![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Computer Science (AGH), Volume 20
Volume 20, Number 1, 2019
- Michal Wlodarczyk, Damian Kacperski, Wojciech Sankowski, Kamil Grabowski
:
COMPACT: Biometric Dataset of Face Images Acquired in Uncontrolled Indoor Environment. - Maciej Paszynski
, Konrad Jopek, Anna Paszynska
, Muhammad Amber Hasaan, Keshav Pingali:
Hypergraph grammar based multi-thread multi-frontal direct solver with Galois scheduler. - Michal Jungiewicz, Aleksander Smywinski-Pohl
:
Towards textual data augmentation for neural networks: synonyms and maximum loss. - Piotr Szkotak, Pawel Russek, Kazimierz Wiatr:
Study of OpenCL processing models for FPGA device. - Adam Paclawski
, Jakub Szlek
, Aleksander Mendyk
:
Computational intelligence for prediction of biological effects of drugs absorption in lungs. - Tuba Parlar, Selma Ayse Özel
, Fei Song:
Analysis of data pre-processing methods for the sentiment analysis of reviews.
Volume 20, Number 2, 2019
- Maciej Jakub Czekaj, Ernest Jamro:
Flow caching effectiveness in packet forwarding applications. - Elzbieta Marzena Kuligowska, Maciej Czuchry, Krzysztof Chyzy
, Tomasz Norbert Kundera, Carole Roskowinski, Marta Dzielak
:
Installation and testing the LOFAR software on ACC Cyfronet cluster Prometheus. - Marek Retinger
:
A Client-Based Encryption Model for Secure Data Storing in Publicly Available Storage Systems. - Aybeyan Selimi
, Samedin Krrabaj, Muzafer H. Saracevic
, Selver Pepic:
Memoization method for storing of minimum-weight triangulation of a convex polygon. - Ferhat Özgür Çatak
, Murat Yilmaz, Ensar Gül
:
Sensor Based Cyber Attack Detections in Critical Infrastructures Using Deep Learning Algorithms.
Volume 20, Number 3, 2019
- Pranav Nerurkar
, Madhav Chandane
, Sunil Bhirud:
Exploring convolutional auto-encoders for representation learning on networks. - Marcin Lawnik
, Adrian Kapczynski:
The application of modified Chebyshev polynomials in asymmetric cryptography. - Onder Coban, Selma Ayse Özel
:
Adapting Text Categorization for Manifest based Android Malware Detection. - Rafal Wojciech Grzeszczuk
:
An approach to classification of data with highly localized unmarked features using neural networks. - Mateusz Rózanski:
Evolutionary Multi-Agent System with Crowding Factor and Mass Center mechanisms for Multiobjective Optimisation. - Somasundaram Kanagasabapathi, Chythanya Calicut:
A Routing Algorithm and a Router Architecture for 3D NoC.
Volume 20, Number 4, 2019
- Abhishek Gupta
:
Current research opportunities of image processing and computer vision. - Ahmed Hussein Ali, Mahmood Zaki Abdullah:
A novel approach for big data classification based on hybrid parallel dimensionality reduction using spark cluster. - Shuchi Dhir
, Sumithra Devi K. A:
Certificateless Digital Signature Technology for e-Governance Solutions. - Mateusz Jarosz
, Piotr Nawrocki, Leszek Placzkiewicz, Bartlomiej Sniezynski
, Marcin Zieinski, Bipin Indurkhya
:
Detecting Gaze Direction Using Robot-Mounted and Mobile-Device Cameras. - Marcin Kucharczyk
, Marcin Wolter
:
Track Finding with Deep Neural Networks. - Barbara Glut
, Tomasz Jurczyk
:
Tree-based Control Space Structures for Discrete Metric Sources in 3D Meshing.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.