Issue |
Title |
File |
Vol 52, No 1 (2018) |
Spontaneous Emergence of Programs from “Primordial Soup” of Functions in Distributed Computer Systems |
|
Kol’chugina E.A.
|
Vol 53, No 8 (2019) |
Spoofing Attack on Eigenfaces-Based Biometric Identification System |
|
Marshalko G.B., Nikiforova L.O.
|
Vol 53, No 3 (2019) |
Study on an Optimal Path Planning for a Robot Based on an Improved ANT Colony Algorithm |
|
Xiaojing Li ., Dongman Yu .
|
Vol 53, No 2 (2019) |
Study on the Attacking Intelligent Decision-Making Technology Based on the Game Theory |
|
Yun Zhang .
|
Vol 50, No 4 (2016) |
Study on the technology of medical image reading based on JPEG2000 |
|
Liang B., Zhang Y., Lin Y.
|
Vol 52, No 8 (2018) |
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem |
|
Salakhutdinova K.I., Lebedev I.S., Krivtsova I.E., Sukhoparov M.E.
|
Vol 50, No 8 (2016) |
Sustainability as a criterion for information security in cyber-physical systems |
|
Zegzhda D.P.
|
Vol 52, No 1 (2018) |
Syllable Segmentation of Tamil Speech Signals Using Vowel Onset Point and Spectral Transition Measure |
|
Geetha K., Vadivel R.
|
Vol 50, No 2 (2016) |
Synchronization of fuzzy linear automata |
|
Speranskiy D.V.
|
Vol 53, No 6 (2019) |
Synthesis of Built-in Self-Test Control Circuits Based on the Method of Boolean Complement to Constant-Weight 1-out-of-n Codes |
|
Efanov D.V., Sapozhnikov V.V., Sapozhnikov V.V., Pivovarov D.V.
|
Vol 53, No 7 (2019) |
Synthesis of Control and State Observer for Weakly Nonlinear Systems Based on the Pseudo-Linearization Technique |
|
Makarov D.A.
|
Vol 53, No 2 (2019) |
Synthesis of Control for Nonlinear Systems |
|
Shashihin V.N.
|
Vol 52, No 4 (2018) |
Synthetic Sample Extension in Implementation of Tangut Character Databases |
|
Meng Y., Yuan X., Wei X., Yang W., Chen Y.
|
Vol 51, No 8 (2017) |
Systematization and security assessment of cyber-physical systems |
|
Zegzhda D.P., Poltavtseva M.A., Lavrova D.S.
|
Vol 53, No 6 (2019) |
Target Tracking Based on Multi Feature Selection Fusion Compensation in Monitoring Video |
|
Yingying Feng ., Zhao S., Liu H.
|
Vol 52, No 5 (2018) |
Task Allocation Methods for Homogeneous Multi-Robot Systems: Feed Pushing Case Study |
|
Nikitenko A., Lavendelis E., Ekmanis M., Rumba R.
|
Vol 50, No 8 (2016) |
Tasks of providing information security in distributed computing networks |
|
Konoplev A.S., Kalinin M.O.
|
Vol 50, No 8 (2016) |
Technology of security services virtualization for high-speed computer networks |
|
Zegzhda P.D., Kalinin M.O.
|
Vol 51, No 7 (2017) |
Testing Timed Nondeterministic Finite State Machines with the Guaranteed Fault Coverage |
|
Tvardovskii A., El-Fakih K., Gromov M., Yevtushenko N.
|
Vol 52, No 7 (2018) |
The Andronov–Hopf Bifurcation in a Biophysical Model of the Belousov Reaction |
|
Goryunov V.E.
|
Vol 53, No 7 (2019) |
The Automation of C Program Verification by the Symbolic Method of Loop Invariant Elimination |
|
Kondratyev D.A., Maryasov I.V., Nepomniaschy V.A.
|
Vol 52, No 4 (2018) |
The Complexity of a Pipelined Algorithm for Remainder Computing in a Given Modulo |
|
Zakharov V.M., Pesoshin V.A., Shalagin S.V.
|
Vol 51, No 5 (2017) |
The complexity of Boolean functions in the Reed–Muller polynomials class |
|
Suprun V.P.
|
Vol 51, No 3 (2017) |
The detection of Udpstorm attacks based on model checking linear temporal logic |
|
Deng M., Nie K., Zhu W., Zhang C.
|
Vol 51, No 2 (2017) |
The effect of attribute normalization factors in attribute distance weighted average |
|
Xiong G., Lan J., Zhang H., Ding T.
|
401 - 425 of 466 Items |
<< < 12 13 14 15 16 17 18 19 > >> |