Search

Issue
Title
Authors
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.A.
Big Data Management System Security Threat Model
Poltavtseva M.A., Zegzhda D.P., Kalinin M.O.
Quality Fuzzy Predictive Control of Water in Drinking Water Systems
Bouzid S., Ramdani M., Chenikher S.
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model
Ovasapyan T.D., Ivanov D.V.
Interpolation Model Predictive Control of Nonlinear Systems Described by Quasi-LPV Model
Meng Zhao , Jiang C., Tang X., She M.
Using Event Logs for Local Correction of Process Models
Mitsyuk A.A., Lomazova I.A., van der Aalst W.M.
Verification-Oriented Process Ontology
Garanina N.O., Anureev I.S., Borovikova O.I.
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Suprun A.F.
Two-Wave Interactions in the Fermi–Pasta–Ulam Model
Glyzin S.D., Kashchenko S.A., Tolbey A.O.
An adaptive technique for trajectory tracking control of a wheeled mobile robots without velocity measurements
Taheri-Kalani J., Zarei N.
An Approach to Verification of a Family of Multiagent Systems for Conflict Resolution
Garanina N.O., Sidorova E.A.
Development of FEA-ANN hybrid model for Equivalent Stress prediction of automobile structural member
Patel T.M., Bhatt N.M.
Cloud Service for Interactive Simulation of Interregional Trade Flows
Velichko A.S., Gribova V.V., Fedorishchev L.A.
Coverage-All Targets Algorithm for 3D Wireless Multimedia Sensor Networks Based on the Gravitational Search Algorithm
Yanjiao Wang , Ye Chen
On the Correctness of Real-Time Modular Computer Systems Modeling with Stopwatch Automata Networks
Glonina A.B., Balashov V.V.
Modeling of information influence on remote wireless network devices
Suhoparov M.E., Bazhaev N.A., Krivtsova I.E., Lebedev I.S.
Micro-blog topic detection method based on BTM topic model and K-means clustering algorithm
Li W., Feng Y., Li D., Yu Z.
Building a Data Store with the Dynamic Structure
Artamonov Y.N.
Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time
Lavrova D.S., Zaitseva E.A., Zegzhda D.P.
Methodology of Effective Task Planning and Algorithm for Multivariate Computation of the Characteristics of a Quantum Rotation Sensor on a Hybrid Supercomputer Cluster
Ilyashenko A.S., Voskoboynikov S.P., Ustinov S.M., Lukashin A.A.
Control on the transmission of computer viruses in network
Han C., Li L.
Services recommended trust algorithm based on cloud model attributes weighted clustering
Yu Z., Wang J., Zhang H., Niu K.
Computer Simulation of a Smart Building
Maryasin O.Y., Kolodkina A.S., Ogarkov A.A.
User Mobility in a 5G Cell with Quasi-Random Traffic under the Complete Sharing and Bandwidth Reservation Policies
Efstratiou P., Moscholios I.
The detection of Udpstorm attacks based on model checking linear temporal logic
Deng M., Nie K., Zhu W., Zhang C.
1 - 25 of 42 Items 1 2 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"