Automatic Control and Computer Sciences, Volume 49 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 49, Number 1, January 2015

Sergey M. Kovalev, Sergey V. Sokolov
, Pavel A. Kucherenko
:
Intelligent processing of temporal data based on hybrid fuzzy-stochastic models. 1-10

Andrii O. Oliinyk
, S. Yu. Skrupsky
, Sergei Subbotin
:
Experimental investigation with analyzing the training method complexity of neuro-fuzzy networks based on parallel random search. 11-20

V. V. Men'shikh, E. A. Pastushkova:
Modeling of decision synthesis in control systems using functionally redundant sets of actions. 21-28

Mikhail A. Fedotkin, Andrei M. Fedotkin, E. V. Kudryavtsev:
Nonlocal description of the time characteristic for input flows by means of observations. 29-36

Tamilla I. Nasirova, R. I. Sadykova, Elshan A. Ibaev
:
Determination of the mean and mean-square deviations of the system level. 37-45

Vladimir A. Bogatyrev
, A. V. Bogatyrev:
Functional reliability of a real-time redundant computational process in cluster architecture systems. 46-56

Manfred Schneps-Schneppe:
Circuit switching is coming back? 57-65
Volume 49, Number 2, March 2015

Mikhail V. Shchemelev, G. I. Prokof'ev:
Synthesis of stable reinforcement trajectories of composite structures on smooth layup surface. 67-75

A. B. Sizonenko, V. V. Men'shikh:
Software implementation of parallel matrix computations for linear recurrent sequence and numerical methods for estimating its efficiency. 76-81

Dmitrii V. Speranskii:
Ant colony optimization algorithms for digital device diagnostics. 82-87

Masuma H. Mammadova
, Zarifa Jabrayilova
, Faig R. Mammadzada:
Managing the IT labor market in conditions of fuzzy information. 88-93

Mikhail A. Nikitinskiy, Igor V. Alekseev:
Analyzing the possibility of applying asymmetric transport protocols in terms of software defined networks. 94-102

Leonid I. Tsytovich, Maksim M. Dudkin, Olesya G. Brylina, Anton V. Tyugaev:
Integrating pulse-number ADC with high temporal and temperature stability of characteristics. 103-109

Elias Azarov
, Maxim Vashkevich
, Alexander A. Petrovsky:
Estimation of the instantaneous signal parameters using a modified Prony's method. 110-121
Volume 49, Number 3, May 2015

Serhiy D. Shtovba
, Olga D. Pankevich, Anastasia V. Nagorna:
Analyzing the criteria for fuzzy classifier learning. 123-132

Vladimir V. Dombrovskii, Valery I. Smagin:
Synthesis of the optimal H2/H∝ output controller with structural constraints. 133-138

Vladimir P. Klybik, Alexander A. Ivaniuk:
Use of arbiter physical unclonable function to solve identification problem of digital devices. 139-147

M. Sh. Mamatov, E. B. Tashmanov, Kh. N. Alimov:
Zwquasi-linear discrete games of pursuit described by high-order equation systems. 148-152

Nikolay A. Balonin, Anton A. Vostrikov, Michael Borisovich Sergeev
:
On two predictors of calculable chains of quasi-orthogonal matrices. 153-158

Dmitry Namiot
, Manfred Sneps-Sneppe:
On mobile wireless tags. 159-166

V. S. Rublev:
Static completeness of the dynamic information model. 167-176

A. S. Rybakov, V. Yu. Vedin:
Signal processing in a precision event timer with interpolation based on phase measurement. 177-188
Volume 49, Number 4, July 2015

P. N. Bibilo:
Construction of tests for providing elevated energy consumption for a combinatorial circuit of library elements. 189-198

Aldis Baums, Andris Gordyushin:
An evaluation of the motion of a reconfigurable mobile robot over a rough terrain. 199-207

Liudmila D. Cheremisinova:
Area minimization of regular structures based on solving logical equations. 208-215

