|
2018, Volume 28, Issue 1
|
|
|
|
|
Analytical synthesis of suboptimal filters by moments methods I. N. Sinitsyn, V. I. Sinitsyn, E. R. Korepanov
|
4–19 |
|
To the reliability of an information-telecommunication system: an approach to recognition of reliable software characteristics A. V. Borisov, A. V. Bosov, A. V. Ivanov, E. R. Korepanov
|
20–34 |
|
Probabilistic approach to solving the magnetoencephalography inverse problem M. B. Goncharenko, T. V. Zakharova
|
35–52 |
|
Initial bounding box estimation methods for volumetric three-dimensional reconstruction O. A. Yakovlev
|
53–64 |
|
The model of semantic net error correction process I. M. Adamovich, O. I. Volkov
|
65–76 |
|
Informativity of a kinetic experiment and uncertainty regions of kinetic model S. I. Spivak, F. T. Ziganshina, A. S. Ismagilova
|
77–88 |
|
Regarding systemic and technical problems of applying intellectual data analysis for providing information protection in situational centers V. E. Gavrilov, A. A. Zatsarinny
|
89–98 |
|
About the analysis of erratic statuses in the distributed computing systems A. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinny, A. V. Nikolaev, V. O. Piskovski, V. V. Senchilo, I. V. Sudarikov, E. E. Timonina
|
99–109 |
|
Modeling of secure architecture of distributed information systems on the basis of integrated virtualization N. A. Grusho, V. V. Senchilo
|
110–122 |
|
SDN load balancing for secure networks O. Yu. Guzev, I. V. Chizhov
|
123–138 |
|
SDN load balancing on L3-VPN gateways in data centers interconnection O. Yu. Guzev, I. V. Chizhov
|
139–155 |
|
Using the fuzzy vault to correct inaccuracies in authentication data D. E. Gordienko, Yu. V. Kosolapov, A. S. Mishko
|
156–176 |
|
Situational online resource planning in accordance with mandatory and orienting rules A. V. Ilyin, V. D. Ilyin
|
177–191 |
|
|