Výsledky vyhledávání - "Control Structures and Microprogramming."

Upřesnit hledání
  1. 1
  2. 2

    Supercomputing Frontiers: 5th Asian Conference, SCFA 2019, Singapore, March 11–14, 2019, Proceedings

    Vydáno: Springer Nature 2019
    “…This open access book constitutes the refereed proceedings of the 5th Asian Supercomputing Conference, SCFA 2019, held in Singapore in March 2019. The 6 full…”
    Získat plný text
    E-kniha
  3. 3

    Supercomputing Frontiers: 6th Asian Conference, SCFA 2020, Singapore, February 24–27, 2020, Proceedings

    Vydáno: Springer Nature 2020
    “…This open access book constitutes the refereed proceedings of the 6th Asian Supercomputing Conference, SCFA 2020, which was planned to be held in February…”
    Získat plný text
    E-kniha
  4. 4
  5. 5

    Erratum to: A Novel Coal Mine Dust Measurement System and Experimental Analysis Autor Yu, Bencheng, Zihui, Ren, Shoufeng, Tang

    ISSN: 0146-4116, 1558-108X
    Vydáno: Moscow Pleiades Publishing 01.10.2023
    “…An Erratum to this paper has been published: https://doi.org/10.3103/S0146411623050139…”
    Získat plný text
    Journal Article
  6. 6

    Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code Autor Kosolapov, Y. V.

    ISSN: 0146-4116, 1558-108X
    Vydáno: Moscow Pleiades Publishing 01.12.2022
    “…An Erratum to this paper has been published: https://doi.org/10.3103/S0146411622070094…”
    Získat plný text
    Journal Article
  7. 7
  8. 8
  9. 9

    Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network Autor Prabhat Kumar, Gupta, Govind P., Tripathi, Rakesh

    ISSN: 0146-4116, 1558-108X
    Vydáno: Moscow Pleiades Publishing 01.03.2021
    “…With increase in the demand for Internet of Things (IoT)-based services, the capability to detect anomalies such as malicious control, spying and other threats…”
    Získat plný text
    Journal Article
  10. 10
  11. 11
  12. 12

    Fundamental Approaches to Software Engineering: 28th International Conference, FASE 2025, Held as Part of the International Joint Conferences on Theory and Practice of Software, ETAPS 2025, Hamilton, ON, Canada, May 3–8, 2025, Proceedings

    ISBN: 9783031909009, 3031909003, 3031908996, 9783031908996
    Vydáno: Cham Springer Nature 2025
    “…This open access book constitutes the proceedings of the 28th International Conference on Fundamental Approaches to Software Engineering, FASE 2025, which was…”
    Získat plný text
    E-kniha
  13. 13

    Attack Graph-Based Data Presentation for Use in Automated Security Analysis Systems Autor Orel, E. M., Moskvin, D. A., Lyashenko, A. A.

    ISSN: 0146-4116, 1558-108X
    Vydáno: Moscow Pleiades Publishing 01.12.2024
    “…A mathematical model for data representation is developed for use in automated security analysis systems. The model allows linking information about the system…”
    Získat plný text
    Journal Article
  14. 14

    The Algorithms for the Eulerian Cycle and Eulerian Trail Problems for a Multiple Graph Autor Smirnov, A. V.

    ISSN: 0146-4116, 1558-108X
    Vydáno: Moscow Pleiades Publishing 01.12.2024
    “…In this article, we consider undirected multiple graphs of any natural multiplicity k > 1. A multiple graph contains edges of three types: ordinary edges,…”
    Získat plný text
    Journal Article
  15. 15

    The Use of Generative-Adversarial Networks to Counter Steganalysis Autor Aleksandrova, E. B., Bezborodko, A. I., Lavrova, D. S.

    ISSN: 0146-4116, 1558-108X
    Vydáno: Moscow Pleiades Publishing 01.12.2024
    “…An approach using a generative adversarial network (GAN) is proposed to increase the robustness of the steganographic method against modern steganalyzers. This…”
    Získat plný text
    Journal Article
  16. 16

    Detecting Malware Using Deep Neural Networks Autor Ovasapyan, T. D., Volkovskii, M. A., Makarov, A. S.

    ISSN: 0146-4116, 1558-108X
    Vydáno: Moscow Pleiades Publishing 01.12.2024
    “…This article proposes a method for detecting malicious executable files by analyzing disassembled code. This method is based on a static analysis of assembler…”
    Získat plný text
    Journal Article
  17. 17

    Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology Autor Fedorov, I. R., Kovalev, A. A.

    ISSN: 0146-4116, 1558-108X
    Vydáno: Moscow Pleiades Publishing 01.12.2024
    “…In light of the rapid development of edge computing and the increase in the number of connected devices, this paper addresses the pressing issue of ensuring…”
    Získat plný text
    Journal Article
  18. 18

    Zhegalkin Polynomial of a Multiary Sole Sufficient Operator Autor Bystrov, L. Y., Kuzmin, E. V.

    ISSN: 0146-4116, 1558-108X
    Vydáno: Moscow Pleiades Publishing 01.12.2024
    “…— Sole sufficient operators are of particular interest among functionally complete sets of Boolean functions. They have a wide range of applicability and are…”
    Získat plný text
    Journal Article
  19. 19

    Justification of the Rational Composition of the Information Security System Autor Suprun, A. F., Zegzhda, D. P., Anisimov, V. G., Anisimov, E. D.

    ISSN: 0146-4116, 1558-108X
    Vydáno: Moscow Pleiades Publishing 01.12.2024
    “…This paper examines a methodological approach to the construction of models and algorithms for supporting decision-making in substantiating rational…”
    Získat plný text
    Journal Article
  20. 20

    Extracting Named Entities from Russian-Language Documents with Varying Degrees of Structural Clarity Autor Averina, M. D., Levanova, O. A.

    ISSN: 0146-4116, 1558-108X
    Vydáno: Moscow Pleiades Publishing 01.12.2024
    “…— This study addresses the task of recognizing named entities in Russian texts using the CRF model. We analyze two datasets: well-structured refinancing…”
    Získat plný text
    Journal Article