default search action
Automatic Control and Computer Sciences, Volume 49
Volume 49, Number 1, January 2015
- Sergey M. Kovalev, Sergey V. Sokolov, Pavel A. Kucherenko:
Intelligent processing of temporal data based on hybrid fuzzy-stochastic models. 1-10 - Andrii O. Oliinyk, S. Yu. Skrupsky, Sergei Subbotin:
Experimental investigation with analyzing the training method complexity of neuro-fuzzy networks based on parallel random search. 11-20 - V. V. Men'shikh, E. A. Pastushkova:
Modeling of decision synthesis in control systems using functionally redundant sets of actions. 21-28 - Mikhail A. Fedotkin, Andrei M. Fedotkin, E. V. Kudryavtsev:
Nonlocal description of the time characteristic for input flows by means of observations. 29-36 - Tamilla I. Nasirova, R. I. Sadykova, Elshan A. Ibaev:
Determination of the mean and mean-square deviations of the system level. 37-45 - Vladimir A. Bogatyrev, A. V. Bogatyrev:
Functional reliability of a real-time redundant computational process in cluster architecture systems. 46-56 - Manfred Schneps-Schneppe:
Circuit switching is coming back? 57-65
Volume 49, Number 2, March 2015
- Mikhail V. Shchemelev, G. I. Prokof'ev:
Synthesis of stable reinforcement trajectories of composite structures on smooth layup surface. 67-75 - A. B. Sizonenko, V. V. Men'shikh:
Software implementation of parallel matrix computations for linear recurrent sequence and numerical methods for estimating its efficiency. 76-81 - Dmitrii V. Speranskii:
Ant colony optimization algorithms for digital device diagnostics. 82-87 - Masuma H. Mammadova, Zarifa Jabrayilova, Faig R. Mammadzada:
Managing the IT labor market in conditions of fuzzy information. 88-93 - Mikhail A. Nikitinskiy, Igor V. Alekseev:
Analyzing the possibility of applying asymmetric transport protocols in terms of software defined networks. 94-102 - Leonid I. Tsytovich, Maksim M. Dudkin, Olesya G. Brylina, Anton V. Tyugaev:
Integrating pulse-number ADC with high temporal and temperature stability of characteristics. 103-109 - Elias Azarov, Maxim Vashkevich, Alexander A. Petrovsky:
Estimation of the instantaneous signal parameters using a modified Prony's method. 110-121
Volume 49, Number 3, May 2015
- Serhiy D. Shtovba, Olga D. Pankevich, Anastasia V. Nagorna:
Analyzing the criteria for fuzzy classifier learning. 123-132 - Vladimir V. Dombrovskii, Valery I. Smagin:
Synthesis of the optimal H2/H∝ output controller with structural constraints. 133-138 - Vladimir P. Klybik, Alexander A. Ivaniuk:
Use of arbiter physical unclonable function to solve identification problem of digital devices. 139-147 - M. Sh. Mamatov, E. B. Tashmanov, Kh. N. Alimov:
Zwquasi-linear discrete games of pursuit described by high-order equation systems. 148-152 - Nikolay A. Balonin, Anton A. Vostrikov, Michael Borisovich Sergeev:
On two predictors of calculable chains of quasi-orthogonal matrices. 153-158 - Dmitry Namiot, Manfred Sneps-Sneppe:
On mobile wireless tags. 159-166 - V. S. Rublev:
Static completeness of the dynamic information model. 167-176 - A. S. Rybakov, V. Yu. Vedin:
Signal processing in a precision event timer with interpolation based on phase measurement. 177-188
Volume 49, Number 4, July 2015
- P. N. Bibilo:
Construction of tests for providing elevated energy consumption for a combinatorial circuit of library elements. 189-198 - Aldis Baums, Andris Gordyushin:
An evaluation of the motion of a reconfigurable mobile robot over a rough terrain. 199-207 - Liudmila D. Cheremisinova:
Area minimization of regular structures based on solving logical equations. 208-215 - E. A. Kol'chugina:
