Journal of Applied Computer Science - Journal - Bridge of Knowledge

Search

Journal of Applied Computer Science

ISSN:

1507-0360

Publisher:

Politechnika Łódzka

Ministry points: Help

Ministry points - current year
Year Points List
Year 2024 5 Journal not listed on ministry scored journal list 2024
Ministry points - previous years
Year Points List
2024 5 Journal not listed on ministry scored journal list 2024
2023 5 Not listed on the ministry scored journals list 2023
2022 5 Not listed on the ministry scored journals list (2019-2022)
2021 5 Not listed on the ministry scored journals list (2019-2022)
2020 5 Not listed on the ministry scored journals list (2019-2022)
2019 5 Not listed on the ministry scored journals list (2019-2022)
2018 10 B
2017 10 B
2016 10 B
2015 10 B
2014 5 B
2013 5 B
2012 5 B
2011 5 B
2010 6 B

Model:

Open Access

Impact Factor:

n/a

Publishing policy:

License: COPYRIGHT
License
COPYRIGHT
Information on publishing policy
https://it.p.lodz.pl/course/view.php?id=12 open in new tab
Information on the conditions of self-archiving
n/a
Is self-archiving allowed by the journal?
No
Information on research data policy
n/a
Months of embargo
no embargo
Additional information
Type of model Gratis Open Access (Bronze Open Access).

Filters

total: 13

  • Category
  • Year

clear Chosen catalog filters disabled

Catalog Journals

Year 2015
  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Full text to download in external service

  • Multi-agent systems registration and maintenance of address mapping without agent self-registation

    Monitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...

    Full text to download in external service

Year 2014
Year 2013
  • FIReWORK: FIR Filters Hardware Structures Auto-Generator
    Publication

    The paper presents application called FIReWORK, that allows for automatic creation of the VHDL hardware structures of FIR filters. Automat- ically generated specialized hardware solutions dedicated to the FPGA and ASIC are commonly known as Intellectual Property Cores. The essential fu- ture of the application is easy initialization of FIR filter parameters in GUI, and then automatically design, calculate and generate the IP Core...

    Full text to download in external service

Year 2011
Year 2009
Year 2007
Year 2006

seen 826 times