Search Results

1 - 10 of 2,430 items :

Clear All

/S: Security analysis of the IV-setup for Rabbit, 2003, http://www.cryptico.com (White paper). [7] BABBAGE, S.-DODD, M.: The stream cipher MICKEY-128 (version 1), eSTREAM, ECRYPT Stream Cipher Project, Report 2005/016, 2005, http://www.ecrypt.eu.org/stream. [8] BERNSTEIN,D.: Salsa20, eSTREAM, ECRYPT Stream Cipher Project, Report 2005/025, 2005, http://www.ecrypt.eu.org/stream. [9] BOESGAARD, M.-VESTERAGER, M.-CHRISTENSEN, Τ.-ZENNER, Ε.: The stream cipher Rabbit, eSTREAM, 2006. [10] BOESGAARD, M.-VESTERAGER, M.-PEDERSEN, T.-CHRISTIANSEN, J.- -SCAVENIUS, O.: Rabbit: A new high

, 1-688. Reichardt, E., 1999: Zur Revision der Gattung Gomphonema . Iconographia Diatomologica 8, 1-203. Soltanpour-Gargari, A., 1973: Asurvey on the limnology of Valasht Lake (Iran) and its phytoplankton population (in Persian). MScThesis, Tehran University. Tehran. Van Dam, H., Mertens, A., Sinkeldam, J., 1994: Acoded checklist and ecological indicator values of freshwater diatoms from the Netherlands. Netherlands Journal of Aquatic Ecology 28, 117-133. Veselá, J., Johansen, J. R., 2009: The diatom flora of ephemeral headwater streams in the Elbsandsteingebirge

). Zarządzanie jakością w organizacji. Wybrane zagadnienia. Gliwice: Wydawnictwo Politechniki Śląskiej. Pawłowski, E., Pawłowski, K., Trzcieliński, S. (2010). Metody i narzędzia Lean Manufacturing, Poznań: Politechnika Poznańska. Rother, M., Shook, J. (1998). Learning to see. Value stream mapping to create value andeliminate muda, Brookline. Sitko, J., Mikuš, R., Bozek, P. (2018). Analysis of device failure in the mechanical production plant. Management systems of Production Engineering, 1(1). Sobańska, I. (2013). Lean accounting – integralny element lean management. Warszawa

References 1. Wu, Q., H. Sui, B. Yang et al. Research Progress of Distributed Data Stream Mining. - Computer Science, Vol. 39, 2012, No 1, pp. 1-8. 2. Du, Z. Research on Mining Algorithm Based on Data Stream. Xi’an University of Science and Technology, 2012. 3. Law, Y. N., C. Zaniolo. An Adaptive Nearest Neighbour Classification Algorithm for Data Streams. Knowledge Discovery in Databases: PKDD 2005. Berlin, Heidelberg, Springer, 2005, pp. 108-120. 4. Aggarwal, C. C., J. Han, J. Wang et al. A Framework for Projected Clustering of High Dimensional Data Streams

References [1] P. Duda, M. Jaworski, L. Pietruczuk, and L. Rutkowski, A novel application of Hoeffding’s inequality to decision trees construction for data streams, in Neural Networks (IJCNN), 2014 International Joint Conference on. IEEE, 2014, pp. 3324–3330. [2] L. Rutkowski, L. Pietruczuk, P. Duda, and M. Jaworski, Decision trees for mining data streams based on the McDiarmid’s bound, IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 6, pp. 1272–1279, 2013. [3] L. Rutkowski, M. Jaworski, L. Pietruczuk, and P. Duda, Decision trees for mining data

References [1] D. J. Abadi, D. Carney, U. Çetintemel, M. Cherniack, C. Convey, S. Lee, M. Stonebraker, N. Tatbul, and S. Zdonik, “Aurora: A New Model and Architecture for Data Stream Management,” Internat. J. Very Large Data Bases (VLDB J.), 12:2 (2003), 120-139. [2] S. Acharya, P. B. Gibbons, and V. Poosala, “Congressional Samples for Approximate Answering of Group-By Queries,” Proc. ACM SIGMOD Internat. Conf. on Management of Data (SIGMOD ’00) (Dallas, TX, 2000), pp. 487-498. [3] S. Acharya, P. B. Gibbons, V. Poosala, and S. Ramaswamy, “Join Synopses for

transmission for VoIP,” in Proceedings of the 2016 ASIA Computer and Communications Security , Xi’an, China, 2016. [22] S. Li, M. Schliep, and N. Hopper, “Facet: Streaming over videoconferencing for censorship circumvention,” in Proceedings of the 13th Workshop on Privacy in the Electronic Society , Scottsdale, AZ, USA, 2014, pp. 163–172. [23] P. Maersk-Moller, “Snowmix,” https://sourceforge.net/projects/snowmix/ , 2012, accessed: 2017-06-12. [24] R. McPherson, A. Houmansadr, and V. Shmatikov, “Covertcast: Using live streaming to evade internet censorship,” in

stream cipher , J. Comput. Inform. Syst. 8 (2012), no. 2, 831–838. [8] MAXIMOV, A.: Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers . In: Lecture Notes in Comput. Sci. Vol. 3557 , Springer-Verlag, 2005, pp.342–358, [9] POLAK, I.—BORYCZKA, M.: Tabu search against permutation based stream ciphers , International Journal of Electronics and Telecommunications, 64 (2018), no. 2, 137–145. [10] RIVEST, R. L.—SCHULDT, J. C. N.: Spritz—A spongy RC4-like stream cipher and hash function . In: Presented at Charles River

References Amann R. (1995): In situ identification of microorganisms by whole cell hybridization with rRNA-targered nucleic acid probes, pp. 3.3.6./1-3.3.6./15. In Akerman A. D. L., van El sas J. D. & de Brui jn F. J. (eds): Molecular Microbial Ecology Manual. Kluwer Academic Publisher, Dordrecht, Netherlands. Araya R., Tani K., Takagi T., Yamaguchi N. & Nasu M. (2003): Bacterial activity and community composition in stream water and biofilm from an urban river determined by fluorescence in situ hybridization and DGGE analysis. − FEMS Microbiol. Ecol. 43: 111

References 1. Kubkowska, M., Skladnik-Sadowska, E., Kwiatkowski, R., Malinowski, K., Kowalska-Strzęciwilk, E., Paduch, M., Sadowski, M. J., Pisarczyk, T., Chodukowski, T., Kalinowska, Z., Zielinska, E., & Scholz, M. (2014). Investigation of interactions of intense plasma streams with tungsten and carbon fibre composite targets in the PF-1000 facility. Phys. Scripta , T161 , 014038. DOI: 10.1088/0031-8949/2014/T161/014038. 2. Skladnik-Sadowska, E., Kwiatkowski, R., Malinowski, K., Sadowski, M. J., Gribkov, V. A., Kubkowska, M., Paduch, M., Scholz, M., Zielinska