Self-organizing software systems with distributed artificial intelligence. 216-220 - Yu. I. Mitrofanov, E. S. Rogachko, E. P. Stankevich:
Analysis of queueing networks with batch movements of customers and control of flows among clusters. 221-230 - Knyaz Sh. Mamedov, K. K. Mamedov, S. K. Elchueva:
Solving the mixed-integer knapsack problem by decrease of dimension and use of dynamic programming. 231-238 - Evalds Hermanis, Modris Greitans, Vladimir N. Aristov:
Identification of characteristics of two-terminal networks from the pulse response of the current. 239-244 - K. Krumin'sh, V. Peterson, V. Plotsin'sh:
The influence of thermal hysteresis of a clocked comparator on the operation of the comparator type sampling converter. 245-253
Volume 49, Number 5, September 2015
- Yevgeniy V. Bodyanskiy, Oleksii K. Tyshchenko, Anastasiia O. Deineko:
An evolving radial basis neural network with adaptive learning of its parameters and architecture. 255-260 - T. M. Mansurov, I. A. Mamedov, B. I. Guseinov, S. A. Dzhebrailova:
Development of an optoelectronic switch for the direction of radiation and procedures to define its operational characteristics. 261-267 - Darya Plinere, Arkady N. Borisov, Ludmila Aleksejeva:
Interaction of software agents in the problem of coordinating orders. 268-276 - Alexander N. Dudin, Olga S. Dudina:
Analysis of the MAP/PH/1 service system with repeat calls and energy audit. 277-285 - Elans Grabs, Ernests Petersons:
Hurst parameter estimation by wavelet transformation and a filter bank for self-similar traffic. 286-292 - Leonid I. Tsytovich, Olesya G. Brylina:
Pulse-width and pulse-frequency-width sweeping converters for potential separation of DC circuits. 293-302 - Dmitry M. Klionskiy, Dmitry I. Kaplun, Vyacheslav V. Gulvanskiy, Alexander S. Voznesenskiy:
Simulation of digital filter banks and signal classification in wideband monitoring tasks. 303-312 - Janis Judvaitis, Atis Hermanis, Krisjanis Nesenbergs, Ricards Cacurs, Igors Homjakovs, Kaspars Sudars:
Object transparent vision combining multiple images from different views. 313-320
Volume 49, Number 6, November 2015
- Taufik Izmailovich Aliev, Marina I. Rebezova, A. A. Russ:
Statistical methods for monitoring travel agencies in the settlement system. 321-327 - Anatoly A. Nazarov, Alexander N. Moiseev:
Analysis of the GI/PH/∞ system with high-rate arrivals. 328-339 - Alexander M. Andronov, Tatjana Jurkina:
Reliability of supply chains in a random environment. 340-346 - Igor V. Shcherban, O. G. Shcherban, Dmitriy S. Konev:
Tightly coupled algorithm based on nonlinear filtering in the state space with digital map navigation. 347-353 - Nikolay I. Chervyakov, Amir Sabbagh Molahosseini, Pavel Alekseevich Lyakhov, Mikhail G. Babenko, Irina N. Lavrinenko, Anton V. Lavrinenko:
Comparison of modular numbers based on the chinese remainder theorem with fractional values. 354-365 - I. G. Karpov, Yu. T. Zyryanov:
On modified pearson distributions and their identification. 366-372 - Fujun Zhang, Zunsheng Gao, Quanhui Ye:
Construction of cloud platform for personalized information services in digital library based on cloud computing data processing technology. 373-379 - Janis Judvaitis, Igors Homjakovs, Ricards Cacurs, Krisjanis Nesenbergs, Atis Hermanis, Kaspars Sudars:
Improving object transparent vision using enhanced image selection. 380-389 - Evalds Hermanis, G. Shupols, Rolands Shavelis, Vladimir N. Aristov:
Signal with linear distortions restoration experiments for stroboscopic comparator-based converters. 390-394 - Vyacheslav N. Yarmolik, Ireneusz Mrozek, Svetlana V. Yarmolik:
