


default search action
CN 2018: Gliwice, Poland
- Piotr Gaj, Michal Sawicki, Grazyna Suchacka
, Andrzej Kwiecien:
Computer Networks - 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings. Communications in Computer and Information Science 860, Springer 2018, ISBN 978-3-319-92458-8
Computer Networks
- Jan Chudzikiewicz
, Tomasz Malinowski
:
The Method of Determining the Optimal Communication Structure. 3-12 - Olga Fedevych, Ivanna Dronyuk
, Danylo Lizanets:
Researching Measured and Modeled Traffic with Self-similar Properties for Ateb-Modeling Method Improvement. 13-25 - Dagmara Mazur
:
A Validation Method of a Real Network Device Model in the Riverbed Modeler Simulator. 26-39 - Michal Morawski
, Przemyslaw Ignaciuk:
Energy Efficient MPTCP Transmission Over Channels with a Common Bottleneck. 40-51 - Robert R. Chodorek, Agnieszka Chodorek:
Light-Weight Congestion Control for the DCCP Protocol for Real-Time Multimedia Communication. 52-63 - Tomasz Malinowski
, Jan Chudzikiewicz
:
On Improving Communication System Performance in Some Virtual Private Networks. 64-73 - Fahad Nife
, Zbigniew Kotulski
:
New SDN-Oriented Authentication and Access Control Mechanism. 74-88 - Damian Karpowicz, Tomasz Gierszewski, Krzysztof Nowicki:
Full Network Coverage Monitoring Solutions - The netBaltic System Case. 89-102 - Mike Oluwatayo Ojo
, Stefano Giordano
, Davide Adami
, Michele Pagano
:
A Novel Auction Based Scheduling Algorithm in Industrial Internet of Things Networks. 103-114 - Madhukrishna Priyadarsini
, Padmalochan Bera:
A New Approach for SDN Performance Enhancement. 115-129 - Marek Sawerwain
, Joanna Wisniewska
:
Quantum Coherence Measures for Quantum Switch. 130-141 - Michal Druzgala, Ziemowit Nowak:
Performance Evaluation of Web Sites Using HTTP/1.1 and HTTP/2. 142-157
Teleinformatics and Telecommunications
- Grzegorz Dziwoki
, Marcin Kucharczyk, Jacek Izydorczyk
:
Modified OMP Algorithm for Compressible Channel Impulse Response Estimation. 161-170 - Dariusz Czerwinski, Jaroslaw Nowak, Slawomir Przylucki:
Evaluation of the Jammers Performance in the WiFi Band. 171-182 - Konrad Polys
, Krzysztof Grochla
, Michal Gorawski
:
LTE Load Balancing with Tx Power Adjustment and the Real Life Mobility Model. 183-192 - Jacek Stój
, Ireneusz Smolka
, Michal Mackowski
:
Determining the Usability of Embedded Devices Based on Raspberry Pi and Programmed with CODESYS as Nodes in Networked Control Systems. 193-205 - Michal Sawicki, Andrzej Kwiecien:
The Method of Isochronous Cycle Duration Measurement for Serial Interface IEEE 1394A. 206-215
Queueing Theory
- Wojciech M. Kempa
, Martyna Kobielnik
:
Time to Buffer Overflow in a Queueing Model with Working Vacation Policy. 219-231 - Tülin Atmaca, Amira Kamli, Artur Rataj:
Adaptation of the N-GREEN Architecture for a Bursty Traffic. 232-244 - Slawomir Hanczewski
, Maciej Stasiak
, Joanna Weissenberg:
The Model of the DWDM Access Node. 245-257 - Kuaban Godlove Suila, Tadeusz Czachórski
, Artur Rataj:
A Queueing Model of the Edge Node in IP over All-Optical Networks. 258-271 - Marcin Ziólkowski
, Oleg M. Tikhonenko
:
Multiserver Queueing System with Non-homogeneous Customers and Sectorized Memory Space. 272-285 - Adam Domanski, Joanna Domanska
, Tadeusz Czachórski
, Jerzy Klamka, Dariusz Marek
, Jakub Szygula
:
GPU Accelerated Non-integer Order PI^α D^β P I α D β Controller Used as AQM Mechanism. 286-299 - Dariusz Rzonca
, Wojciech Rzasa, Slawomir Samolej
:
Consequences of the Form of Restrictions in Coloured Petri Net Models for Behaviour of Arrival Stream Generator Used in Performance Evaluation. 300-310 - Wojciech M. Kempa
, Rafal Marjasz
:
Transient Queueing Delay in a Finite-Buffer Batch-Arrival Model with Constant Repeated Vacations. 311-320
Cybersecurity and Quality of Service
- Huabo Lu, Rajiv Bagai:
Cache Enhanced Anonymity Systems Against Probabilistic Attacks. 323-332 - Sabina Szymoniak
:
The Impact of Time Parameters on the Security Protocols Correctness. 333-343 - Sabina Szymoniak
, Olga Siedlecka-Lamch
, Miroslaw Kurkowski
:
On Some Time Aspects in Security Protocols Analysis. 344-356 - Adam Czubak
, Andrzej Jasinski, Marcin Szymanek
:
A Note on Keys and Keystreams of Chacha20 for Multi-key Channels. 357-372 - Blazej Adamczyk:
Security Considerations of Modern Embedded Devices and Networking Equipment. 373-384 - Sergii Lysenko
, Oleg Savenko
, Kira Bobrovnikova
, Andrii Kryshchuk:
Self-adaptive System for the Corporate Area Network Resilience in the Presence of Botnet Cyberattacks. 385-401 - Jerzy Martyna:
QoS- and Energy-Aware Services Management of Resources in a Cloud Computing Environment. 402-413 - Zbigniew Lipinski:
Maximum Lifetime of the Wireless Sensor Network and the Gossip Problem. 414-428 - Marcin Bernas
, Bartlomiej Placzek, Wojciech Korski:
Wireless Network with Bluetooth Low Energy Beacons for Vehicle Detection and Classification. 429-444

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.