浏览标题索引

标题 文件
卷 53, 编号 8 (2019) Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures
Grusho N.
卷 52, 编号 6 (2018) Methodology of Effective Task Planning and Algorithm for Multivariate Computation of the Characteristics of a Quantum Rotation Sensor on a Hybrid Supercomputer Cluster
Ilyashenko A., Voskoboynikov S., Ustinov S., Lukashin A.
卷 53, 编号 2 (2019) Methods Managing for Matching of Supply and Demand on the IT Specialists
Mammadova M., Jabrayilova Z.
卷 51, 编号 8 (2017) Methods of group authentication for low-resource vehicle and flying self-organizing networks
Aleksandrova E.
卷 50, 编号 4 (2016) Micro-blog topic detection method based on BTM topic model and K-means clustering algorithm
Li W., Feng Y., Li D., Yu Z.
卷 53, 编号 1 (2019) Mobile Robot Performance at Restricted Energy and Autonomy
Baums A.
卷 53, 编号 8 (2019) Model and Method for Optimizing Computational Processes in Parallel Computing Systems
Anisimov V., Zegzhda P., Anisimov E., Saurenko T., Kasatkin V.
卷 53, 编号 8 (2019) Model for Identifying Cyber Threats to Internet Information Resources
Luskatov I., Pilkevich S.
卷 53, 编号 8 (2019) Model of Cyberattacks on Digital Production Systems
Pavlenko E.
卷 52, 编号 5 (2018) Model Order Reduction of Discrete-Time Interval Systems by Differentiation Calculus
Amit Kumar Choudhary ., Shyam Krishna Nagar .
卷 53, 编号 8 (2019) Modeling Big Data Management Systems in Information Security
Poltavtseva M., Kalinin M.
卷 51, 编号 8 (2017) Modeling of information influence on remote wireless network devices
Suhoparov M., Bazhaev N., Krivtsova I., Lebedev I.
卷 52, 编号 8 (2018) Modeling the Dissemination of Information Threats in Social Media
Falcone I., Gatsenko O.
卷 51, 编号 8 (2017) Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions
Baranov A., Baranov P.
卷 52, 编号 8 (2018) Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels
Belim S., Belim S.
卷 53, 编号 1 (2019) Modular Design of Mobile APP Interface Based on the Visual Flow
Wei Yanli ., Chaoyang Q., Jun L.
卷 50, 编号 8 (2016) Multiagent system controllability evaluation using the multilevel structure of the graph of agents
Zegzhda D., Stepanova T., Suprun A.
卷 51, 编号 3 (2017) Multi-cue based moving hand segmentation for gesture recognition
Lin J., Ruan X., Yu N., Cai J.
卷 52, 编号 8 (2018) Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks
Zegzhda P., Lavrova D., Shtyrkina A.
卷 52, 编号 3 (2018) Multiple Neural Control Strategies Using a Neuro-Fuzzy Classifier
Dehmani K., Fourati F., Elleuch K., Toumi A.
卷 51, 编号 7 (2017) Network Model for the Problem of Integer Balancing of a Four-Dimensional Matrix
Smirnov A.
卷 52, 编号 5 (2018) Network Traffic Anomalies Detection Using a Fixing Method of Multifractal Dimension Jumps in a Real-Time Mode
Sheluhin O., Lukin I.
卷 53, 编号 6 (2019) Neural Networks Based Prediction Model for Vessel Track Control
Deryabin V.
卷 51, 编号 7 (2017) New Estimates of Numerical Values Related to a Simplex
Nevskii M., Ukhalov A.
卷 52, 编号 8 (2018) Noise Immunity of Noncoherent Reception under Complex Interference Effect on Communication and Monitoring Channels of Automated Information Systems of River Transport on Inland Waterways of the Russian Federation
Sikarev A., Sikarev I., Garanin A.
276 - 300 的 466 信息 << < 7 8 9 10 11 12 13 14 15 16 > >>