Browse Title Index

Issue Title File
Vol 52, No 1 (2018) Spontaneous Emergence of Programs from “Primordial Soup” of Functions in Distributed Computer Systems
Kol’chugina E.A.
Vol 53, No 8 (2019) Spoofing Attack on Eigenfaces-Based Biometric Identification System
Marshalko G.B., Nikiforova L.O.
Vol 53, No 3 (2019) Study on an Optimal Path Planning for a Robot Based on an Improved ANT Colony Algorithm
Xiaojing Li ., Dongman Yu .
Vol 53, No 2 (2019) Study on the Attacking Intelligent Decision-Making Technology Based on the Game Theory
Yun Zhang .
Vol 50, No 4 (2016) Study on the technology of medical image reading based on JPEG2000
Liang B., Zhang Y., Lin Y.
Vol 52, No 8 (2018) Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem
Salakhutdinova K.I., Lebedev I.S., Krivtsova I.E., Sukhoparov M.E.
Vol 50, No 8 (2016) Sustainability as a criterion for information security in cyber-physical systems
Zegzhda D.P.
Vol 52, No 1 (2018) Syllable Segmentation of Tamil Speech Signals Using Vowel Onset Point and Spectral Transition Measure
Geetha K., Vadivel R.
Vol 50, No 2 (2016) Synchronization of fuzzy linear automata
Speranskiy D.V.
Vol 53, No 6 (2019) Synthesis of Built-in Self-Test Control Circuits Based on the Method of Boolean Complement to Constant-Weight 1-out-of-n Codes
Efanov D.V., Sapozhnikov V.V., Sapozhnikov V.V., Pivovarov D.V.
Vol 53, No 7 (2019) Synthesis of Control and State Observer for Weakly Nonlinear Systems Based on the Pseudo-Linearization Technique
Makarov D.A.
Vol 53, No 2 (2019) Synthesis of Control for Nonlinear Systems
Shashihin V.N.
Vol 52, No 4 (2018) Synthetic Sample Extension in Implementation of Tangut Character Databases
Meng Y., Yuan X., Wei X., Yang W., Chen Y.
Vol 51, No 8 (2017) Systematization and security assessment of cyber-physical systems
Zegzhda D.P., Poltavtseva M.A., Lavrova D.S.
Vol 53, No 6 (2019) Target Tracking Based on Multi Feature Selection Fusion Compensation in Monitoring Video
Yingying Feng ., Zhao S., Liu H.
Vol 52, No 5 (2018) Task Allocation Methods for Homogeneous Multi-Robot Systems: Feed Pushing Case Study
Nikitenko A., Lavendelis E., Ekmanis M., Rumba R.
Vol 50, No 8 (2016) Tasks of providing information security in distributed computing networks
Konoplev A.S., Kalinin M.O.
Vol 50, No 8 (2016) Technology of security services virtualization for high-speed computer networks
Zegzhda P.D., Kalinin M.O.
Vol 51, No 7 (2017) Testing Timed Nondeterministic Finite State Machines with the Guaranteed Fault Coverage
Tvardovskii A., El-Fakih K., Gromov M., Yevtushenko N.
Vol 52, No 7 (2018) The Andronov–Hopf Bifurcation in a Biophysical Model of the Belousov Reaction
Goryunov V.E.
Vol 53, No 7 (2019) The Automation of C Program Verification by the Symbolic Method of Loop Invariant Elimination
Kondratyev D.A., Maryasov I.V., Nepomniaschy V.A.
Vol 52, No 4 (2018) The Complexity of a Pipelined Algorithm for Remainder Computing in a Given Modulo
Zakharov V.M., Pesoshin V.A., Shalagin S.V.
Vol 51, No 5 (2017) The complexity of Boolean functions in the Reed–Muller polynomials class
Suprun V.P.
Vol 51, No 3 (2017) The detection of Udpstorm attacks based on model checking linear temporal logic
Deng M., Nie K., Zhu W., Zhang C.
Vol 51, No 2 (2017) The effect of attribute normalization factors in attribute distance weighted average
Xiong G., Lan J., Zhang H., Ding T.
401 - 425 of 466 Items << < 12 13 14 15 16 17 18 19 > >>