Issue |
Title |
File |
Vol 50, No 7 (2016) |
Diffusion chaos in the reaction–diffusion boundary problem in the dumbbell domain |
 (Eng)
|
Glyzin S.D., Shokin P.L.
|
Vol 50, No 7 (2016) |
Asymptotics of eigenvalues of the first boundary-value problem for singularly perturbed second-order differential equation with turning points |
 (Eng)
|
Kaschenko S.A.
|
Vol 50, No 8 (2016) |
Management of information security risks in a context of uncertainty |
 (Eng)
|
Azhmukhamedov I.M., Vybornova O.N., Brumshtein Y.M.
|
Vol 50, No 8 (2016) |
Access control system for distributed computing networks |
 (Eng)
|
Konoplev A.S., Kalinin M.O.
|
Vol 50, No 7 (2016) |
Development of an active external network topology module for Floodlight software-defined network controller |
 (Eng)
|
Noskov A.A., Nikitinskiy M.A., Alekseev I.V.
|
Vol 50, No 7 (2016) |
Instrumental supporting system for developing and analysis of software-defined networks of mobile objects |
 (Eng)
|
Sokolov V.A., Korsakov S.V., Smirnov A.V., Bashkin V.A., Nikitin E.S.
|
Vol 50, No 7 (2016) |
Cellular-local algorithm for localizing and estimating of changes in binary images |
 (Eng)
|
Korotkin A.A., Maksimov A.A.
|
Vol 50, No 7 (2016) |
On process model synthesis based on event logs with noise |
 (Eng)
|
Mitsyuk A.A., Shugurov I.S.
|
Vol 50, No 7 (2016) |
Application of numerical optimization methods to molecular docking on graphics processing units |
 (Eng)
|
Farkov M.A., Legalov A.I.
|
Vol 50, No 7 (2016) |
DPMine graphical language for automation of experiments in process mining |
 (Eng)
|
Shershakov S.A.
|
Vol 50, No 7 (2016) |
Incremental approach to the technology of test design for industrial projects |
 (Eng)
|
Drobintsev P.D., Kotlyarov V.P., Nikiforov I.V., Letichevsky A.A.
|
Vol 50, No 7 (2016) |
PolarDB: An infrastructure for specialized NoSQL datebases and DBMS |
 (Eng)
|
Marchuk A.G.
|
Vol 50, No 7 (2016) |
On finite groups with large degrees of irreducible character |
 (Eng)
|
Kazarin L.S., Poiseeva S.S.
|
Vol 50, No 7 (2016) |
On the expressiveness of the approach to constructing PLC-programs by LTL-specification |
 (Eng)
|
Kuzmin E.V., Ryabukhin D.A., Sokolov V.A.
|
Vol 50, No 7 (2016) |
Development of an adaptive routing mechanism in software-defined networks |
 (Eng)
|
Noskov A.N., Manov I.A.
|
Vol 50, No 7 (2016) |
The problem of finding the maximum multiple flow in the divisible network and its special cases |
 (Eng)
|
Smirnov A.V.
|
Vol 50, No 8 (2016) |
Tasks of providing information security in distributed computing networks |
 (Eng)
|
Konoplev A.S., Kalinin M.O.
|
Vol 50, No 8 (2016) |
An approach to developing the SIEM system for the Internet of Things |
 (Eng)
|
Lavrova D.S.
|
Vol 50, No 8 (2016) |
Asymptotic assessments of CRC error probabilities in some telecommunication protocols |
 (Eng)
|
Baranov A.P., Baranov P.A.
|
Vol 50, No 8 (2016) |
Assessment of CRC error probability at minor distortion of information |
 (Eng)
|
Baranov A.P., Baranov P.A.
|
Vol 50, No 8 (2016) |
KDP scheme of preliminary key distribution in discretionary security policy |
 (Eng)
|
Belim S.V., Belim S.Y.
|
Vol 50, No 8 (2016) |
Distribution of cryptographic keys in systems with a hierarchy of objects |
 (Eng)
|
Belim S.V., Bogachenko N.F.
|
Vol 50, No 8 (2016) |
User identification and authentication system based on a hybrid fuzzy approach |
 (Eng)
|
Sumkin K.S., Los’ V.P., Ross G.V.
|
Vol 50, No 8 (2016) |
Implementation of symmetric encryption by State Standard 28147–89 algorithm on a graphical processor |
 (Eng)
|
Sukhoparov M.E., Lebedev I.S.
|
Vol 50, No 8 (2016) |
Tripartite outsoursing key-agreement protocol on bilinear pairings |
 (Eng)
|
Aleksandrova E.B., Shkorkina E.N.
|
376 - 400 of 463 Items |
<< < 11 12 13 14 15 16 17 18 19 > >>
|