E. A. Kol'chugina:
Self-organizing software systems with distributed artificial intelligence. 216-220

Yu. I. Mitrofanov, E. S. Rogachko, E. P. Stankevich:
Analysis of queueing networks with batch movements of customers and control of flows among clusters. 221-230

Knyaz Sh. Mamedov, K. K. Mamedov, S. K. Elchueva:
Solving the mixed-integer knapsack problem by decrease of dimension and use of dynamic programming. 231-238

Evalds Hermanis, Modris Greitans
, Vladimir N. Aristov:
Identification of characteristics of two-terminal networks from the pulse response of the current. 239-244

K. Krumin'sh, V. Peterson, V. Plotsin'sh:
The influence of thermal hysteresis of a clocked comparator on the operation of the comparator type sampling converter. 245-253
Volume 49, Number 5, September 2015

Yevgeniy V. Bodyanskiy
, Oleksii K. Tyshchenko
, Anastasiia O. Deineko:
An evolving radial basis neural network with adaptive learning of its parameters and architecture. 255-260

T. M. Mansurov, I. A. Mamedov, B. I. Guseinov, S. A. Dzhebrailova:
Development of an optoelectronic switch for the direction of radiation and procedures to define its operational characteristics. 261-267

Darya Plinere
, Arkady N. Borisov, Ludmila Aleksejeva:
Interaction of software agents in the problem of coordinating orders. 268-276

Alexander N. Dudin, Olga S. Dudina
:
Analysis of the MAP/PH/1 service system with repeat calls and energy audit. 277-285

Elans Grabs, Ernests Petersons
:
Hurst parameter estimation by wavelet transformation and a filter bank for self-similar traffic. 286-292

Leonid I. Tsytovich, Olesya G. Brylina:
Pulse-width and pulse-frequency-width sweeping converters for potential separation of DC circuits. 293-302

Dmitry M. Klionskiy, Dmitry I. Kaplun
, Vyacheslav V. Gulvanskiy, Alexander S. Voznesenskiy
:
Simulation of digital filter banks and signal classification in wideband monitoring tasks. 303-312

Janis Judvaitis
, Atis Hermanis, Krisjanis Nesenbergs
, Ricards Cacurs
, Igors Homjakovs, Kaspars Sudars
:
Object transparent vision combining multiple images from different views. 313-320
Volume 49, Number 6, November 2015

Taufik Izmailovich Aliev, Marina I. Rebezova, A. A. Russ:
Statistical methods for monitoring travel agencies in the settlement system. 321-327

Anatoly A. Nazarov
, Alexander N. Moiseev
:
Analysis of the GI/PH/∞ system with high-rate arrivals. 328-339

Alexander M. Andronov, Tatjana Jurkina:
Reliability of supply chains in a random environment. 340-346

Igor V. Shcherban
, O. G. Shcherban, Dmitriy S. Konev:
Tightly coupled algorithm based on nonlinear filtering in the state space with digital map navigation. 347-353

Nikolay I. Chervyakov
, Amir Sabbagh Molahosseini
, Pavel Alekseevich Lyakhov
, Mikhail G. Babenko
, Irina N. Lavrinenko, Anton V. Lavrinenko:
Comparison of modular numbers based on the chinese remainder theorem with fractional values. 354-365

I. G. Karpov, Yu. T. Zyryanov:
On modified pearson distributions and their identification. 366-372

Fujun Zhang, Zunsheng Gao, Quanhui Ye:
Construction of cloud platform for personalized information services in digital library based on cloud computing data processing technology. 373-379

Janis Judvaitis
, Igors Homjakovs, Ricards Cacurs
, Krisjanis Nesenbergs
, Atis Hermanis, Kaspars Sudars
:
Improving object transparent vision using enhanced image selection. 380-389

Evalds Hermanis, G. Shupols, Rolands Shavelis, Vladimir N. Aristov:
Signal with linear distortions restoration experiments for stroboscopic comparator-based converters. 390-394

