Pesquisa

Edição
Título
Autores
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.
Big Data Management System Security Threat Model
Poltavtseva M., Zegzhda D., Kalinin M.
Quality Fuzzy Predictive Control of Water in Drinking Water Systems
Bouzid S., Ramdani M., Chenikher S.
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model
Ovasapyan T., Ivanov D.
Interpolation Model Predictive Control of Nonlinear Systems Described by Quasi-LPV Model
Meng Zhao , Jiang C., Tang X., She M.
Using Event Logs for Local Correction of Process Models
Mitsyuk A., Lomazova I., van der Aalst W.
Verification-Oriented Process Ontology
Garanina N., Anureev I., Borovikova O.
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Anisimov V., Anisimov E., Zegzhda P., Suprun A.
Two-Wave Interactions in the Fermi–Pasta–Ulam Model
Glyzin S., Kashchenko S., Tolbey A.
An adaptive technique for trajectory tracking control of a wheeled mobile robots without velocity measurements
Taheri-Kalani J., Zarei N.
An Approach to Verification of a Family of Multiagent Systems for Conflict Resolution
Garanina N., Sidorova E.
Development of FEA-ANN hybrid model for Equivalent Stress prediction of automobile structural member
Patel T., Bhatt N.
Cloud Service for Interactive Simulation of Interregional Trade Flows
Velichko A., Gribova V., Fedorishchev L.
Coverage-All Targets Algorithm for 3D Wireless Multimedia Sensor Networks Based on the Gravitational Search Algorithm
Yanjiao Wang , Ye Chen
On the Correctness of Real-Time Modular Computer Systems Modeling with Stopwatch Automata Networks
Glonina A., Balashov V.
Modeling of information influence on remote wireless network devices
Suhoparov M., Bazhaev N., Krivtsova I., Lebedev I.
Micro-blog topic detection method based on BTM topic model and K-means clustering algorithm
Li W., Feng Y., Li D., Yu Z.
Building a Data Store with the Dynamic Structure
Artamonov Y.
Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time
Lavrova D., Zaitseva E., Zegzhda D.
Methodology of Effective Task Planning and Algorithm for Multivariate Computation of the Characteristics of a Quantum Rotation Sensor on a Hybrid Supercomputer Cluster
Ilyashenko A., Voskoboynikov S., Ustinov S., Lukashin A.
Control on the transmission of computer viruses in network
Han C., Li L.
Services recommended trust algorithm based on cloud model attributes weighted clustering
Yu Z., Wang J., Zhang H., Niu K.
Computer Simulation of a Smart Building
Maryasin O., Kolodkina A., Ogarkov A.
User Mobility in a 5G Cell with Quasi-Random Traffic under the Complete Sharing and Bandwidth Reservation Policies
Efstratiou P., Moscholios I.
The detection of Udpstorm attacks based on model checking linear temporal logic
Deng M., Nie K., Zhu W., Zhang C.
1 - 25 de 42 resultados 1 2 > >> 
Dicas:
  • Palavras-chave são sensíveis a maiúsculas
  • Preposições e conjunções ingleses são ignoradas
  • Busca é feita por todos os palavras-chave (agente AND experimentador) por omissão
  • Use OR para pesquisar um termo exato, ex.: educação OR formação
  • Use parênteses para criar frases complexas, ex.: arquivo de ((revistas OR conferências) NOT teses)
  • Para pesquisar uma frase precisa use aspas duplas, ex.: "investigações científicas"
  • Exclua uma palavra utilizando o sinal - (hífen) ou operador NOT; ex.: concurso-de beleza ou concurso NOT de beleza
  • Use * como caractere-coringa, ex.: científic* recuperará as palavras "científico", "científicos", etc.