Controlled method of random test synthesis. 395-403 - Alexei E. Vasil'ev, T. Yu. Ivanova, T. D. F. Cabezas, Ya. D. Sadin:
Design of function-oriented microcontrollers on equipment of programmable logic integrated circuits for embedded systems. 404-411
Volume 49, Number 7, December 2015
- Marat Kh. Akhin, Sam Kolton, Vladimir M. Itsykson:
Random model sampling: Making craig interpolation work when it should not. 413-419 - Natalya Olegovna Garanina, Evgeny V. Bodin, Elena A. Sidorova:
Using SPIN for verification of multiagent data analysis. 420-429 - Pavel D. Drobintsev, Vsevolod Kotlyarov, I. V. Nikiforov, Alexander A. Letichevsky, Volodymyr Peschanenko:
Approach to behavior scenarios debugging. 430-436 - Evgeny V. Chemeritskiy, Vladimir A. Zakharov:
On network update problems for software defined networks. 437-444 - Dmitry A. Kondratyev, Alexey V. Promsky:
Developing a self-applicable verification system. Theory and practice. 445-452 - E. V. Kuzmin, Valery A. Sokolov, D. A. Ryabukhin:
Construction and verification of PLC-programs by LTL-specification. 453-465 - Maxim Petrov, Kirill Gagarski, Mikhail A. Belyaev, Vladimir M. Itsykson:
Using a bounded model checker for test generation: How to kill two birds with one SMT solver. 466-472 - Alexander V. Smirnov:
Heuristic algorithms for the problem of integer balancing of a three-dimensional matrix with constraints of the second type. 473-483 - Sergey A. Chernenok, Valery A. Nepomniaschy:
Analysis and verification of message sequence charts of distributed systems with the help of coloured Petri nets. 484-492 - Valentin F. Butuzov:
Singularly perturbed boundary value problem with multizonal interior transitional layer. 493-507 - Nikolai A. Kudryashov, Pavel N. Ryabov, B. A. Petrov:
Dissipative structures of the Kuramoto-Sivashinsky equation. 508-513 - A. A. Kashchenko:
Analysis of running waves stability in the Ginzburg-Landau equation with small diffusion. 514-517 - D. S. Kaschenko:
Dynamics of the simplest piecewise linear discontinuous mappings. 518-524 - Sergey D. Glyzin, Andrei Yu. Kolesov, Nikolai Kh. Rozov:
Blue sky catastrophe in systems with nonclassical relaxation oscillations. 525-546 - Sergey A. Kaschenko:
Relaxation oscillations in a system with delays modeling the predator-prey problem. 547-581 - Pavel N. Nesterov, Evgenii N. Agafonchikov:
Specific features of oscillations in adiabatic oscillators with delay. 582-596 - Evgeniy P. Kubyshkin, M. S. Tryakhov:
Optimal control of the behavior of solutions of an initial boundary value problem simulating rotation of a solid with an elastic rod. 597-607 - Vladimir A. Bondarenko, Andrei V. Nikolaev:
On fractional faces of the metric polytope. 608-614
Volume 49, Number 8, December 2015
- A. P. Baranov:
Efficiency comparison of optimum and adaptive methods for multichannel signal filtering. 615-621 - Dmitry P. Zegzhda, Tatiana V. Stepanova:
Thermodynamic approach to modeling multi-agent systems in cyberspace. 622-626 - Peter D. Zegzhda, Dmitry P. Zegzhda, Tatiana V. Stepanova:
Approach to the construction of the generalized functional-semantic cyber security model. 627-633 - Anatoly D. Khomonenko, S. V. Voitsekhovskii, S. V. Logashev, V. L. Dashonok:
Resolving semantic inconsistencies in elibrary.ru based on fuzzy inference. 634-642 - P. A. Baranov:
Using risk-oriented approaches to solve information security problems. 643-647 - V. A. Desnitskii, Igor V. Kotenko:
Design and verification of protected systems with integrated devices based on expert knowledge. 648-652 - Michael A. Eremeev, I. E. Gorbachev:
