Filters
total: 2707
-
Catalog
- Publications 1618 available results
- Journals 229 available results
- Conferences 128 available results
- People 245 available results
- Inventions 67 available results
- Projects 2 available results
- Research Teams 1 available results
- e-Learning Courses 85 available results
- Events 5 available results
- Open Research Data 327 available results
displaying 1000 best results Help
Search results for: COMCUTE
-
Using Redis supported by NVRAM in HPC applications
PublicationNowadays, the efficiency of storage systems is a bottleneck in many modern HPC clusters. High performance in the traditional approach – processing using files – is often difficult to obtain because of a model’s complexity and its read/write patterns. An alternative approach is to apply a key-value database, which usually has low latency and scales well. On the other hand, many key-value stores suffer from a limitation of memory...
-
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublicationA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
Knowledge management in the IPv6 migration process
PublicationThere are many reasons to deploy IPv6 protocol with IPv4 address space depletion being the most obvious. Unfortunately, migration to IPv6 protocol seems slower than anticipated. To improve pace of the IPv6 deployment, authors of the article developed an application that supports the migration process. Its main purpose is to help less experienced network administrators to facilitate the migration process with a particular target...
-
Assessment of risks introduced to safety critical software by agile practices - a software engineer's perspective
PublicationIn this article we investigate the problem of applying agile practices into safety-critical projects.The goal of our research is to investigate potential benefits from introducing agile practicesinto safety-critical environment and to present a solution providing for balancing agileapproach with more disciplined assurance techniques, bringing the best of the two worlds together.In the article we present the supporting ideas such...
-
The Application Of A Noise Mapping Tool Deployed In Grid Infrastructure For Creating Noise Maps Of Urban Areas
PublicationThe concept and implementation of the system for creating dynamic noise maps in PL-Grid infrastructure are presented. The methodology of dynamic acoustical maps creating is introduced. The concept of noise mapping, based on noise source and propagation models, was developed and employed in the system. The details of incorporation of the system to the PL-Grid infrastructure are presented. The results of simulations performed by...
-
Exploring Impact of Requirements Engineering on Other IT Project Areas – Case Study
PublicationRequirements Engineering (RE) is recognized as one of the most important (yet difficult) areas of software engineering that has a significant impact on other areas of IT projects and their final outcomes. Empirical studies investigating this impact are hard to conduct, mainly due to the great effort required. It is thus difficult for both researchers and industry practitioners to make evidence-based evaluations about how decisions...
-
From Linear Classifier to Convolutional Neural Network for Hand Pose Recognition
PublicationRecently gathered image datasets and the new capabilities of high-performance computing systems have allowed developing new artificial neural network models and training algorithms. Using the new machine learning models, computer vision tasks can be accomplished based on the raw values of image pixels instead of specific features. The principle of operation of deep neural networks resembles more and more what we believe to be happening...
-
STUDENTS' PERCEPTION OF E-GRADING: INFORMATICS COURSE CASE STUDY
PublicationUsing computers for grading can simplify work for teachers. However it is a sensitive part of their work and must be performed carefully. More information is required on students' reception and opinions about e-grading. This paper is a case study of e-grading used in Informatics course and discusses results obtained from surveying the students after being graded by a teacher and a computer.
-
Usability Techniques Possible to Use in Diagnostic Tools Interface Improvement
PublicationThe development of diagnostic tools has caused a rapid increase in the amount of information generated and presented, necessitating the use of computer displays as an interface to data presentation and the use of modern diagnostic tools. The paper presents methods for testing usability that can be used in designing and improving the quality of interfaces of modern diagnostic tools that use communication through graphical user interfaces.
-
A New Quaternion Encryption Scheme for Image Transmission
PublicationQuaternions are hypercomplex number of rank 4. They are often applied to mechanics in three-dimensional space and considered as one of the best ways to represent rotations. In this paper a new encryption scheme, based on the rotation of data vector in three-dimensional space around another quaternion (key) is proposed. A computer-based simulation was created to analyze the potential of the proposed encryption technique.
-
An Approximation of the Zero Error Capacity by a Greedy Algorithm
PublicationWe present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.
-
An Approximation of the Zero Error Capacity by a Greedy Algorithm.
PublicationWe present a greedy algorithm that determines a lower bound on the zero error capacity. The algorithm has many new advantages, e.g., it does not store a whole product graph in a computer memory and it uses the so-called distributions in all dimensions to get a better approximation of the zero error capacity. We also show an additional application of our algorithm.
