| Шығарылым |
Атауы |
Файл |
| Том 50, № 8 (2016) |
Attainable upper estimate of the degree of distinguishability of a connected permutation automaton |
|
|
Babash A.
|
| Том 51, № 8 (2017) |
Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing |
|
|
Shenets N.
|
| Том 50, № 5 (2016) |
Autonomous network-based integration architecture for multi-agent systems under dynamic and heterogeneous environment |
|
|
Li H., Li X., Wan Y.
|
| Том 53, № 5 (2019) |
Autopilot Design for an Autonomous Sailboat Based on Sliding Mode Control |
|
|
Helmi Abrougui ., Dallagi H., Nejim S.
|
| Том 50, № 7 (2016) |
Averaging principles applied to logistic equations with rapidly oscillating delays |
|
|
Bykova N., Grigorieva E.
|
| Том 50, № 2 (2016) |
Backstepping control with speed estimation of PMSM based on MRAS |
|
|
Liu X., Zhang G., Mei L., Wang D.
|
| Том 53, № 8 (2019) |
Benford’s Law in the Detection of DoS Attacks on Industrial Systems |
|
|
Aleksandrova E., Lavrova D., Yarmak A.
|
| Том 53, № 8 (2019) |
Big Data Management System Security Threat Model |
|
|
Poltavtseva M., Zegzhda D., Kalinin M.
|
| Том 52, № 2 (2018) |
Block Compressed Sensing Using Random Permutation and Reweighted Sampling for Image Compression Applications |
|
|
Cao Y., Gong W., Zhang B., Bai S.
|
| Том 53, № 7 (2019) |
Building a Data Store with the Dynamic Structure |
|
|
Artamonov Y.
|
| Том 50, № 1 (2016) |
Calculation of flicker noise power |
|
|
Kolodiy Z., Mandziy B.
|
| Том 50, № 7 (2016) |
Cellular-local algorithm for localizing and estimating of changes in binary images |
|
|
Korotkin A., Maksimov A.
|
| Том 52, № 7 (2018) |
Clarification of the Properties of a Tree Centroid |
|
|
Belov Y., Vovchok S.
|
| Том 53, № 1 (2019) |
Classification Methodology for Bioinformatics Data Analysis |
|
|
Gasparovica-Asīte M., Aleksejeva L.
|
| Том 53, № 7 (2019) |
Cloud Service for Interactive Simulation of Interregional Trade Flows |
|
|
Velichko A., Gribova V., Fedorishchev L.
|
| Том 53, № 8 (2019) |
Cloud-Based Data Architecture Security |
|
|
Semenov N., Poltavtsev A.
|
| Том 53, № 8 (2019) |
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls |
|
|
Ognev R., Zhukovskii E., Zegzhda D.
|
| Том 53, № 7 (2019) |
Codes in a Dihedral Group Algebra |
|
|
Vedenev K., Deundyak V.
|
| Том 52, № 7 (2018) |
Comparative Analysis of Stability to Induced Deadlocks for Computing Grids with Various Node Architectures |
|
|
Shmeleva T.
|
| Том 50, № 1 (2016) |
Comparative study for feature selection algorithms in intrusion detection system |
|
|
Anusha K., Sathiyamoorthy E.
|
| Том 53, № 7 (2019) |
Comparison of Doubling the Size of Image Algorithms |
|
|
Vaganov S., Khashin S.
|
| Том 52, № 7 (2018) |
Complicated Dynamic Regimes in a Neural Network of Three Oscillators with a Delayed Broadcast Connection |
|
|
Glyzin S., Marushkina E.
|
| Том 51, № 7 (2017) |
Component-Based Systems Reconfigurations Using Graph Transformations with GROOVE |
|
|
Kouchnarenko O., Weber J.
|
| Том 52, № 5 (2018) |
Computer Numerical Control-PCB Drilling Machine with Efficient Path Planning – Case Study 2 |
|
|
Motaz Daadoo ., Eleyan D., Tarapiah S., Atalla S., Eleyan A.
|
| Том 53, № 7 (2019) |
Computer Simulation of a Smart Building |
|
|
Maryasin O., Kolodkina A., Ogarkov A.
|
| Нәтижелер 466 - 101/125 |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |