检索

标题
作者
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.
Big Data Management System Security Threat Model
Poltavtseva M., Zegzhda D., Kalinin M.
Quality Fuzzy Predictive Control of Water in Drinking Water Systems
Bouzid S., Ramdani M., Chenikher S.
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model
Ovasapyan T., Ivanov D.
Interpolation Model Predictive Control of Nonlinear Systems Described by Quasi-LPV Model
Meng Zhao , Jiang C., Tang X., She M.
Using Event Logs for Local Correction of Process Models
Mitsyuk A., Lomazova I., van der Aalst W.
Verification-Oriented Process Ontology
Garanina N., Anureev I., Borovikova O.
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Anisimov V., Anisimov E., Zegzhda P., Suprun A.
Two-Wave Interactions in the Fermi–Pasta–Ulam Model
Glyzin S., Kashchenko S., Tolbey A.
An adaptive technique for trajectory tracking control of a wheeled mobile robots without velocity measurements
Taheri-Kalani J., Zarei N.
An Approach to Verification of a Family of Multiagent Systems for Conflict Resolution
Garanina N., Sidorova E.
Development of FEA-ANN hybrid model for Equivalent Stress prediction of automobile structural member
Patel T., Bhatt N.
Cloud Service for Interactive Simulation of Interregional Trade Flows
Velichko A., Gribova V., Fedorishchev L.
Coverage-All Targets Algorithm for 3D Wireless Multimedia Sensor Networks Based on the Gravitational Search Algorithm
Yanjiao Wang , Ye Chen
On the Correctness of Real-Time Modular Computer Systems Modeling with Stopwatch Automata Networks
Glonina A., Balashov V.
Modeling of information influence on remote wireless network devices
Suhoparov M., Bazhaev N., Krivtsova I., Lebedev I.
Micro-blog topic detection method based on BTM topic model and K-means clustering algorithm
Li W., Feng Y., Li D., Yu Z.
Building a Data Store with the Dynamic Structure
Artamonov Y.
Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time
Lavrova D., Zaitseva E., Zegzhda D.
Methodology of Effective Task Planning and Algorithm for Multivariate Computation of the Characteristics of a Quantum Rotation Sensor on a Hybrid Supercomputer Cluster
Ilyashenko A., Voskoboynikov S., Ustinov S., Lukashin A.
Control on the transmission of computer viruses in network
Han C., Li L.
Services recommended trust algorithm based on cloud model attributes weighted clustering
Yu Z., Wang J., Zhang H., Niu K.
Computer Simulation of a Smart Building
Maryasin O., Kolodkina A., Ogarkov A.
User Mobility in a 5G Cell with Quasi-Random Traffic under the Complete Sharing and Bandwidth Reservation Policies
Efstratiou P., Moscholios I.
The detection of Udpstorm attacks based on model checking linear temporal logic
Deng M., Nie K., Zhu W., Zhang C.
1 - 25 的 42 信息 1 2 > >> 

检索提示:

  • 检索的名词区分大小写
  • 常用字词将被忽略
  • 默认情况下只有在查询结果满足所有检索词才返回(例如,隐含AND)
  • 使用OR结合多个检索词,便于查找含有这些检索词的文章,例如education OR research
  • 使用括号来创建更复杂的查询; 例如:archive ((journal OR conference) NOT theses)
  • 使用引号检索一个完整的词组; 例如: "open access publishing"
  • 使用-或者NOT排除一个检索词; 例如:online -politics or online NOT politics
  • 在检索词里使用 *作为通配符匹配任何字符序列; 例如., soci* morality 将符合含有 "sociological" or "societal"的词语