Search

Issue
Title
Authors
Verification of Programs with Mutual Recursion in Pifagor Language
Ushakova M.S., Legalov A.I.
Data Rate Assessment on L2–L3 CPU Bus and Bus between CPU and RAM in Modern CPUs
Komar M.S.
Parallel method of production rules extraction based on computational intelligence
Oliinyk A., Skrupsky S., Subbotin S., Korobiichuk I.
Classification Methodology for Bioinformatics Data Analysis
Gasparovica-Asīte M., Aleksejeva L.
Loop-invariant Optimization in the Pifagor Language
Vasilev V.S., Legalov A.I.
Intelligent data analysis in decision support systems for penetration tests
Poltavtseva M.A., Pechenkin A.I.
User identification and authentication system based on a hybrid fuzzy approach
Sumkin K.S., Los’ V.P., Ross G.V.
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Dakhnovich A.D., Zegzhda D.P., Moskvin D.A.
Deduplication in the Backup System with Information Storage in a Database
Taranin S.M.
Identifying a potential insider using classification models
Zaytsev A.S., Malyuk A.A.
Intelligent data analysis in information security
Grusho A.A., Grusho N.A., Zabezhailo M.I., Timonina E.E.
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers
Lokhvitskii V.A., Khomonenko A.D., Bol’shakov M.A.
A New Technique for Intelligent Constructing Exact γ-content Tolerance Limits with Expected (1 – α)-confidence on Future Outcomes in the Weibull Case Using Complete or Type II Censored Data
Nechval N.A., Nechval K.N., Berzins G.
Applying NFC for automated replication of user data
Ivanov D.V., Moskvin D.A., Myasnikov A.V., Suprun A.F.
Information security of data channels based on a multifunctional tailored software and hardware solution
Sukhoparov M.E., Lebedev I.S., Korzhuk V.M., Krivtsova I.E.
Building a Data Store with the Dynamic Structure
Artamonov Y.N.
CRC Error Probability under Batch Random Noise
Baranov A.P., Baranov P.A.
Design of Sensor Data Fusion Algorithm for Mobile Robot Navigation Using ANFIS and Its Analysis Across the Membership Functions
Adarsh S., Ramachandran K.I.
Use of Intel SGX to ensure the confidentiality of data of cloud users
Zegzhda D.P., Usov E.S., Nikol’skii A.V., Pavlenko E.Y.
26 - 44 of 44 Items << < 1 2 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"