CN 2011: Ustron, Poland
Andrzej Kwiecien, Piotr Gaj, Piotr Stera (Eds.): Computer Networks - 18th Conference, CN 2011, Ustron, Poland, June 14-18, 2011. Proceedings. Springer 2011 Communications in Computer and Information Science 160 ISBN 978-3-642-21770-8
Roman Gielerak, Marek Sawerwain: π-local Operations in Composite Quantum Systems with Applications to Multipartite Entanglement. 1-10
Marek Sawerwain, Roman Gielerak: Quantum Information Transfer Protocols: A Model and Its Numerical Simulations. 11-18
Remigiusz Olejnik: An Impact of the Nanoscale Network-on-Chip Topology on the Transmission Delay. 19-26
Jerzy Martyna: The Least Squares SVM Approach for a Non-linear Channel Prediction in the MIMO System. 27-36
Joanna Domanska, Adam Domanski, Dariusz Rafal Augustyn: The Impact of the Modified Weighted Moving Average on the Performance of the RED Mechanism. 37-44
Krzysztof Zatwarnicki: Identification of the Web Server. 45-54
Oleg M. Tikhonenko: Queueing Systems with Common Buffer: A Theoretical Treatment. 61-69
Józef Wozniak, Przemyslaw Machan, Krzysztof Gierlowski, Michal Hoeft, Michal Lewczuk: Comparative Analysis of IP-Based Mobility Protocols and Fast Handover Algorithms in IEEE 802.11 Based WLANs. 87-101
Leszek Borzemski, Anna Kaminska-Chuchmala: 3D Web Performance Forecasting Using Turning Bands Method. 102-113
Przemyslaw Skurowski, Robert Wojcicki: Lightweight Multiresolution Jitter Analysis for Packet Networks. 125-134
Agnieszka Brachman, Jakub Mieszczanin: Scheduling Algorithms for Different Approaches to Quality of Service Provisioning. 135-143
Leszek Borzemski, Marcin Wojtkiewicz: Evaluation of Chaotic Internet Traffic Predictor Using MAPE Accuracy Measure. 173-182
Grazyna Suchacka: Generating Bursty Web Traffic for a B2C Web Server. 183-190
HeeKyoung Yi, PyungKoo Park, Seungwook Min, JaeCheol Ryou: DDoS Detection Algorithm Using the Bidirectional Session. 191-203
Dariusz Czerwinski: Numerical Performance in the Grid Network Relies on a Grid Appliance. 214-223
Maciej Szmit, Anna Szmit: Use of Holt-Winters Method in the Analysis of Network Traffic: Case Study. 224-231
Asjad Amin, Kanwal Afreen, Abida Shaheen, Tayyabah Nadeem, Nida Rashid: Bandwidth Efficient TCP Frame Design without Acknowledgment Number Field. 232-241
Asjad Amin, Danyal Shafi, Zeeshan Ahmed, Waqas Anjum, Muhammad Owais, Faheem Akram: Incorporating Small Length Data Cells in TCP Frame to Reduce Retransmission of Corrupted Packets. 242-252
Ivanna Dronjuk, Mariya Nazarkevych, Oleksandra Myroniuk: Information Protection Based on the Theory of Ateb-Functions. 253-260
Krystian Baniak: Revocable Anonymity in Network Monitoring Systems. 261-270
Wojciech Bylica, Bogdan Ksiezopolski: On Scalable Security Audit for Web Application According to ISO 27002. 289-297

Pawel Szalachowski, Zbigniew Kotulski, Bogdan Ksiezopolski: Secure Position-Based Selecting Scheme for WSN Communication. 386-397
Dariusz Rzonca, Andrzej Stec, Bartosz Trybus: Data Acquisition Server for Mini Distributed Control System. 398-406
Damian Parniewicz, Maciej Stasiak, Piotr Zwierzykowski: Multicast Connections in Mobile Networks with Embedded Threshold Mechanism. 407-416
Artur Frankiewicz: Self-adapting Algorithm for Transmission Power Control in Integrated Meter Reading Systems Based on Wireless Sensor Networks. 439-447
Arkadiusz Biernacki: Simulating Performance of a BitTorrent-Based P2P TV System. 448-458
Arkadiusz Sochan, Przemyslaw Glomb, Krzysztof Skabek, Michal Romaszewski, Sebastian Opozda: Virtual Museum as an Example of 3D Content Distribution in the Architecture of a Future Internet. 459-464



