Automation, Computation Engineering, Computer Science

Number of articles on this topic: 33

Article List:

2013, №2
Development of the Modal Control System with Identifiers

,

109-114
2013, №3
Functional and Mathematical Models for an Assessment of Probabilistic and Time Characteristics of the Proxy Server

,

100-106
Method of Adaptive Security Development for Software Systems Using a Multi-agent Approach

,

96-99
2013, №4
About acceleration of operations over tree-like structures with use of Hensel code

,

,

181-185
Linear classifiers for the text categorization problem

,

204-208
The functionality of directed relations

,

193-203
Research of triangular norms influence on dynamics of the fuzzy logic automatic control system

,

,

186-192
Testing technique of the hardware-implemented firewall

,

139-145
The model of scheduling and a fair share resource allocation in distributed computing

,

,

146-150
Providing the efficient non-dedicated resources utilization rate for cyclic scheduling approach in grid

,

,

151-154
The prevention methods analysis of memory-related errors in the software

,

155-160
Non-dedicated resource co-allocation algorithms in distributed computing environments

,

161-165
Detection of memory-related errors during work with a memory in initial code

,

166-172
Development of algorithms for determination of event parameters and network graph operations under conditions of interval uncertainty 173-180
About one approach to effective numeration of infinite recursive sets of formal objects 209-215
2013, №5
Fractality geometrical index of the one-dimensional process

,

134-139
Genetics of information systems 140-149
On the singularly perturbed models of dynamical systems with the implicit representation of the perturbation

,

150-155
The approach to risk-management in complex technical-organizational systems

,

,

,

156-161
2014, №1
Metasheduling strategies in distributed computational environments

,

,

,

,

78-87
Bilateral search, providing a mutual detection Of objects with an optimal strategy scan

,

88-93
2014, №2
Sequential algorithm of the moment change characteristics detection for vector time series

,

63-69
Fragmentary compression method of video bitplanes

,

,

70-75
Web-search personalization: static or dynamic clustering

,

76-81
Radar oriented quick-acting specialized computational system

,

82-85
2014, №4
A technique of factor value scales transformation with regard to their relations with other factors, describing the controlled object

,

,

76-80
2015, №1
RISE COEFFICIENT OF EFFICIENCY STABILIZING SYSTEMS TEAM-WORK ON TOTAL PRESSURE BY ADDITIONAL OPTIMIZING PEAK-HOLDING CONTROLLER

,

,

107-113
MULTIEXTREMAL GENETIC ALGORITHMS APPLICATION IN FUZZY CLUSTERING TASKS

,

,

101-106
2015, №2
ALGORITHMIC SOFTWARE FOR RELIABLE DETECTION OF DEFECTS STEAM PIPES

,

114-122
COMPARATIVE ANALYSIS OF IDENTIFICATION INTEGRAL-MODULATING CLASS METHODS 108-113
2015, №3
SEQUENTIAL ALGORITHM OF THE CHANGE-POINT DETECTION OF FRACTAL TIME SERIES

,

102-109
BENCH MEASUREMENTS OF NETWORK CHARACTERISTICS OF THE PROXY SERVER

,

95-101
2015, №6
DEVELOPMENT AND IMPLEMENTATION OF MODIFICATIONS TO RETE ALGORITHM FUZZY EXPERT SYSTEMS

,

114-119