Search

Issue
Title
Authors
Interpolation Model Predictive Control of Nonlinear Systems Described by Quasi-LPV Model
Meng Zhao , Jiang C., Tang X., She M.
Using Event Logs for Local Correction of Process Models
Mitsyuk A.A., Lomazova I.A., van der Aalst W.M.
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.A.
Big Data Management System Security Threat Model
Poltavtseva M.A., Zegzhda D.P., Kalinin M.O.
Quality Fuzzy Predictive Control of Water in Drinking Water Systems
Bouzid S., Ramdani M., Chenikher S.
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model
Ovasapyan T.D., Ivanov D.V.
Building a Data Store with the Dynamic Structure
Artamonov Y.N.
Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time
Lavrova D.S., Zaitseva E.A., Zegzhda D.P.
Methodology of Effective Task Planning and Algorithm for Multivariate Computation of the Characteristics of a Quantum Rotation Sensor on a Hybrid Supercomputer Cluster
Ilyashenko A.S., Voskoboynikov S.P., Ustinov S.M., Lukashin A.A.
Control on the transmission of computer viruses in network
Han C., Li L.
Services recommended trust algorithm based on cloud model attributes weighted clustering
Yu Z., Wang J., Zhang H., Niu K.
Computer Simulation of a Smart Building
Maryasin O.Y., Kolodkina A.S., Ogarkov A.A.
User Mobility in a 5G Cell with Quasi-Random Traffic under the Complete Sharing and Bandwidth Reservation Policies
Efstratiou P., Moscholios I.
The detection of Udpstorm attacks based on model checking linear temporal logic
Deng M., Nie K., Zhu W., Zhang C.
Backstepping control with speed estimation of PMSM based on MRAS
Liu X., Zhang G., Mei L., Wang D.
Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters
Lavrova D.S., Popova E.A., Shtyrkina A.A.
Estimating the Average Temporal Benefit in Probabilistic Environmental–Economic Models
Rodina L.I., Tyuteev I.I.
Using Hybrid Discriminative-Generative Models for Binary Classification
Abroyan N.
Optimization of Model Reference Adaptive Controller for the Inverted Pendulum System Using CCPSO and DE Algorithms
Bejarbaneh E.Y., Bagheri A., Bejarbaneh B.Y., Buyamin S.
Nonclassical relaxation oscillations in neurodynamics
Glyzin S.D., Kolesov A.Y., Rozov N.K.
Research on the security mechanism of cloud computing service model
Zhang Y.
Model and Method for Optimizing Computational Processes in Parallel Computing Systems
Anisimov V.G., Zegzhda P.D., Anisimov E.G., Saurenko T.N., Kasatkin V.V.
On Methods of the Verification and Elaboration of Development Programs for Agricultural Territories
Vega Vice J.L., Mikhailov V.Y.
Development of Method of Matched Morphological Filtering of Biomedical Signals and Images
Povoroznyuk A.I., Filatova A., Zakovorotniy A.Y., Shehna K.
Intelligent Planning Reliability-Based Inspections of Fatigued Structures for the Crack Initiation Period in the Weibull Case under Parametric Uncertainty
Nechval N.A., Berzins G., Nechval K.N.
1 - 25 of 42 Items 1 2 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"