Vyacheslav N. Yarmolik, Ireneusz Mrozek
, Svetlana V. Yarmolik:
Controlled method of random test synthesis. 395-403

Alexei E. Vasil'ev
, T. Yu. Ivanova, T. D. F. Cabezas, Ya. D. Sadin:
Design of function-oriented microcontrollers on equipment of programmable logic integrated circuits for embedded systems. 404-411
Volume 49, Number 7, December 2015

Marat Kh. Akhin
, Sam Kolton, Vladimir M. Itsykson:
Random model sampling: Making craig interpolation work when it should not. 413-419

Natalya Olegovna Garanina, Evgeny V. Bodin, Elena A. Sidorova:
Using SPIN for verification of multiagent data analysis. 420-429

Pavel D. Drobintsev, Vsevolod Kotlyarov, I. V. Nikiforov, Alexander A. Letichevsky, Volodymyr Peschanenko
:
Approach to behavior scenarios debugging. 430-436

Evgeny V. Chemeritskiy, Vladimir A. Zakharov:
On network update problems for software defined networks. 437-444

Dmitry A. Kondratyev
, Alexey V. Promsky
:
Developing a self-applicable verification system. Theory and practice. 445-452

E. V. Kuzmin, Valery A. Sokolov
, D. A. Ryabukhin:
Construction and verification of PLC-programs by LTL-specification. 453-465

Maxim Petrov, Kirill Gagarski, Mikhail A. Belyaev
, Vladimir M. Itsykson:
Using a bounded model checker for test generation: How to kill two birds with one SMT solver. 466-472

Alexander V. Smirnov
:
Heuristic algorithms for the problem of integer balancing of a three-dimensional matrix with constraints of the second type. 473-483

Sergey A. Chernenok, Valery A. Nepomniaschy:
Analysis and verification of message sequence charts of distributed systems with the help of coloured Petri nets. 484-492

Valentin F. Butuzov:
Singularly perturbed boundary value problem with multizonal interior transitional layer. 493-507

Nikolai A. Kudryashov
, Pavel N. Ryabov
, B. A. Petrov:
Dissipative structures of the Kuramoto-Sivashinsky equation. 508-513

A. A. Kashchenko:
Analysis of running waves stability in the Ginzburg-Landau equation with small diffusion. 514-517

D. S. Kaschenko:
Dynamics of the simplest piecewise linear discontinuous mappings. 518-524

Sergey D. Glyzin
, Andrei Yu. Kolesov, Nikolai Kh. Rozov
:
Blue sky catastrophe in systems with nonclassical relaxation oscillations. 525-546

Sergey A. Kaschenko
:
Relaxation oscillations in a system with delays modeling the predator-prey problem. 547-581

Pavel N. Nesterov
, Evgenii N. Agafonchikov:
Specific features of oscillations in adiabatic oscillators with delay. 582-596

Evgeniy P. Kubyshkin
, M. S. Tryakhov:
Optimal control of the behavior of solutions of an initial boundary value problem simulating rotation of a solid with an elastic rod. 597-607

Vladimir A. Bondarenko
, Andrei V. Nikolaev
:
On fractional faces of the metric polytope. 608-614
Volume 49, Number 8, December 2015

A. P. Baranov:
Efficiency comparison of optimum and adaptive methods for multichannel signal filtering. 615-621

Dmitry P. Zegzhda, Tatiana V. Stepanova:
Thermodynamic approach to modeling multi-agent systems in cyberspace. 622-626

Peter D. Zegzhda
, Dmitry P. Zegzhda, Tatiana V. Stepanova:
Approach to the construction of the generalized functional-semantic cyber security model. 627-633

Anatoly D. Khomonenko
, S. V. Voitsekhovskii, S. V. Logashev, V. L. Dashonok:
Resolving semantic inconsistencies in elibrary.ru based on fuzzy inference. 634-642

