Page Header

User
Notifications
  • View
  • Subscribe
Journal Content

Browse
  • By Issue
  • By Author
  • By Title
  • Other Journals
Font Size

Deklaracja dostępności
  • Home
  • About
  • Login
  • Register
  • Search
  • Current
  • Archives
  • Announcements
Home > Archives > Vol 11, No 4 (2011)

Vol 11, No 4 (2011)

Table of Contents

Cryptographic software: vulnerabilities in implementations
Michał Łuczaj
PDF
1-10
On the key exchange with new cubical maps based on graphs
Urszula Romańczuk, Vasyl Ustimenko
PDF
11-19
Reliability of feedback fechanism based on root cause defect analysis - case study
Marek G. Stochel
PDF
21-32
Agent based infrastructure for real-time applications
Grzegorz Oryńczak, Zbigniew Kotulski
PDF
33-47
A conceptual Bayesian net model for integrated software quality prediction
Łukasz Radliński
PDF
49-60
Automated geometric features evaluation method for normal foot skeleton model
Bartosz Borucki, Krzysztof Nowiński, Michał Chlebiej, Andrzej Rutkowski, Paweł Adamczyk, Jacek Laskowski
PDF
61-75
Models of analysis for enterprise information technology strategy
Marcin W. Mastalerz
PDF
77-78
Communication management in Polish IT Companies
Karolina Muszyńska
PDF
89-101
Identification of e-learning services in higher education
Tomasz Komorowski
PDF
103-113


ISSN: 2083-3628