


default search action
18th FRUCT 2016: St-Petersburg, Russia
- 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology, FRUCT 2016, St-Petersburg, Russia, April 18-22, 2016. IEEE 2016, ISBN 978-9-5268-3973-8

- Ainur Abdrashitov, Anton Spivak:

Sensor data anonymization based on genetic algorithm clustering with L-Diversity. 3-8 - Alexander P. Antonov

, Alexey S. Filippov, Olga V. Mamoutova
:
Next generation FPGA-based platform for network security. 9-14 - Sergey Baranov, Victor Nikiforov:

The impact of blocking factor on real-time applications feasibility. 15-20 - Sergey Baranov:

Real-time multi-task simulation in Forth. 21-26 - Nurzhan Bazhayev, Ilya Lebedev

, Irina E. Krivtsova, Igor A. Zikratov:
Research availability of devices based on wireless networks. 27-32 - Kirill Chuvilin

:
Machine learning approach to automated correction of ETgX documents. 33-40 - Pavel Dovgalyuk, Denis Dmitriev, Vladimir Makarov:

Platform-independent reverse debugging of the virtual machines. 41-47 - Radek Fujdiak

, Pavel Masek, Petr Mlynek
, Jiri Misurec, Ammar Muthanna
:
Advanced optimization method for improving the urban traffic management. 48-53 - Marsel Galimullin, Eugeny Kalishenko, Nikolay Rapotkin:

Performance analysis of thread synchronization strategies in concurrent data structures based on flat-combining. 54-59 - Ludmila I. Gerasimova-Meigal

, Anna Fedosova, Alexander Meigal
:
Hand skin temperature: A usability for health care services. 60-65 - René Haberland, Kirill Krinkin

, Sergey Ivanovskiy:
Abstract predicate entailment over points-to heaplets is syntax recognition. 66-74 - Anton Ivaschenko, Nikolay Gorbachenko, Alexandr Kolsanov

, Andrey Kuzmin
:
Surgery scene representation in 3D simulation training SDK. 75-84 - Anton Ivaschenko, Andrey Lednev, Alfiya Diyazitdinova:

P2P outsourcing model for agile project tasks allocation. 85-91 - Alexey M. Kashevnik

, Nikolay Teslya
, Eugeny Yablochnikov, Valery Arckhipov, Kirill Kipriyanov
:
Hybrid automated line workstations interaction scenario for optical devices assembly. 92-99 - Anatoly D. Khomonenko

, Sergey I. Gindin:
Performance evaluation of cloud computing accounting for expenses on information security. 100-105 - Vyacheslav P. Klimentyev, Alexander B. Sergienko

:
Detection of SCMA signal with channel estimation error. 106-112 - Maxim Kolchin, Nikolay Klimov, Ivan Shilin, Daniil Garayzuev, Alexey Andreev:

Unequal temperature changes in city: A case study using a semantic IoT platform. 113-119 - Maria Komar, Sviatoslav Edelev, Yevgeni Koucheryavy

:
Handheld wireless authentication key and secure documents storage for the Internet of Everything. 120-130 - Aleksey Kondratyev, Igor Tishchenko:

Concept of distributed processing system of images flow in terms of π-calculus. 131-137 - Dmitry G. Korzun

, Sergey A. Marchenkov, Andrey S. Vdovenko, Andrey N. Borodulin, Sergey I. Balandin
:
Performance evaluation of smart-M3 applications: A SmartRoom case study. 138-144 - Kirill A. Kulakov

, Oksana B. Petrina, Dmitry G. Korzun
, Aleksey G. Varfolomeyev:
Towards an understanding of smart service: The case study for cultural heritage e-Tourism. 145-152 - Maxim Lapaev:

Automated extraction of concept matcher thesaurus from semi-structured catalogue-like sources of data on the web. 153-160 - Anton Lebedev

, Vladimir A. Pavlov, Vladimir V. Khryashchev
, Olga Stepanova:
Face detection algorithm based on a cascade of ensembles of decision trees. 161-166 - Ilya Lebedev

, Viktoria M. Korzhuk, Irina E. Krivtsova, Kseniya I. Salakhutdinova, Mikhail E. Sukhoparov
, Daniil Tikhonov:
Using preventive measures for the purpose of assuring information security of wireless communication channels. 167-173 - Nikolai Lebedev, Ivan Timofeev, Iuliia Zavialova:

Design and implementation of the first aid assistance service based on Smart-M3 platform. 174-180 - Alla Levina

, Daria Sleptsova, Oleg Zaitsev:
Side-channel attacks and machine learning approach. 181-186 - Alla Levina

, Sergey V. Taranov
:
New construction of algebraic manipulation detection codes based on wavelet transform. 187-192 - Anton Makarov

, Elena S. Yakovleva:
Comparative analysis of halftoning algorithms for digital watermarking. 193-199 - Pavel Masek, Radek Fujdiak

, Krystof Zeman
, Jiri Hosek
, Ammar Muthanna
:
Remote networking technology for IoT: Cloud-based access for AllJoyn-enabled devices. 200-205 - Oleg Maslennikov, Igor Komarov

