default search action
Programming and Computer Software, Volume 41
Volume 41, Number 1, January 2015
- Igor B. Bourdonov, Alexander S. Kossatchev, Victor V. Kulyamin:
Parallel computations on a graph. 1-13 - V. T. Zhukov, Mikhail M. Krasnov, N. D. Novikova, O. B. Feodoritova:
Multigrid effectiveness on modern computing architectures. 14-22 - Igor V. Mashechkin, Mikhail Petrovskiy, D. S. Popov, Dmitry V. Tsarev:
Applying text mining methods for data loss prevention. 23-30 - Y. I. Klimiankou:
A method for supporting runtime environments simultaneously served by multiple memory managers for operating systems based on second-generation microkernel. 31-40 - Valery A. Nepomniaschy, Evgeny V. Bodin, S. O. Veretnov:
The language dynamic-real and its application for verification of SDL-specified distributed systems. 41-48 - Ilja S. Zakharov, Mikhail U. Mandrykin, Vadim S. Mutilin, Evgeny Novikov, Alexander K. Petrenko, Alexey V. Khoroshilov:
Configurable toolset for static verification of operating systems kernel modules. 49-64
Volume 41, Number 2, March 2015
- Sergei A. Abramov:
Search of rational solutions to differential and difference systems by means of formal series. 65-73 - Alexander B. Batkhin, Alexander D. Bruno:
Investigation of a real algebraic surface. 74-83 - A. I. Zobnin, M. A. Limonov:
Algorithm for checking triviality of "mixed" ideals in the ring of differential polynomials. 84-89 - A. A. Panferov:
Differential equation systems with selected part of the unknowns. 90-97 - Alexander N. Prokopenya:
Simulation of a quantum algorithm for phase estimation. 98-104 - François Boulier, Maoan Han, François Lemaire, Valery G. Romanovski:
Qualitative investigation of a gene model using computer algebra algorithms. 105-111 - Anna A. Ryabenko:
On exponential-logarithmic solutions of linear differential systems with power series coefficients. 112-118 - E. S. Shemyakova:
Invertible Darboux transformations of type I. 119-125 - D. A. Yanovich:
Compact representation of polynomials for algorithms for computing Gröbner and involutive bases. 126-130
Volume 41, Number 3, May 2015
- Dmitriy Bushin, Irina B. Virbitskaite:
Comparative trace semantics of time Petri nets. 131-139 - Natalya Olegovna Garanina, Elena A. Sidorova:
Ontology population as algebraic information system processing based on multi-agent natural language text analysis algorithms. 140-148 - Sergei A. Grechanik:
Proving properties of functional programs by equality saturation. 149-161 - Pavel G. Emelyanov, Denis K. Ponomaryov:
Algorithmic issues of AND-decomposition of boolean formulas. 162-169 - Ilya G. Klyuchnikov, Sergei A. Romanenko:
Supercompilation for Martin-Lof's type theory. 170-182 - Ilja S. Zakharov, Vadim S. Mutilin, Alexey V. Khoroshilov:
Pattern-based environment modeling for static verification of Linux kernel modules. 183-195
Volume 41, Number 4, July 2015
- Mikhail U. Mandrykin, Alexey V. Khoroshilov:
High-level memory model with low-level pointer cast support for Jessie intermediate language. 197-207 - Dmitrij V. Koznov, E. V. Larchik, Andrey N. Terekhov:
View to view transformations in domain specific modeling. 208-214 - Nikolay P. Varnovskiy, Sergey A. Martishin, Marina V. Khrapchenko, Alexander V. Shokurov:
Secure cloud computing based on threshold homomorphic encryption. 215-218 - Sergey B. Utkin, Svetlana V. Batova, Sergey A. Blagonravov, Pavel V. Konovalov, I. O. Zharinov:
Automated construction of software configuration tables for real-time systems in avionics. 219-223 - Artem Pelenitsyn:
Associated types and constraint propagation for generic programming in Scala. 224-230 - Alexey R. Nurmukhametov, Shamil F. Kurmangaleev, V. V. Kaushan, Sergey S. Gaissaryan:
Application of compiler transformations against software vulnerabilities exploitation. 231-236 - V. K. Koshelev, A. O. Izbyshev, I. A. Dudina:
Interprocedural taint analysis for LLVM-bitcode. 237-245
Volume 41, Number 5, September 2015
- Alexander E. Bondarev, Vladimir A. Galaktionov:
Multidimensional data analysis and visualization for time-dependent CFD problems. 247-252 - Alexei M. Gruzdev, Vladimir A. Frolov, Alexey V. Ignatenko:
Practical approach to the fast Monte-Carlo ray-tracing. 253-257 - Mikhail V. Kharinov:
Pixel clustering for color image segmentation. 258-266 - Dmitry S. Kozlov, Victor A. Debelov:
Algorithm for photorealistic rendering of transparent optically active isotropic crystals. 267-272 - A. V. Kvostikov, Andrey S. Krylov, U. R. Kamalov:
Ultrasound image texture analysis for liver fibrosis stage diagnostics. 273-278 - L. M. Mestetskii:
Representation of segment Voronoi diagram by Bezier curves. 279-288 - Mikhail V. Mikhaylyuk, Piotr Y. Timokhin, M. A. Torgashev:
The method of real-time implementation of tone mapping and bloom effect. 289-294 - Dmitry D. Zhdanov, A. A. Garbul, Igor Stanislavovich Potemin, Alexey G. Voloboy, Vladimir A. Galaktionov, Sergey V. Ershov, V. G. Sokolov:
Photorealistic volume scattering model in the bidirectional stochastic ray tracing problem. 295-301 - Roman Pastukhov, Anton Korshunov, D. Yu. Turdakov, Sergei D. Kuznetsov:
Improving quality of graph partitioning using multi-level optimization. 302-306
Volume 41, Number 6, November 2015
- Igor B. Bourdonov, Alexander S. Kossatchev, Victor V. Kulyamin:
Analysis of a graph by a set of automata. 307-310 - Alexander S. Kamkin:
Projecting transition systems: Overcoming state explosion in concurrent system verification. 311-324 - Dmitry Yu. Volkanov, Vladimir A. Zakharov, Daniil A. Zorin, Vladislav V. Podymov, Igor V. Konnov:
A combined toolset for the verification of real-time distributed systems. 325-335 - N. A. Astrakhantsev, Denis G. Fedorenko, D. Yu. Turdakov:
Methods for automatic term recognition in domain-specific text collections: A survey. 336-349 - Constantin S. Pan, Mikhail L. Zymbler:
Encapsulation of partitioned parallelism into open-source database management systems. 350-360 - Nikolay P. Varnovskiy, Vladimir A. Zakharov, Nikolay N. Kuzyurin, Alexander V. Shokurov:
The current state of art in program obfuscations: definitions of obfuscation security. 361-372 - Vartan A. Padaryan, V. V. Kaushan, A. N. Fedotov:
Automated exploit generation for stack buffer overflow vulnerabilities. 373-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.