40 citations to https://www.mathnet.ru/rus/tvp4467
-
Hognas G., “On the Lifetime of a Size-Dependent Branching Process”, Stoch. Models, 35:2, SI (2019), 119–131
-
Duchi J. Namkoong H., “Variance-Based Regularization With Convex Objectives”, J. Mach. Learn. Res., 20 (2019), 1
-
В. А. Ватутин, “Асимптотические свойства числа инверсий в раскрашенных деревьях”, Матем. вопр. криптогр., 10:4 (2019), 9–24
-
Yan S. Chaudhuri K. Javidi T., Advances in Neural Information Processing Systems 32 (Nips 2019), Advances in Neural Information Processing Systems, 32, ed. Wallach H. Larochelle H. Beygelzimer A. d'Alche-Buc F. Fox E. Garnett R., Neural Information Processing Systems (Nips), 2019
-
Rossman B., “Criticality of Regular Formulas”, Leibniz International Proceedings in Informatics, 137, ed. Shpilka A., Schloss Dagstuhl, Leibniz Center Informatics, 2019, UNSP 1
-
S. Y. Novak, “Poisson approximation”, Probab. Surveys, 16:none (2019)
-
A. M. Zubkov, V. I. Kruglov, “On quantiles of minimal codeword weights of random linear codes over $\mathbf{F}_p$”, Матем. вопр. криптогр., 9:2 (2018), 99–102
-
E. Yavuz, “Euler summability method of sequences of fuzzy numbers and a Tauberian theorem”, J. Intell. Fuzzy Syst., 32:1 (2017), 937–943
-
S. P. Kulik, S. N. Molotkov, “Decoy state method for quantum cryptography based on phase coding into faint laser pulses”, Laser Phys. Lett., 14:12 (2017), 125205
-
A. S. Trushechkin, E. O. Kiktenko, A. K. Fedorov, “Practical issues in decoy-state quantum key distribution based on the central limit theorem”, Phys. Rev. A, 96:2 (2017), 022316