = {Pawel Dymora and
                  Miroslaw Mazurek and
                  Dominik Strzalka},
  title        = {Long-range dependencies in reading memory pages in the man-computer
                  system interaction},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {2},
  pages        = {49--58},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0011-5},
  doi          = {10.2478/V10065-012-0011-5},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/DymoraMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/EmamO12,
  author       = {Ashraf M. Emam and
                  Mahmoud M. Ouf},
  title        = {Performance Evaluation of Different Universal Steganalysis Techniques
                  in {JPG} Files},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {3},
  pages        = {121--139},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0026-y},
  doi          = {10.2478/V10065-012-0026-Y},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/EmamO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/HeSKFMPM12,
  author       = {Xiaobing He and
                  Pawel Szalachowski and
                  Zbigniew Kotulski and
                  Nikos Fotiou and
                  Giannis F. Marias and
                  George C. Polyzos and
                  Hermann de Meer},
  title        = {Energy-aware Key Management in Mobile Wireless Sensor Networks},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {4},
  pages        = {83--96},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0022-2},
  doi          = {10.2478/V10065-012-0022-2},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/HeSKFMPM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/JuzonisGCO12,
  author       = {Vaidas Juzonis and
                  Nikolaj Goranin and
                  Antanas Cenys and
                  Dmitrij Olifer},
  title        = {Specialized Genetic Algorithm Based Simulation Tool Designed For Malware
                  Evolution Forecasting},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {4},
  pages        = {23--37},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0031-1},
  doi          = {10.2478/V10065-012-0031-1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/umcs/JuzonisGCO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/KapustaS12,
  author       = {Joanna Kapusta and
                  Ryszard Smarzewski},
  title        = {Fast multidimensional Bernstein-Lagrange algorithms},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {2},
  pages        = {7--18},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0002-6},
  doi          = {10.2478/V10065-012-0002-6},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/KapustaS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/KawaK12,
  author       = {Renata Kawa and
                  Mieczyslaw Kula},
  title        = {A Remark on Hierarchical Threshold Secret Sharing},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {3},
  pages        = {55--64},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0020-4},
  doi          = {10.2478/V10065-012-0020-4},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/KawaK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/Kornatka12,
  author       = {Artur Kornatka},
  title        = {Generating of Business Database Application Elements},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {1},
  pages        = {79--87},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0008-0},
  doi          = {10.2478/V10065-012-0008-0},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/Kornatka12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/KrawczykS12,
  author       = {Urszula Krawczyk and
                  Piotr Sapiecha},
  title        = {Automatic detection of DoS vulnerabilities of cryptographic protocols},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {4},
  pages        = {51--67},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0028-9},
  doi          = {10.2478/V10065-012-0028-9},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/KrawczykS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/KsiezopolskiRW12,
  author       = {Bogdan Ksiezopolski and
                  Damian Rusinek and
                  Adam Wierzbicki},
  title        = {On the modelling of Kerberos protocol in the Quality of Protection
                  Modelling Language (QoP-ML)},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {4},
  pages        = {69--81},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0032-0},
  doi          = {10.2478/V10065-012-0032-0},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/KsiezopolskiRW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/Kuniszyk-JozkowiakJSC12,
  author       = {Wieslawa Kuniszyk{-}J{\'{o}}zkowiak and
                  Janusz Jaszczuk and
                  Tomasz Sacewicz and
                  Ireneusz Codello},
  title        = {Time-frequency Analysis of the {EMG} Digital Signals},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {2},
  pages        = {19--25},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0001-7},
  doi          = {10.2478/V10065-012-0001-7},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/Kuniszyk-JozkowiakJSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/MaciukKDM12,
  author       = {Mariusz Maciuk and
                  Wieslawa Kuniszyk{-}J{\'{o}}zkowiak and
                  Anna Doboszynska and
                  Marta Maciuk},
  title        = {Analysis of lung auscultatory phenomena using the Wigner-Ville Distribution},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {1},
  pages        = {7--16},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0016-0},
  doi          = {10.2478/V10065-012-0016-0},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/MaciukKDM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/Omiotek12,
  author       = {Zbigniew Omiotek},
  title        = {A method for QoS differentiation in DiffServ networks based on the
                  long-term properties of a video stream},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {1},
  pages        = {47--56},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0007-1},
  doi          = {10.2478/V10065-012-0007-1},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/Omiotek12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/OrynczakK12,
  author       = {Grzegorz Orynczak and
                  Zbigniew Kotulski},
