Wybierz kierunek z przyszłością. Zostań studentem WBMiI!

Katedra Matematyki
Wydział Budowy Maszyn i Informatyki

2012

Publikacje w roku 2012

    • K. Nikodem, T. Rajba, Sz. Wąsowicz
      Functions Generating Strongly Schur-Convex Sums, Inequalities and applications 2010: dedicated to the memory of Wolfgang Walter / ed. Catherine Bandle (2012), 175-182
    • J. Mako, K. Nikodem, Zsolt Ples
      On strong ( , F)-convexity, Math. Inequal. Appl. 15 (2012), 289-299
    • K. Nikodem, T. Rajba, Sz. Wąsowicz
      On the classes of higher-order Jensen-convex functions and Wright-convex functions, J. Math. Anal. Appl., 396 (2012), 261-269
    • B. Micherda
      A characterization of convex a-functions, Opuscula Math. 32 (2012)
    • B. Micherda, T. Rajba
      On some Hermite-Hadamard-Fejer inequalities for (k,h)-convex functions, Math. Inequal. Appl. 15 (2012), 931-940
    • T. Rajba
      An application of the choquet theorem to the study of randomly-superinvariant measures, Opuscula Math. 32 (2012)
    • T. Rajba, S. Rajba
      The probability of collisions in Wireless Sensor Network with random sending, Przegl�d elektroniczny (Electrical Review), R.88 nr 9a/2012
    • T. Rajba
      A generalization of multiple Wright-convex functions via randomization, J. Math. Anal. Appl.
    • Sz. Wąsowicz, A. Witkowski
      On some inequality of Hermite-Hadamard type, Opuscula Math. 32 (2012)
    • M. Karpiski
      Monografia: Bezpiecze�stwo informacji, Warszawa: Wydawnictwo PAK 280, (2) (2012)
    • M. Aleksander, M. Karpiski, G. Litawa
      Implementation in FPGA of computations on eliptic curverGF(p) based onRademacher-Krestenson's bases, Infomacijna bezpeka = Informative Safety : shidoukrains'kij nacional'nij universitet imeni Volodomira Dal'a No. 1(7) (2012), 12-17
    • V. M. Ciz, O.I Demcisin, M. Karpi�ski, S.M. Balaban
      Using cluster model for calculation of reliability wireless sensor networks, Infomacijna bezpeka = Informative Safety : shidoukrains'kij nacional'nij universitet imeni Volodomira Dal'a No. 1(7) (2012), 83-89
    • M. Aleksander, B. Borowik, P. Evtukh, M. Karpiski
      Realization of the method of attacks visualization in wireless sensor networks, Visnik Nacional'nogo Universitetu "L'vivs'ka Politehnika": Radioelektronika ta Telekomunikacii nr. 738 (2012), 112-116
    • N. V. Piontko, M. Karpiski
      Criteria for segmenting partially blured images, Scientific Journal of the East Ukrainian National University No. 8(179) (2012), 285-291
    • U.O Acikovs'ka, M. Karpiski, Aroslav Kinah
      Modeling of DOS/DDOS attacts on the basais of probabilistic packet marketing, Scientific Journal of the East Ukrainian National University No. 8(179) (2012), 62-68
    • J. Kołodziej, Fatos Xhafa
      Integration of task abortion and security requirements in GA-based meta-heuristic for independent batch grid scheduling, Computers and Mathematics with Applications Vol. 63 Iss. 2 (2012), 350-364
    • J. Kołodziej, Samee U. Khan, Lizhe Wang, Albert Y. Zomaya
      Energy efficient genetic-based schedulers in computational grids, Concurrency and Computation: Practice and Experience (2012), 1-21
    • G. Gąbczyński, J. Kołodziej, Samee U. Khan
      Secure-Sim-G: security-aware grid simulator - basic concept and structure, Journal of Telecommunications and Information Technology 1 (2012), 33-42
    • K. Warwas, . Herok, P. Faat
      Test Driven development in evolutionary algorithms programming, Informatyka w dobie XXI wieku: technologie komputerowe w rozwoju nauki, techniki i edukacji, 157-168

©2023 UBB. Wszystkie prawa zastrzeżone. Realizacja: Dział Marketingu