Search

Issue
Title
Authors
Using Event Logs for Local Correction of Process Models
Mitsyuk A.A., Lomazova I.A., van der Aalst W.M.
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.A.
Big Data Management System Security Threat Model
Poltavtseva M.A., Zegzhda D.P., Kalinin M.O.
Quality Fuzzy Predictive Control of Water in Drinking Water Systems
Bouzid S., Ramdani M., Chenikher S.
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model
Ovasapyan T.D., Ivanov D.V.
Interpolation Model Predictive Control of Nonlinear Systems Described by Quasi-LPV Model
Meng Zhao , Jiang C., Tang X., She M.
Face Recognition Based on the Coefficient Tree for Three Scale Wavelet Transformation
Wang Lyanpen , Petrosyan O.G., Jianming D.
Application of a Genetic Algorithm for Finding Edit Distances between Process Models
Kalenkova A.A., Kolesnikov D.A.
An Improved Generalized Fuzzy Model Based on Epanechnikov Quadratic Kernel and Its Application to Nonlinear System Identification
Zhang Qinli , Chen Yu
DPMine graphical language for automation of experiments in process mining
Shershakov S.A.
Verification-Oriented Process Ontology
Garanina N.O., Anureev I.S., Borovikova O.I.
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Suprun A.F.
Two-Wave Interactions in the Fermi–Pasta–Ulam Model
Glyzin S.D., Kashchenko S.A., Tolbey A.O.
An adaptive technique for trajectory tracking control of a wheeled mobile robots without velocity measurements
Taheri-Kalani J., Zarei N.
An Approach to Verification of a Family of Multiagent Systems for Conflict Resolution
Garanina N.O., Sidorova E.A.
Development of FEA-ANN hybrid model for Equivalent Stress prediction of automobile structural member
Patel T.M., Bhatt N.M.
Cloud Service for Interactive Simulation of Interregional Trade Flows
Velichko A.S., Gribova V.V., Fedorishchev L.A.
Coverage-All Targets Algorithm for 3D Wireless Multimedia Sensor Networks Based on the Gravitational Search Algorithm
Yanjiao Wang , Ye Chen
On the Correctness of Real-Time Modular Computer Systems Modeling with Stopwatch Automata Networks
Glonina A.B., Balashov V.V.
Modeling of information influence on remote wireless network devices
Suhoparov M.E., Bazhaev N.A., Krivtsova I.E., Lebedev I.S.
Micro-blog topic detection method based on BTM topic model and K-means clustering algorithm
Li W., Feng Y., Li D., Yu Z.
Building a Data Store with the Dynamic Structure
Artamonov Y.N.
Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time
Lavrova D.S., Zaitseva E.A., Zegzhda D.P.
Methodology of Effective Task Planning and Algorithm for Multivariate Computation of the Characteristics of a Quantum Rotation Sensor on a Hybrid Supercomputer Cluster
Ilyashenko A.S., Voskoboynikov S.P., Ustinov S.M., Lukashin A.A.
Control on the transmission of computer viruses in network
Han C., Li L.
1 - 25 of 42 Items 1 2 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"