-
Pipelined division of signed numbers with the use of residue arithmetic in FPGA
PublicationAn architecture of a pipelined signed residue divider for small number ranges is presented. The divider makes use of the multiplicative division algorithm where initially the reciprocal of the divisor is calculated and subsequently multiplied by the dividend. The divisor represented in the signed binary form is used to compute the approximated reciprocal in the residue form by the table look-up. In order to reduce the needed length...
-
Biomass estimation using a length-weight relationship in beetle larvae (Coleoptera: Aphodiidae, Histeridae, Hydrophilidae, Staphylinidae) obtained from cow dung
PublicationThis research enabled the relationship between length and dry body mass to be determined for 158 beetle larvaetaken from cow dung in north-eastern Poland. The larvae were divided into three morphological types, for which the power and linear function of the body length-weight relationship were determined. The linear regression equation characterizes the relationship between body weight and...
-
M-integral for finite anti-plane shear of a nonlinear elastic matrix with rigid inclusions
PublicationThe path-independent M-integral plays an important role in analysis of solids with inhomogeneities. However, the available applications are almost limited to linear-elastic or physically non-linear power law type materials under the assumption of infinitesimal strains. In this paper we formulate the M-integral for a class of hyperelastic solids undergoing finite anti-plane shear deformation. As an application we consider the problem...
-
IEEE Symposium on Logic in Computer Science
Conferences -
ACM International Symposium on Computer Architecture
Conferences -
Formal Methods in Computer-Aided Design
Conferences -
IEEE International Conference on Computer Communications
Conferences -
International Conference on Computer Vision Systems
Conferences -
Nordic Conference on Human-Computer Interaction
Conferences -
Australian Institute of Computer Ethics Conference
Conferences -
International Conference on Computer Vision and Graphics
Conferences -
IEEE Conference on Local Computer Networks
Conferences -
International Conference on Dependability of Computer Systems
Conferences -
IEEE Workshop on Applications of Computer Vision
Conferences -
Conference on Algebra and Coalgebra in Computer Science
Conferences -
Annual Conference on Computer Science Logic
Conferences -
International Conference on Computer Supported Education
Conferences -
International Computer Science Symposium in Russia
Conferences -
International Symposium on Computer and Information Sciences
Conferences -
ACM Annual Computer Science Conference
Conferences -
International Conference on Computer Theory and Applications
Conferences -
Australian Computer Human Interaction Conference
Conferences -
Pacific Conference on Computer Graphics and Applications
Conferences -
Indian Conference on Human-Computer Interaction
Conferences -
IEEE International Conference on Computer Vision
Conferences -
Conference on Software in Telecommunications and Computer Networks
Conferences -
IEEE International Conference on Computer Languages
Conferences -
International Conference on Computer Methods in Mechanics
Conferences -
IEEE Symposium on Foundations of Computer Science
Conferences -
ACM Conference on Computer and Communications Security
Conferences -
Annual Computer Security Applications Conference
Conferences -
International Science Conference on Computer Networks
Conferences -
European Symposium On Research In Computer Security
Conferences -
CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS
Conferences -
International Computer Software and Applications Conference
Conferences -
Internetowe systemy przetwarzania rozproszonego typu grid w zastosowaniach biznesowych
PublicationSkoncentrowano się na możliwościach wykorzystania oraz integracji rozproszonych mocy obliczeniowych komputerów Internautów w globalnej sieci www. Zaprezentowano paradygmaty sieciowego przetwarzania typu grid computing oraz volunteer computing. Podkreślono istotność tego typu przetwarzania w zagadnieniach wymagających bardzo dużych mocy obliczeniowych. Zaprezentowano przykłady rozwiązań systemowych tego typu: system BOINC, będący...
-
Sieciowe systemy przetwarzania rozproszonego typu GRID – rozwiązania systemowe oraz przykłady aplikacyjne
PublicationZaprezentowano możliwości wykorzystania oraz integracji rozproszonych mocy obliczeniowych komputerów Internautów w globalnej sieci www. Pokazano paradygmaty internetowego przetwarzania rozproszonego typu grid computing oraz volunteer computing. Zwrócono uwagę na istotność tego typu przetwarzania w rozwiązywaniu zagadnień wymagających bardzo dużych mocy obliczeniowych. Pokazano reprezentatywne przykłady rozwiązań systemowych tego...
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.