Authors
|
Title
|
Pages
|
Abdrashitov A., Spivak A.
|
Sensor
Data Anonymization Based on Genetic Algorithm Clustering with
L-Diversity
|
3-8
|
Antonov
A., Filippov A., Mamoutova
O.
|
Next
Generation FPGA-Based Platform for Network Security
|
9-14
|
Baranov S., Nikiforov V.
|
The
Impact of Blocking Factor on Real-Time Applications Feasibility
|
15-20
|
Baranov S.
|
Real-Time
Multi-Task Simulation in Forth
|
21-26
|
Bazhayev
N., Lebedev I., Krivtsova
I.,
Zikratov I.
|
Research
Availability of Devices Based on Wireless Networks
|
27-32
|
Chuvilin K.
|
Machine
Learning Approach to Automated Correction of LATEX Documents
|
33-40
|
Dovgalyuk
P., Dmitriev D., Makarov V.
|
Platform-Independent
Reverse Debugging of the Virtual Machines
|
41-47
|
Fujdiak
R., Masek P., Mlynek P.,
Misurec J., Muthanna A.
|
Advanced
Optimization Method for Improving the Urban Traffic Management
|
48-53
|
Galimullin
M., Kalishenko E. Rapotkin
N.
|
Performance
Analysis of Thread Synchronization Strategies in Concurrent Data Structures
Based On Flat-Combining
|
54-59
|
Gerasimova-Meigal
L., Fedosova A., Meigal
A.
|
Hand
Skin Temperature: A Usability for Health Care Services
|
60-65
|
Haberland
R., Krinkin K. Ivanovskiy
S.
|
Abstract
Predicate Entailment over Points-To Heaplets is
Syntax Recognition
|
66-74
|
Ivaschenko
A., Gorbachenko N.,
Kolsanov A., Kuzmin A.
|
Surgery
Scene Representation in 3D Simulation Training SDK
|
75-84
|
Ivaschenko
A., Lednev A., Diyazitdinova
A.
|
P2P
Outsourcing Model for Agile Project Tasks Allocation
|
85-91
|
Kashevnik A., Teslya N., Yablochnikov E., Arckhipov V., Kipriyanov K.
|
Hybrid
Automated Line Workstations Interaction Scenario for Optical Devices Assembly
|
92-99
|
Khomonenko A., Gindin S.
|
Performance
Evaluation of Cloud Computing Accounting for Expenses on Information Security
|
100-105
|
Klimentyev V., Sergienko A.
|
Detection
of SCMA Signal with Channel Estimation Error
|
106-112
|
Kolchin
M., Klimov N., Shilin I.,
Garayzuev D., Andreev A.
|
Unequal
Temperature Changes in City: A Case Study Using a Semantic IoT Platform
|
113-119
|
Komar
M., Edelev S., Koucheryavy
Y.
|
Handheld
Wireless Authentication Key and Secure Documents Storage for the Internet of
Everything
|
120-130
|
Kondratyev A., Tishchenko I.
|
Concept
of Distributed Processing System of Images Flow in Terms of
π-calculus
|
131-137
|
Korzun
D., Marchenkov S., Vdovenko
A., Borodulin A., Balandin
S.
|
Performance
Evaluation of Smart-M3 Applications: A SmartRoom
Case Study
|
138-144
|
Kulakov
K., Petrina O., Korzun
D., Varfolomeyev A.
|
Towards
an Understanding of Smart Service: The Case Study for Cultural Heritage
e-Tourism
|
145-152
|
Lapaev M.
|
Automated
Extraction of Concept Matcher Thesaurus from Semi-Structured Catalogue-Like
Sources of Data on the Web
|
153-160
|
Lebedev
A., Pavlov V., Khryashchev V., Stepanova
O.
|
Face
Detection Algorithm Based on a Cascade of Ensembles of Decision Trees
|
161-166
|
Lebedev
I., Korzhuk V., Krivtsova
I., Salakhutdinova K., Sukhoparov
M.,
Tikhonov D.
|
Using
Preventive Measures for the Purpose of Assuring Information Security of
Wireless Communication Channels
|
167-173
|
Lebedev
N., Timofeev I., Zavialova I.
|
Design
and Implementation of the First Aid Assistance Service Based on Smart-M3
Platform
|
174-180
|
Levina
A., Sleptsova D., Zaitsev O.
|
Side-Channel
Attacks and Machine Learning Approach
|
181-186
|
Levina A., Taranov S.
|
New
Construction of Algebraic Manipulation Detection Codes Based on Wavelet
Transform
|
187-192
|
Makarov A., Yakovleva E.
|
Comparative
Analysis of Halftoning Algorithms for Digital
Watermarking
|
193-199
|
Masek
P., Fujdiak R., Zeman K.,
Hosek J., Muthanna A.
|
Remote
Networking Technology for IoT: Cloud-based Access
for AllJoyn-enabled Devices
|
200-205
|
Maslennikov O., Komarov I.