  title        = {Notary-based self-healing mechanism for centralized peer-to-peer infrastructures},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {4},
  pages        = {97--112},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0023-1},
  doi          = {10.2478/V10065-012-0023-1},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/OrynczakK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/PawelMSP12,
  author       = {Pawel Dymora and
                  Miroslaw Mazurek and
                  Dominik Strzalka and
                  Marcin Piekos},
  title        = {Influence of batch structure on cluster computing performance - complex
                  systems approach},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {1},
  pages        = {57--66},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0012-4},
  doi          = {10.2478/V10065-012-0012-4},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/PawelMSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/PawinskiS12,
  author       = {Grzegorz Pawinski and
                  Krzysztof Sapiecha},
  title        = {Resource Allocation Optimization in Critical Chain Method},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {1},
  pages        = {17--29},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0006-2},
  doi          = {10.2478/V10065-012-0006-2},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/PawinskiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/PolakU12,
  author       = {Monika Polak and
                  Vasyl Ustimenko},
  title        = {{LDPC} Codes Based on Algebraic Graphs},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {3},
  pages        = {107--119},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0034-y},
  doi          = {10.2478/V10065-012-0034-Y},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/PolakU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/PrauznerP12,
  author       = {Tomasz Prauzner and
                  Pawel Ptak},
  title        = {The role of standardization in the development of e-learning},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {2},
  pages        = {87--92},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0004-4},
  doi          = {10.2478/V10065-012-0004-4},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/PrauznerP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/RomanczukU12,
  author       = {Urszula Romanczuk and
                  Vasyl Ustimenko},
  title        = {On the family of cubical multivariate cryptosystems based on the algebraic
                  graph over finite commutative rings of characteristic 2},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {3},
  pages        = {89--106},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0029-8},
  doi          = {10.2478/V10065-012-0029-8},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/RomanczukU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/SeredynskiSP12,
  author       = {Franciszek Seredynski and
                  Jaroslaw Skaruz and
                  Adrian Piraszewski},
  title        = {Image reconstruction with the use of evolutionary algorithms and cellular
                  automata},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {4},
  pages        = {39--49},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0017-z},
  doi          = {10.2478/V10065-012-0017-Z},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/SeredynskiSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/Tunia12,
  author       = {Marcin Alan Tunia},
  title        = {Distributed Social Network - data security},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {4},
  pages        = {113--122},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0019-x},
  doi          = {10.2478/V10065-012-0019-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/Tunia12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/UstimenkoW12,
  author       = {Vasyl Ustimenko and
                  Aneta Wr{\'{o}}blewska},
  title        = {Dynamical systems as the main instrument for the constructions of
                  new quadratic families and their usage in cryptography},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {3},
  pages        = {65--74},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0030-2},
  doi          = {10.2478/V10065-012-0030-2},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/UstimenkoW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/VarretteMB12,
  author       = {S{\'{e}}bastien Varrette and
                  Jakub Muszynski and
                  Pascal Bouvry},
  title        = {Hash function generation by means of Gene Expression Programming},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {3},
  pages        = {37--53},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0027-x},
  doi          = {10.2478/V10065-012-0027-X},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/VarretteMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/WojtowiczO12,
  author       = {Wioletta W{\'{o}}jtowicz and
                  Marek R. Ogiela},
  title        = {Security issues on digital watermarking algorithms},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {4},
  pages        = {123--139},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0021-3},
  doi          = {10.2478/V10065-012-0021-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/WojtowiczO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/ZiolkoK12,
  author       = {Bartosz Zi{\'{o}}lko and
                  Maciej Kruk},
  title        = {Automatic reasoning in the Planet Wars game},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {1},
  pages        = {39--45},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0009-z},
  doi          = {10.2478/V10065-012-0009-Z},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/ZiolkoK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/ZlotoPP12,
  author       = {Tadeusz Zloto and
                  Pawel Ptak and
                  Tomasz Prauzner},
  title        = {Analysis of signals from inductive sensors by means of the DasyLab
                  software},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {12},
  number       = {1},
  pages        = {31--37},
  year         = {2012},
  url          = {https://doi.org/10.2478/v10065-012-0005-3},
  doi          = {10.2478/V10065-012-0005-3},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/ZlotoPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics