![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/umcs/umcs12.bht:"
@article{DBLP:journals/umcs/Badescu12, author = {Alina{-}Mihaela Badescu}, title = {A comparison of different modulation techniques performances in an underground multiuser communications scenario}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {2}, pages = {73--85}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0015-1}, doi = {10.2478/V10065-012-0015-1}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/Badescu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/BernardL12, author = {Nicolas Bernard and Franck Lepr{\'{e}}vost}, title = {Hardened Bloom Filters, with an Application to Unobservability}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {4}, pages = {11--22}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0018-y}, doi = {10.2478/V10065-012-0018-Y}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/BernardL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/BielakP12, author = {Halina Bielak and Michal Panczyk}, title = {A self-stabilizing algorithm for finding weighted centroid in trees}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {2}, pages = {27--37}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0035-x}, doi = {10.2478/V10065-012-0035-X}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/BielakP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/BilskiBGS12, author = {Tomasz Bilski and Krzysztof Bucholc and Anna Grocholewska{-}Czurylo and Janusz Stoklosa}, title = {Parameterized Hash Functions}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {3}, pages = {11--24}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0025-z}, doi = {10.2478/V10065-012-0025-Z}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/BilskiBGS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/BorowskiLWG12, author = {Mariusz Borowski and Marek Lesniewicz and Robert Wicik and Marcin Grzonkowski}, title = {Generation of random keys for cryptographic systems}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {3}, pages = {75--87}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0033-z}, doi = {10.2478/V10065-012-0033-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/BorowskiLWG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/Buczek12, author = {Mateusz Buczek}, title = {Attacks on StreamHash 2}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {3}, pages = {25--35}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0024-0}, doi = {10.2478/V10065-012-0024-0}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/Buczek12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/Challita12, author = {Khalil Challita}, title = {The Meeting Businessmen Problem: Requirements and Limitations}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {1}, pages = {67--77}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0003-5}, doi = {10.2478/V10065-012-0003-5}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/Challita12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/CodelloKSK12, author = {Ireneusz Codello and Wieslawa Kuniszyk{-}J{\'{o}}zkowiak and Elzbieta Smolka and Adam Kobus}, title = {Automatic disordered sound repetition recognition in continuous speech using {CWT} and kohonen network}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {2}, pages = {39--48}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0014-2}, doi = {10.2478/V10065-012-0014-2}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/CodelloKSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/DymoraMN12, author = {Pawel Dymora and Miroslaw Mazurek and Slawomir Nieroda}, title = {Sensor network infrastructure for intelligent building monitoring and management system}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {2}, pages = {59--71}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0010-6}, doi = {10.2478/V10065-012-0010-6}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/DymoraMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/DymoraMS12, author = {Pawel Dymora and Miroslaw Mazurek and Dominik Strzalka}, title = {Long-range dependencies in reading memory pages in the man-computer system interaction}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {2}, pages = {49--58}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0011-5}, doi = {10.2478/V10065-012-0011-5}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/DymoraMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/EmamO12, author = {Ashraf M. Emam and Mahmoud M. Ouf}, title = {Performance Evaluation of Different Universal Steganalysis Techniques in {JPG} Files}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {3}, pages = {121--139}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0026-y}, doi = {10.2478/V10065-012-0026-Y}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/EmamO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/HeSKFMPM12, author = {Xiaobing He and Pawel Szalachowski and Zbigniew Kotulski and Nikos Fotiou and Giannis F. Marias and George C. Polyzos and Hermann de Meer}, title = {Energy-aware Key Management in Mobile Wireless Sensor Networks}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {4}, pages = {83--96}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0022-2}, doi = {10.2478/V10065-012-0022-2}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/HeSKFMPM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/JuzonisGCO12, author = {Vaidas Juzonis and Nikolaj Goranin and Antanas Cenys and Dmitrij Olifer}, title = {Specialized Genetic Algorithm Based Simulation Tool Designed For Malware Evolution Forecasting}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {4}, pages = {23--37}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0031-1}, doi = {10.2478/V10065-012-0031-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/umcs/JuzonisGCO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/KapustaS12, author = {Joanna Kapusta and Ryszard Smarzewski}, title = {Fast multidimensional Bernstein-Lagrange algorithms}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {2}, pages = {7--18}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0002-6}, doi = {10.2478/V10065-012-0002-6}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/KapustaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/KawaK12, author = {Renata Kawa and Mieczyslaw Kula}, title = {A Remark on Hierarchical Threshold Secret Sharing}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {3}, pages = {55--64}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0020-4}, doi = {10.2478/V10065-012-0020-4}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/KawaK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/Kornatka12, author = {Artur Kornatka}, title = {Generating of Business Database Application Elements}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {1}, pages = {79--87}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0008-0}, doi = {10.2478/V10065-012-0008-0}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/Kornatka12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/KrawczykS12, author = {Urszula Krawczyk and Piotr Sapiecha}, title = {Automatic detection of DoS vulnerabilities of cryptographic protocols}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {4}, pages = {51--67}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0028-9}, doi = {10.2478/V10065-012-0028-9}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/KrawczykS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/KsiezopolskiRW12, author = {Bogdan Ksiezopolski and Damian Rusinek and Adam Wierzbicki}, title = {On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML)}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {4}, pages = {69--81}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0032-0}, doi = {10.2478/V10065-012-0032-0}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/KsiezopolskiRW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/Kuniszyk-JozkowiakJSC12, author = {Wieslawa Kuniszyk{-}J{\'{o}}zkowiak and Janusz Jaszczuk and Tomasz Sacewicz and Ireneusz Codello}, title = {Time-frequency Analysis of the {EMG} Digital Signals}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {2}, pages = {19--25}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0001-7}, doi = {10.2478/V10065-012-0001-7}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/Kuniszyk-JozkowiakJSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/MaciukKDM12, author = {Mariusz Maciuk and Wieslawa Kuniszyk{-}J{\'{o}}zkowiak and Anna Doboszynska and Marta Maciuk}, title = {Analysis of lung auscultatory phenomena using the Wigner-Ville Distribution}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {1}, pages = {7--16}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0016-0}, doi = {10.2478/V10065-012-0016-0}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/MaciukKDM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/Omiotek12, author = {Zbigniew Omiotek}, title = {A method for QoS differentiation in DiffServ networks based on the long-term properties of a video stream}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {1}, pages = {47--56}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0007-1}, doi = {10.2478/V10065-012-0007-1}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/Omiotek12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/OrynczakK12, author = {Grzegorz Orynczak and Zbigniew Kotulski}, title = {Notary-based self-healing mechanism for centralized peer-to-peer infrastructures}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {4}, pages = {97--112}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0023-1}, doi = {10.2478/V10065-012-0023-1}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/OrynczakK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/PawelMSP12, author = {Pawel Dymora and Miroslaw Mazurek and Dominik Strzalka and Marcin Piekos}, title = {Influence of batch structure on cluster computing performance - complex systems approach}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {1}, pages = {57--66}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0012-4}, doi = {10.2478/V10065-012-0012-4}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/PawelMSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/PawinskiS12, author = {Grzegorz Pawinski and Krzysztof Sapiecha}, title = {Resource Allocation Optimization in Critical Chain Method}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {1}, pages = {17--29}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0006-2}, doi = {10.2478/V10065-012-0006-2}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/PawinskiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/PolakU12, author = {Monika Polak and Vasyl Ustimenko}, title = {{LDPC} Codes Based on Algebraic Graphs}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {3}, pages = {107--119}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0034-y}, doi = {10.2478/V10065-012-0034-Y}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/PolakU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/PrauznerP12, author = {Tomasz Prauzner and Pawel Ptak}, title = {The role of standardization in the development of e-learning}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {2}, pages = {87--92}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0004-4}, doi = {10.2478/V10065-012-0004-4}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/PrauznerP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/RomanczukU12, author = {Urszula Romanczuk and Vasyl Ustimenko}, title = {On the family of cubical multivariate cryptosystems based on the algebraic graph over finite commutative rings of characteristic 2}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {3}, pages = {89--106}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0029-8}, doi = {10.2478/V10065-012-0029-8}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/RomanczukU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/SeredynskiSP12, author = {Franciszek Seredynski and Jaroslaw Skaruz and Adrian Piraszewski}, title = {Image reconstruction with the use of evolutionary algorithms and cellular automata}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {4}, pages = {39--49}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0017-z}, doi = {10.2478/V10065-012-0017-Z}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/SeredynskiSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/Tunia12, author = {Marcin Alan Tunia}, title = {Distributed Social Network - data security}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {4}, pages = {113--122}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0019-x}, doi = {10.2478/V10065-012-0019-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/Tunia12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/UstimenkoW12, author = {Vasyl Ustimenko and Aneta Wr{\'{o}}blewska}, title = {Dynamical systems as the main instrument for the constructions of new quadratic families and their usage in cryptography}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {3}, pages = {65--74}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0030-2}, doi = {10.2478/V10065-012-0030-2}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/UstimenkoW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/VarretteMB12, author = {S{\'{e}}bastien Varrette and Jakub Muszynski and Pascal Bouvry}, title = {Hash function generation by means of Gene Expression Programming}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {3}, pages = {37--53}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0027-x}, doi = {10.2478/V10065-012-0027-X}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/VarretteMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/WojtowiczO12, author = {Wioletta W{\'{o}}jtowicz and Marek R. Ogiela}, title = {Security issues on digital watermarking algorithms}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {4}, pages = {123--139}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0021-3}, doi = {10.2478/V10065-012-0021-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/WojtowiczO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/ZiolkoK12, author = {Bartosz Zi{\'{o}}lko and Maciej Kruk}, title = {Automatic reasoning in the Planet Wars game}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {1}, pages = {39--45}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0009-z}, doi = {10.2478/V10065-012-0009-Z}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/ZiolkoK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/ZlotoPP12, author = {Tadeusz Zloto and Pawel Ptak and Tomasz Prauzner}, title = {Analysis of signals from inductive sensors by means of the DasyLab software}, journal = {Ann. {UMCS} Informatica}, volume = {12}, number = {1}, pages = {31--37}, year = {2012}, url = {https://doi.org/10.2478/v10065-012-0005-3}, doi = {10.2478/V10065-012-0005-3}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/ZlotoPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.