Search results for: SECURE ITALIAN DOMINATION
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublicationThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
A note on the weakly convex and convex domination numbers of a torus
PublicationW pracy określone są liczby liczby dominowania i dominowania wypukłego torusów, czyli iloczynów kartezjańskich dwóch cykli.
-
Lower bound on the weakly connected domination number of a tree
PublicationPraca dotyczy dolnego ograniczenia liczby dominowania słabo spójnego w drzewach (ograniczenie ze względu na ilość wierzchołków i ilość wierzchołków końcowych w drzewie).
-
Nordhaus-Gaddum results for the convex domination number of a graph
PublicationPraca dotyczy nierówności typu Nordhausa-Gadduma dla dominowania wypukłego.
-
Lower bound on the distance k-domination number of a tree
PublicationW artykule przedstawiono dolne ograniczenie na liczbę k-dominowania w drzewach oraz scharakteryzowano wszystkie grafy ekstremalne.
-
Domination numbers in graphs with removed edge or set of edges
PublicationW artykule przedstawiony jest wpływ usuwania krawędzi lub zbioru krawędzi na liczby dominowania spójnego i słabo spójnego.
-
Italian Journal of Linguistics
Journals -
Italian Journal of Pediatrics
Journals -
Italian Economic Journal
Journals -
Italian Journal of Geosciences
Journals -
Italian Journal of Medicine
Journals -
Italian Journal of Agronomy
Journals -
Italian Sociological Review
Journals -
Contemporary Italian Politics
Journals -
Italian Law Journal
Journals -
ITALIAN JOURNAL OF ZOOLOGY
Journals -
Italian Journal of Mycology
Journals -
Nordhaus-Gaddum results for the weakly convex domination number of a graph
PublicationArtykuł dotyczy ograniczenia z góry i z dołu (ze względu na ilość wierzchołków) sumy i iloczynu liczb dominowania wypukłego grafu i jego dopełnienia.
-
Wioleta Kucharska dr hab. inż.
PeopleWioleta Kucharska (Associate Professor at the Faculty of Management and Economics of the Gdansk University of Technology, Fahrenheit Universities Union, Poland), published so far with Wiley, Springer, Taylor & Francis, Emerald, Sage, Elsevier, and Routledge. She is scientifically involved in tacit knowledge and the company culture of knowledge, learning, and collaboration (KLC approach) topics. Recently, she discovered the...
-
Vitamin and Carotenoid Intake and Outcomes of In Vitro Fertilization in Women Referring to an Italian Fertility Service: A Cross-Sectional Analysis of a Prospective Cohort Study
Publication -
All graphs with restrained domination number three less than their order
PublicationW pracy opisana jest rodzina wszystkich grafów, dla których liczbadominowania zewnętrznego jest o trzy mniejsza od ich rzędu.
-
BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster
PublicationIntegrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...
-
The domination of ionic conductivity in tetragonal phase of the organometal halide perovskite CH3NH3PbI3-xClx
PublicationOrganometal trihalide perovskites have recently gained extreme attention due to their high solar energy conversion in photovoltaic cells. Here, we investigate the contribution of iodide ions to a total conductivity of the mixed lead halide perovskite CH3NH3PbI3−xClx with a use of the modified DC Hebb–Wagner polarization method. It has been identified that an ionic conductivity dominates in tetragonal phase which is associated with room...
-
Journal of Modern Italian Studies
Journals -
Journal of Anglo-Italian Studies
Journals -
Bulletin of Society of Italian Studies
Journals -
Italian Journal of Food Safety
Journals -
Italian Journal of Planning Practice
Journals -
Italian Journal of Gynaecology and Obstetrics
Journals -
Italian Journal of Sociology of Education
Journals -
Italian Journal of Anatomy and Embryology
Journals -
HYSTRIX-Italian Journal of Mammalogy
Journals -
Italian Journal of Dermatology and Venereology
Journals -
Italian Review of Legal History
Journals -
Italian Journal of Animal Science
Journals -
ITALIAN JOURNAL OF FOOD SCIENCE
Journals -
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublicationA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras
PublicationThe study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.
-
Video Cloud Services for Hospitals: Designing an End-to-End Cloud Service Platform for Medical Video Storage and Secure Access
Publication -
Entagled-state cryptographic protocol that remains secure even if nonlocal hidden variables exist and can be measured with arbitrary precision
PublicationStandardowe protokoły kryptografii kwantowej nie są bezpieczne jeśli zakłada się, że nielokalne ukryte zmienne istnieją i mogą być zmierzone z dowolną dokładnością. Bezpieczeństwo można odzyskać jeśli jedna z komunikujących się części przypadkowo przełącza się między dwoma standardowymi protokołami.
-
Italian Journal of Pure and Applied Mathematics
Journals -
Italian Journal of Engineering Geology and Environment
Journals -
Acque Sotterranee-Italian Journal of Groundwater
Journals -
Journal of Italian Cinema and Media Studies
Journals -
Sociologica-Italian Journal of Sociology on Line
Journals -
Italian Journal of Vascular and Endovascular Surgery
Journals -
Italian Journal of Gender-Specific Medicine
Journals -
Luciano Segreto prof. dr
People -
Tecnoscienza-Italian Journal of Science & Technology Studies
Journals -
Żaneta Polkowska prof. dr hab. inż.
People