P. A. Baranov:
Using risk-oriented approaches to solve information security problems. 643-647

V. A. Desnitskii, Igor V. Kotenko
:
Design and verification of protected systems with integrated devices based on expert knowledge. 648-652

Michael A. Eremeev, I. E. Gorbachev:
On using the stochastic superindicator for information security evaluation in automated systems. 653-658

Dmitry P. Zegzhda, Tatiana V. Stepanova:
Approach to APCS protection from cyber threats. 659-664

Peter D. Zegzhda
, Maxim O. Kalinin
:
Automatic security management of computer systems. 665-672

Maxim O. Kalinin
, Evgeny Pavlenko
:
Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters. 673-678

Artem S. Konoplev, Maxim O. Kalinin
:
Access control method in distributed grid computing networks. 679-683

Dmitry A. Moskvin, Dmitry P. Zegzhda, Alexey V. Nikolskiy:
Secure processor architecture modeling for large-scale systems. 684-689

Maria A. Poltavtseva:
Support of the integrity of administrative information in intensive data exchange with RDBMS clients. 690-695

I. I. Savchenko, O. Yu. Gatsenko:
Analytical review of methods of providing internet anonymity. 696-700

Andrey Chechulin
, Igor V. Kotenko
:
Attack tree-based approach for real-time security event processing. 701-704

V. Yu. Aranov, Vladimir S. Zaborovsky:
Method of security against computer attacks based on an analysis of executable machine code. 705-708

D. N. Biryukov, A. G. Lomako, T. R. Sabirov:
Multilevel modeling of preemptive scenarios. 709-712

N. S. Vert, A. S. Volkova, Dmitry P. Zegzhda, Maxim O. Kalinin
:
Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment. 713-720

Artem S. Konoplev:
Universal national security platform for distributed information and telecommunication systems. 721-726

Daria S. Lavrova, Alexander I. Pechenkin:
Adaptive reflexivity threat protection. 727-734

Daria S. Lavrova, Alexander I. Pechenkin, Vladimir V. Gluhov
:
Applying correlation analysis methods to control flow violation detection in the internet of things. 735-740

A. S. Molyakov, Vladimir S. Zaborovsky, Alexey Lukashin:
Model of hidden IT security threats in the cloud computing environment. 741-744

Dmitry A. Moskvin, Denis V. Ivanov
:
Methods of protecting self-organizing networks against attacks on traffic routing. 745-750

Alexey V. Nikolskiy, Yu. S. Vasil'ev:
Formal model of cyber attacks on virtualization tools and a measure of hypervisor vulnerability. 751-757

Alexander I. Pechenkin, Alexey V. Nikolskiy:
Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster. 758-765

V. V. Platonov, P. O. Semenov:
Using data-mining methods to detect network attacks. 766-769

Elena B. Aleksandrova
, E. A. Kuznetsova:
Organization of revocation for lattice-based group signature scheme. 770-777

A. P. Baranov:
Using adaptive filtering of signals for estimation of the Mahalanobis distance. 778-784

Anna Epishkina
, Konstantin Kogos
:
Study of countermeasures against covert channels in IP networks. 785-789

Alexander N. Kulakov, Elena B. Aleksandrova
:
Analysis of broadcast schemes that implement identity-based encryption algorithms. 790-797

N. N. Shenets
:
Ideal composite modular secret sharing schemes. 798-802

V. A. Yakovlev, V. V. Arkhipov:
User authentication based on the chess graphical password scheme resistant to shoulder surfing. 803-812

Mikhail E. Sukhoparov
:
Mechanism of establishing authorship of short messages posted by users of internet portals by methods of mathematical linguistics. 813-819

Peter D. Zegzhda
, S. S. Kort, A. F. Suprun:
Detection of anomalies in behavior of the software with usage of Markov chains. 820-825

Alexander I. Pechenkin, Daria S. Lavrova:
Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols. 826-833

A. Yu. Chernov, Artem S. Konoplev:
The use of virtualization technology in the dynamic analysis of software code. 834-837

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







