Wydział Matematyki i Informatyki UJ - lista publikacji

1001-1200 z 3781.

2014

2780.
Parallel hypersurfaces, ANN POL MATH vol. 111 no. 2 (2014), 107-135
2779.
Dynamic Factory - New Possibilities For Factory Design Pattern, 28TH EUROPEAN CONFERENCE ON MODELLING AND SIMULATION, ECMS 2014, BRESCIA, ITALY, MAY 27-30, 2014 (2014), 487-494
2776.
Sensitivity of the solution set to second order evolution inclusions vol. 443 (2014), "System Modeling and Optimization, Series: IFIP Advances in Information and Communication Technology", Springer
2773.
A class of history-dependent inclusions with applications to contact problems vol. 86 (2014), "Optimization and Control Techniques and Applications", Springer
2760.
Remarks of transversally f-biharmonic maps, BALKAN SOCIETY OF GEOMETERS PROCEEDING vol. 21 (2014), 38-49
2758.
Metody analizy mikroskopowych obrazów warstw C-Pd, (2014), "Świat nanotechnologii. Warstwy nanokompozytowe węglowo-palladowe. Badania i technologia", Wydawnictwa Uniwersytetu Warszawskiego
2750.
O miejscu matematyki stsowanej, MATEMATYKA STOSOWANA vol. 19/58 (2014), 48-50
2749.
2742.
Global and Local Markov Inequalities in the Complex Plane, DOLOMITES RESEARCH NOTES ON APPROXIMATION vol. 7 (2014), 34-38
2739.
Online bipartite matching in offline time, (2014), "55th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2014, October 18-21, 2014, Philadelphia, PA, USA", Institute of Electrical and Electronics Engineers (IEEE)
2737.
A new approach to automatic continuous artery diameter measurement , PROCEEDINGS OF THE 2014 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS vol. 2 (2014), 247–251
2735.
Defect property of $mathbb{Z}^2$ figure codes, JAPANESE CONFERENCE ON COMBINATORICS AND ITS APPLICATIONS (JCCA 2014) (2014), 60-61
2733.
Adaptive Active Learning as a Multi-armed Bandit Problem, FRONTIERS IN ARTIFICIAL INTELLIGENCE AND APPLICATIONS vol. 263 (2014), 989-990
2715.
Coloring relatives of interval overlap graphs via on-line games vol. 8572 of Lecture Notes in Computer Science (2014), "Automata, Languages, and Programming, 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I", Springer
2713.
Outerstring graphs are χ-bounded, (2014), "30th Annual Symposium on Computational Geometry, SoCG 2014, June 8-11, 2014, Kyoto, Japan", Association for Computing Machinery (ACM)
2682.
Renyi entropy dimension of the mixture of measures, PROCEEDINGS OF SCIENCE AND INFORMATION CONFERENCE (2014), 685-689

2013

2653.
The Complexity of Abduction for Equality Constraint Languages, LIPICS–LEIBNIZ INTERNATIONAL PROCEEDINGS IN INFORMATICS vol. 23 (2013), 615--633
2652.
Density Invariant Detection of Osteoporosis Using Growing Neural Gas, PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER RECOGNITION SYSTEMS CORES 2013 vol. Springer International Publishing (2013), 629-638
2648.
Wybrane zagadnienia rozpoznawania obrazów, (2013), Wydawnictwo Uniwersytetu Jagiellońskiego
2647.
Variational and numerical analysis of a mixed kinetic-diffusion surfactant model for the modified the Langmuir-Hinshelwood equation, PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND MATHEMATICAL METHODS IN SCIENCE AND ENGINEERING, CMMSE 2013 (2013), 601-614
2646.
Making triangles colorful, JOURNAL OF COMPUTATIONAL GEOMETRY vol. 4 (2013), 240-246
2643.
Bio-med image informatics, SOCBIN/BIT13 (2013), 122
2642.
Tworzenie obrazów anamorficznych – propozycja warsztatów vol. Tom 3 (2013), "Matematyka w przyrodzie i sztuce - matematyka, przyroda i sztuka w kształceniu powszechnym", Wydawnictwo Naukowe Państwowej Wyższej Szkoły Zawodowej w Nowym Sączu
2640.
Asymptotic estimate of absolute projection constants, UNIVERSITATIS IAGELLONICAE ACTA MATHEMATICA vol. 51 (2013), 51-60
2635.
An Energy-Efficient Approach to the Design of Two-Tier Wireless Ad Hoc and Sensor Networks, PROC. OF THE INTERNATIONAL CONFERENCE ON MAN-MACHINE INTERACTIONS (ICMMI '13) (2013), 579 – 587
2631.
Performance Modeling of Opportunistic Networks, COMPUTER NETWORKS, 20TH INTERNATIONAL SCIENCE CONFERENCE: COMPUTER NETWORKS - CN2013 (2013) vol. 370 (2013), 240-251
2630.
Spectrum Access Game for Cognitive Radio Networks, COMPUTER NETWORKS, 20TH INTERNATIONAL SCIENCE CONFERENCE: COMPUTER NETWORKS - CN2013 (2013) vol. 370 (2013), 232-239
2612.
Detection of elliptical shapes via cross-entropy clustering, PATTERN RECOGNITION AND IMAGE ANALYSIS LECTURE NOTES IN COMPUTER SCIENCE vol. 7887 (2013), 656-663
2611.
Mahalanobis distance-based algorithm for ellipse growing in iris preprocessing, COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT LECTURE NOTES IN COMPUTER SCIENCE vol. 8104 (2013), 158-167
2601.
On the Kolar connection, ARCH. MATH (BRNO) vol. 49(4) (2013), 223-240
2600.
A measure free approach to coherent states refined vol. Nankai Series in Pure, Applied Mathematics and Theoretical Physics, vol 11 (2013), "Symmetries and Groups in Contemporary Physics; ISBN: 978-981-4518-54-3 ", World Scientific Publishing
2596.
Identity principles for Bernstein quasianalytic functions, COMMENTATIONES MATHEMATICAE vol. 53 (2) (2013), 179-187
2594.
On interval edge-colorings of complete tripartite graphs, COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES (CSIT) (2013), 1-3
2593.
Framings and dilations, ACTA SCIENTIARUM MATHEMATICARUM vol. 79 (2013), 529-543
2587.
Foliations on Affinely Flat Manifolds. Information Geometry vol. Lecture Notes in Computer Science vol.8085 (2013), "Geometric Science of Information, First International Conference, GSI 2013, Paris, France, August 2013, Proceedings, F. Nielsen, F. Barbaresco (Eds.), ", Springer