:
Efficiency metrics for flocking with implicit leadership. 206-211 - Nikolay A. Moldovyan, Andrey N. Berezin, Anatoly Kornienko

, Alexander A. Moldovyan:
Bi-deniable public-encryption protocols based on standard PKI. 212-219 - Dmitry Namiot

, Manfred Sneps-Sneppe:
On physical web browser. 220-225 - Andrey Noskov, Elena Aminova, Vladimir Volokhov:

Comparison of image focus assessment methods for multi-focused image construction. 226-232 - Valentin Olenev, Elena Podgornova, Irina Lavrovskaya:

Protocol for deterministic data delivery in SpaceWire networks. 233-240 - Antonino Orsino

, Aleksandr Ometov
:
Validating information security framework for offloading from LTE onto D2D links. 241-247 - Sergey Osmolovskiy, Ekaterina Ivanova, Daniil Shakurov, Ivan Fedorov, Vladimir Vinogradov:

Hierarchical real-time scheduling for multicore systems. 248-256 - Sergey Osmolovskiy, Ivan Fedorov, Vladimir Vinogradov, Ekaterina Ivanova, Daniil Shakurov:

Mixed-criticality scheduling in real-time multiprocessor systems. 257-265 - Vladimir V. Palagushin, Anatoly D. Khomonenko

, Sergey E. Adadurov:
Evaluation of cryptographic primitives security based on proximity to the Latin square. 266-271 - Andrew Ponomarev

:
Recommending tourist locations based on data from photo sharing service: Method and algorithm. 272-278 - Konstantin Purtov, Vladimir S. Kublanov

, Anna Petrenko
, Timur S. Petrenko:
Remote photoplethysmography application to the analysis of time-frequency changes of human heart rate variability. 279-284 - Aleksandr Romanov

, Aleksandr Ivannikov:
SystemC NoC simulation as the alternative to the HDL and high-level modeling. 285-290 - Marina Sergeeva, Igor Ryabchikov

, Mark Glaznev, Natalia F. Gusarova
:
Classification of pulmonary nodules on computed tomography scans. Evaluation of the effectiveness of application of textural features extracted using wavelet transform of image. 291-299 - Vladimir Sharov, Oleg Bolshakov, Alexander Petrov:

Cross-platform programs implementation for specialized distributed embedded systems. 300-305 - Alexander V. Smirnov, Alexey M. Kashevnik

, Igor Lashkov
, Olesya Baraniuc, Vladimir Parfenov:
Smartphone-based identification of dangerous driving situations: Algorithms and implementation. 306-313 - Oksana Smirnova

, Misha Tsvetkov:
Maritime safety monitoring on the Northern Sea Route. 314-320 - Andrey B. Stepanov

:
The application of neural network and spline wavelet models in the electroencephalogram analysis automation process. 321-327 - Dmitry Stepanov, Igor Tishchenko:

The concept of video surveillance system based on the principles of stereo vision. 328-334 - Elena Suvorova, Yuriy Sheynin, Nadezhda Matveeva:

Reconfigurable NoC development with fault mitigation. 335-344 - Lavrentii Tsvetkov, Anton Spivak:

Utilizing type systems for static vulnerability analysis. 345-350 - Gennadiy Tupitsin, Artem Topnikov

, Andrey Priorov
:
Two-step noise reduction based on soft mask for robust speaker identification. 351-356 - Ilya I. Viksnin, Anastasia L. Drannik, Radda A. Iureva

, Igor I. Komarov
:
Flocking factors' assessment in case of destructive impact on swarm robotic systems. 357-363 - Ilya I. Viksnin, Radda A. Iureva

, Igor I. Komarov
, Anastasia L. Drannik:
Assessment of stability of algorithms based on trust and reputation model. 364-369 - Fabio Viola, Alfredo D'Elia

, Luca Roffia
, Tullio Salmon Cinotti
:
A modular lightweight implementation of the Smart-M3 semantic information broker. 370-377 - Natalia Voloshina

, Sergey Bezzateev, Anton Prudanov, Mikhail Vasilev, Anton Gorbunov:
Effectiveness of LSB and MLSB information embedding for BMP images. 378-384 - Alisa A. Vorobeva

:
Examining the performance of classification algorithms for imbalanced data sets in web author identification. 385-390 - Anatoliy Zabrovskiy, Evgeny Kuzmin, Evgeny Petrov, Mikhail Fomichev:

Emulation of dynamic adaptive streaming over HTTP with Mininet. 391-396 - Igor A. Zikratov, Igor Pantiukhin, Irina E. Krivtsova, Nikita Druzhinin:

The method of elf-files identification based on the metric classification algorithms. 397-403 - Igor A. Zikratov, Igor Pantiukhin, Anna Sizykh:

The method of classification of user and system data based on the attributes. 404-409 - Dmitrii A. Zubok, Tatiana V. Kharchenko, Aleksandr V. Maiatin, Maksim V. Khegai:

A multi-agent approach to the monitoring of cloud computing system with dynamically changing configuration. 410-416

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














