nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Active Learning and Transfer Learning for Document Segmentation
|
Kiranov, D. M. |
|
|
|
7 |
p. 566-573 |
artikel |
2 |
A Model and Declarative Language for Specifying Binary Data Formats
|
Evgin, A. A. |
|
|
|
7 |
p. 469-483 |
artikel |
3 |
A Survey of Network Traffic Classification Methods Using Machine Learning
|
Getman, A. I. |
|
|
|
7 |
p. 413-423 |
artikel |
4 |
Automated Generation of Machine Instruction Decoders
|
Fokina, N. Yu. |
|
|
|
7 |
p. 390-397 |
artikel |
5 |
Cross-Lingual Transfer Learning in Drug-Related Information Extraction from User-Generated Texts
|
Sakhovskiy, A. S. |
|
|
|
7 |
p. 590-595 |
artikel |
6 |
Designing Interfaces for Classes of a Neural Network Graph Model
|
Karpov, Yu. L. |
|
|
|
7 |
p. 463-472 |
artikel |
7 |
Development of DSL Compilers for Specialized Processors
|
Sovetov, P. N. |
|
|
|
7 |
p. 541-554 |
artikel |
8 |
Dynamic Detection of Use-After-Free Bugs
|
Asryan, S. A. |
|
|
|
7 |
p. 365-371 |
artikel |
9 |
Effective Implementations of Topic Modeling Algorithms
|
Apishev, M. A. |
|
|
|
7 |
p. 483-492 |
artikel |
10 |
Exploratory Search for Scientific Articles
|
Nedumov, Y. R. |
|
|
|
7 |
p. 405-416 |
artikel |
11 |
Formal Rules to Produce Object Notation for EXPRESS Schema-Driven Data
|
Semenov, V. A. |
|
|
|
7 |
p. 455-468 |
artikel |
12 |
Integrating RBAC, MIC, and MLS in Verified Hierarchical Security Model for Operating System
|
Devyanin, P. N. |
|
|
|
7 |
p. 443-453 |
artikel |
13 |
Investigation of RISC-V
|
Frolov, V. A. |
|
|
|
7 |
p. 493-504 |
artikel |
14 |
Kotlin from the Point of View of Static Analysis Developer
|
Afanasyev, V. O. |
|
|
|
7 |
p. 549-558 |
artikel |
15 |
Loss Function for Training Models of Segmentation of Document Images
|
Perminov, A. I. |
|
|
|
7 |
p. 574-589 |
artikel |
16 |
Methods for Information Diffusion Analysis
|
Avetisyan, A. A. |
|
|
|
7 |
p. 372-380 |
artikel |
17 |
Next-Generation Intermediate Representations for Binary Code Analysis
|
Solovev, M. A. |
|
|
|
7 |
p. 424-437 |
artikel |
18 |
Occlusion Culling Algorithm Based on Software Visibility Checks
|
Gonakhchyan, V. I. |
|
|
|
7 |
p. 454-462 |
artikel |
19 |
On Effective Scheduling in Computing Clusters
|
Grushin, D. A. |
|
|
|
7 |
p. 398-404 |
artikel |
20 |
On the Possibility of Secure Program Obfuscation in Some Model of Cloud Computing
|
Shokurov, A. V. |
|
|
|
7 |
p. 473-482 |
artikel |
21 |
Parallelization of Implementations of Purely Sequential Algorithms
|
Bugerya, A. B. |
|
|
|
7 |
p. 381-389 |
artikel |
22 |
Path Querying with Conjunctive Grammars by Matrix Multiplication
|
Azimov, R. |
|
|
|
7 |
p. 357-364 |
artikel |
23 |
Perfect Sets of Paths in the Full Graph of SDN Switches
|
Burdonov, I. B. |
|
|
|
7 |
p. 505-514 |
artikel |
24 |
Performance Model of Graphics Pipeline for a One-Pass Rendering of 3D Dynamic Scenes
|
Gonakhchyan, V. I. |
|
|
|
7 |
p. 522-533 |
artikel |
25 |
Plagiarism Detection in Armenian Texts Using Intrinsic Stylometric Analysis
|
Yeshilbashian, Ye. M. |
|
|
|
7 |
p. 435-444 |
artikel |
26 |
Preventing Vulnerabilities Caused by Optimization of Code with Undefined Behavior
|
Baev, R. V. |
|
|
|
7 |
p. 445-454 |
artikel |
27 |
Runtime Verification of Operating Systems Based on Abstract Models
|
Efremov, D. V. |
|
|
|
7 |
p. 559-565 |
artikel |
28 |
Study of the Problem of Ensuring Security in Storage and Processing of Confidential Data
|
Martishin, S. A. |
|
|
|
7 |
p. 424-434 |
artikel |
29 |
Testing the Conformance of Implementations of the EAP Protocol and Its Methods to Internet Specifications
|
Nikeshin, A. V. |
|
|
|
7 |
p. 417-423 |
artikel |
30 |
Two-Stage Method for Grouping News with Similar Topics
|
Skorniakov, K. A. |
|
|
|
7 |
p. 534-540 |
artikel |
31 |
Verification of Compliance for Multilevel Models in Individual Trace Semantics
|
Khoroshilov, A. V. |
|
|
|
7 |
p. 515-521 |
artikel |