|
2016, Volume 26, Issue 3
|
|
|
|
|
Mathematical software for suboptimal normal filtering in stochastic systems with complex fraction-rational nonlinearities I. N. Sinitsyn, V. I. Sinitsyn, I. V. Sergeev, E. R. Korepanov, V. V. Belousov, V. S. Shorgin, E. S. Agafonov
|
4–25 |
|
Symbolic analytical modeling of normal processes in stochastic systems with complex fraction order Bessel nonlinearities I. N. Sinitsyn, E. R. Korepanov, V. V. Belousov
|
26–47 |
|
Fault-tolerant self-timed serial-parallel port: variants of realization Yu. A. Stepchenkov, A. N. Kamenskih, S. F. Tyurin, Y. G. Diachenko
|
48–59 |
|
Protection of business logic against zero day attacks A. A. Grusho, D. V. Smirnov
|
60–73 |
|
Architectural vulnerabilities of distributed information systems A. A. Grusho, N. A. Grusho, E. E. Timonina, S. Ya. Shorgin
|
74–82 |
|
Secure automatic reconfiguration of cloudy computing A. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinnyy, V. O. Piskovski
|
83–92 |
|
Conceptual model of virtual heterogeneous collective for supporting group decision-making I. A. Kirikov, A. V. Kolesnikov, S. B. Rumovskaya, A. V. Barzenkov, E. V. Petrenko
|
93–105 |
|
Mixtures of normal distributions in the problem of reference points search using myograms T. V. Zakharova, M. M. Podlesnyy
|
106–121 |
|
On aspects of automated information system efficiency evaluation at different stages of lifecycle A. A. Zatsarinny, Y. S. Ionenkov
|
122–135 |
|
Segmentation of information-technology infrastructure of situational center by the loop security attribute A. A. Zatsarinny, V. I. Korolev
|
136–147 |
|
Distributed automated technology of historical texts analysis I. M. Adamovich, O. I. Volkov
|
148–161 |
|
Computer science in the academic library S. A. Vlasova, N. E. Kalenov
|
162–178 |
|
Objects of scientific authorship and assessment of their significance V. D. Ilyin
|
179–188 |
|
On the information and medialiteracy teaching in the schools of Russia D. A. Bogdanova
|
189–199 |
|
|