On using the stochastic superindicator for information security evaluation in automated systems. 653-658 - Dmitry P. Zegzhda, Tatiana V. Stepanova:
Approach to APCS protection from cyber threats. 659-664 - Peter D. Zegzhda, Maxim O. Kalinin:
Automatic security management of computer systems. 665-672 - Maxim O. Kalinin, Evgeny Pavlenko:
Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters. 673-678 - Artem S. Konoplev, Maxim O. Kalinin:
Access control method in distributed grid computing networks. 679-683 - Dmitry A. Moskvin, Dmitry P. Zegzhda, Alexey V. Nikolskiy:
Secure processor architecture modeling for large-scale systems. 684-689 - Maria A. Poltavtseva:
Support of the integrity of administrative information in intensive data exchange with RDBMS clients. 690-695 - I. I. Savchenko, O. Yu. Gatsenko:
Analytical review of methods of providing internet anonymity. 696-700 - Andrey Chechulin, Igor V. Kotenko:
Attack tree-based approach for real-time security event processing. 701-704 - V. Yu. Aranov, Vladimir S. Zaborovsky:
Method of security against computer attacks based on an analysis of executable machine code. 705-708 - D. N. Biryukov, A. G. Lomako, T. R. Sabirov:
Multilevel modeling of preemptive scenarios. 709-712 - N. S. Vert, A. S. Volkova, Dmitry P. Zegzhda, Maxim O. Kalinin:
Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment. 713-720 - Artem S. Konoplev:
Universal national security platform for distributed information and telecommunication systems. 721-726 - Daria S. Lavrova, Alexander I. Pechenkin:
Adaptive reflexivity threat protection. 727-734 - Daria S. Lavrova, Alexander I. Pechenkin, Vladimir V. Gluhov:
Applying correlation analysis methods to control flow violation detection in the internet of things. 735-740 - A. S. Molyakov, Vladimir S. Zaborovsky, Alexey Lukashin:
Model of hidden IT security threats in the cloud computing environment. 741-744 - Dmitry A. Moskvin, Denis V. Ivanov:
Methods of protecting self-organizing networks against attacks on traffic routing. 745-750 - Alexey V. Nikolskiy, Yu. S. Vasil'ev:
Formal model of cyber attacks on virtualization tools and a measure of hypervisor vulnerability. 751-757 - Alexander I. Pechenkin, Alexey V. Nikolskiy:
Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster. 758-765 - V. V. Platonov, P. O. Semenov:
Using data-mining methods to detect network attacks. 766-769 - Elena B. Aleksandrova, E. A. Kuznetsova:
Organization of revocation for lattice-based group signature scheme. 770-777 - A. P. Baranov:
Using adaptive filtering of signals for estimation of the Mahalanobis distance. 778-784 - Anna Epishkina, Konstantin Kogos:
Study of countermeasures against covert channels in IP networks. 785-789 - A. N. Kulakov, Elena B. Aleksandrova:
Analysis of broadcast schemes that implement identity-based encryption algorithms. 790-797 - N. N. Shenets:
Ideal composite modular secret sharing schemes. 798-802 - V. A. Yakovlev, V. V. Arkhipov:
User authentication based on the chess graphical password scheme resistant to shoulder surfing. 803-812 - Mikhail E. Sukhoparov:
Mechanism of establishing authorship of short messages posted by users of internet portals by methods of mathematical linguistics. 813-819 - Peter D. Zegzhda, S. S. Kort, A. F. Suprun:
Detection of anomalies in behavior of the software with usage of Markov chains. 820-825 - Alexander I. Pechenkin, Daria S. Lavrova:
Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols. 826-833 - A. Yu. Chernov, Artem S. Konoplev:
The use of virtualization technology in the dynamic analysis of software code. 834-837
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.