|
Efficiency Metrics
for Flocking with Implicit Leadership
|
206-211
|
Moldovyan
N., Berezin A., Kornienko
A., Moldovyan A.
|
Bi-Deniable
Public-Encryption Protocols Based on Standard PKI
|
212-219
|
Namiot
D., Sneps-Sneppe M.
|
On Physical Web
Browser
|
220-225
|
Noskov
A., Aminova E., Volokhov
V.
|
Comparison
of Image Focus Assessment Methods for Multi-focused Image Construction
|
226-232
|
Olenev
V., Podgornova E., Lavrovskaya
I.
|
Protocol
for Deterministic Data Delivery in SpaceWire
Networks
|
233-240
|
Orsino A., Ometov A.
|
Validating
Information Security Framework for Offloading from LTE onto D2D Links
|
241-247
|
Osmolovskiy
S., Ivanova E., Shakurov
D., Fedorov I., Vinogradov
V.
|
Hierarchical
Real-Time Scheduling for Multicore Systems
|
248-256
|
Osmolovskiy
S., Fedorov I., Vinogradov
V., Ivanova E., Shakurov
D.
|
Mixed-Criticality
Scheduling in Real-Time Multiprocessor Systems
|
257-265
|
Palagushin
V., Khomonenko A., Adadurov
S.
|
Evaluation
of Cryptographic Primitives Security Based on Proximity to the Latin Square
|
266-271
|
Ponomarev A.
|
Recommending
Tourist Locations Based on Data from Photo Sharing Service: Method and
Algorithm
|
272-278
|
Purtov
K., Kublanov V., Petrenko
A.,
Petrenko T.
|
Remote
Photoplethysmography Application to Analysis
Time-Frequency Changes of Human Heart Rate Variability
|
279-284
|
Romanov A., Ivannikov A.
|
SystemC
NoC Simulation as the Alternative to the HDL and
High-level Modeling
|
285-290
|
Sergeeva M., Ryabchikov I., Glaznev M., Gusarova N.
|
Classification
of Pulmonary Nodules on Computed Tomography Scans. Evaluation of the
Effectiveness of Application of Textural Features Extracted Using Wavelet
Transform of Image
|
291-299
|
Sharov
V., Bolshakov O., Petrov
A.
|
Cross-Platform
Programs Implementation for Specialized Distributed Embedded Systems
|
300-305
|
Smirnov A., Kashevnik A., Lashkov I.,
Baraniuc O., Parfenov V.
|
Smartphone-Based
Identification of Dangerous Driving Situations: Algorithms and Implementation
|
306-313
|
Smirnova O., Tsvetkov M.
|
Maritime
Safety Monitoring On The Northern Sea Route
|
314-320
|
Stepanov A.
|
The
Application of Neural Network and Spline Wavelet Models in the
Electroencephalogram Analysis Automation Process
|
321-327
|
Stepanov D., Tishchenko I.
|
The
Concept of Video Surveillance System Based on the Principles of Stereo Vision
|
328-334
|
Suvorova
E., Sheynin Y., Matveeva
N.
|
Reconfigurable
NoC Development with Fault Mitigation
|
335-344
|
Tsvetkov L., Spivak A.
|
Utilizing
Type Systems for Static Vulnerability Analysis
|
345-350
|
Tupitsin
G., Topnikov A., Priorov
A.
|
Two-Step
Noise Reduction Based on Soft Mask for Robust Speaker Identification
|
351-356
|
Viksnin
I., Drannik A., Iureva
R.,
Komarov I.
|
Flocking
Factors' Assessment in Case of Destructive Impact on Swarm Robotic Systems
|
357-363
|
Viksnin
I., Iureva R., Komarov
I.,
Drannik A.
|
Assessment
of Stability of Algorithms Based on Trust and Reputation Model
|
364-369
|
Viola F., D’Elia A., Roffia
L., Cinotti T.
|
A
Modular Lightweight Implementation of the Smart-M3 Semantic Information
Broker
|
370-377
|
Voloshina
N., Bezzateev S., Prudanov
A.,
Vasilev M., Gorbunov A.
|
Effectiveness
of LSB and MLSB Information Embedding for BMP Images
|
378-384
|
Vorobeva A.
|
Examining
the Performance of Classification Algorithms for Imbalanced Data Sets in Web
Author Identification
|
385-390
|
Zabrovskiy
A., Kuzmin E., Petrov E.,
Fomichev M.
|
Emulation
of Dynamic Adaptive Streaming over HTTP with Mininet
|
391-396
|
Zikhratov
I., Pantiukhin I., Krivtsova
I.,
Druzhinin N.
|
The Method
of Elf-Files Identification Based on the Metric Classification Algorithms
|
397-403
|
Zikhratov
I., Pantiukhin I., Sizykh
A.
|
The Method
of Classification of User and System Data Based on the Attributes
|
404-409
|
Zubok
D., Kharchenko T., Maiatin
A.,
Khegai M.
|
A Multi-Agent
Approach to Monitoring of Cloud Computing System With Dynamically Changing
Configuration
|
410-416
|