


default search action
Programming and Computer Software, Volume 41
Volume 41, Number 1, January 2015
- Igor B. Bourdonov

, Alexander S. Kossatchev
, Victor V. Kulyamin:
Parallel computations on a graph. 1-13 - V. T. Zhukov, Mikhail M. Krasnov

, N. D. Novikova, O. B. Feodoritova:
Multigrid effectiveness on modern computing architectures. 14-22 - Igor V. Mashechkin, Mikhail Petrovskiy

, D. S. Popov, Dmitry V. Tsarev:
Applying text mining methods for data loss prevention. 23-30 - Y. I. Klimiankou:

A method for supporting runtime environments simultaneously served by multiple memory managers for operating systems based on second-generation microkernel. 31-40 - Valery A. Nepomniaschy, Evgeny V. Bodin, S. O. Veretnov:

The language dynamic-real and its application for verification of SDL-specified distributed systems. 41-48 - Ilja S. Zakharov

, Mikhail U. Mandrykin, Vadim S. Mutilin
, Evgeny Novikov
, Alexander K. Petrenko
, Alexey V. Khoroshilov
:
Configurable toolset for static verification of operating systems kernel modules. 49-64
Volume 41, Number 2, March 2015
- Sergei A. Abramov

:
Search of rational solutions to differential and difference systems by means of formal series. 65-73 - Alexander B. Batkhin

, Alexander D. Bruno:
Investigation of a real algebraic surface. 74-83 - A. I. Zobnin, M. A. Limonov:

Algorithm for checking triviality of "mixed" ideals in the ring of differential polynomials. 84-89 - A. A. Panferov:

Differential equation systems with selected part of the unknowns. 90-97 - Alexander N. Prokopenya

:
Simulation of a quantum algorithm for phase estimation. 98-104 - François Boulier, Maoan Han, François Lemaire, Valery G. Romanovski

:
Qualitative investigation of a gene model using computer algebra algorithms. 105-111 - Anna A. Ryabenko

:
On exponential-logarithmic solutions of linear differential systems with power series coefficients. 112-118 - E. S. Shemyakova:

Invertible Darboux transformations of type I. 119-125 - D. A. Yanovich

:
Compact representation of polynomials for algorithms for computing Gröbner and involutive bases. 126-130
Volume 41, Number 3, May 2015
- Dmitriy Bushin, Irina B. Virbitskaite:

Comparative trace semantics of time Petri nets. 131-139 - Natalya Olegovna Garanina, Elena A. Sidorova:

Ontology population as algebraic information system processing based on multi-agent natural language text analysis algorithms. 140-148 - Sergei A. Grechanik:

Proving properties of functional programs by equality saturation. 149-161 - Pavel G. Emelyanov

, Denis K. Ponomaryov:
Algorithmic issues of AND-decomposition of boolean formulas. 162-169 - Ilya G. Klyuchnikov, Sergei A. Romanenko:

Supercompilation for Martin-Lof's type theory. 170-182 - Ilja S. Zakharov

, Vadim S. Mutilin
, Alexey V. Khoroshilov
:
Pattern-based environment modeling for static verification of Linux kernel modules. 183-195
Volume 41, Number 4, July 2015
- Mikhail U. Mandrykin, Alexey V. Khoroshilov

:
High-level memory model with low-level pointer cast support for Jessie intermediate language. 197-207 - Dmitrij V. Koznov, E. V. Larchik, Andrey N. Terekhov:

View to view transformations in domain specific modeling. 208-214 - Nikolay P. Varnovskiy, Sergey A. Martishin, Marina V. Khrapchenko, Alexander V. Shokurov:

Secure cloud computing based on threshold homomorphic encryption. 215-218 - Sergey B. Utkin, Svetlana V. Batova, Sergey A. Blagonravov, Pavel V. Konovalov, I. O. Zharinov:

Automated construction of software configuration tables for real-time systems in avionics. 219-223 - Artem Pelenitsyn:

Associated types and constraint propagation for generic programming in Scala. 224-230 - Alexey R. Nurmukhametov, Shamil F. Kurmangaleev, V. V. Kaushan, Sergey S. Gaissaryan:

Application of compiler transformations against software vulnerabilities exploitation. 231-236 - V. K. Koshelev, A. O. Izbyshev, I. A. Dudina:

Interprocedural taint analysis for LLVM-bitcode. 237-245
Volume 41, Number 5, September 2015
- Alexander E. Bondarev

, Vladimir A. Galaktionov:
Multidimensional data analysis and visualization for time-dependent CFD problems. 247-252 - Alexei M. Gruzdev, Vladimir A. Frolov

, Alexey V. Ignatenko:
Practical approach to the fast Monte-Carlo ray-tracing. 253-257 - Mikhail V. Kharinov

:
Pixel clustering for color image segmentation. 258-266 - Dmitry S. Kozlov, Victor A. Debelov:

Algorithm for photorealistic rendering of transparent optically active isotropic crystals. 267-272 - A. V. Kvostikov, Andrey S. Krylov

, U. R. Kamalov:
Ultrasound image texture analysis for liver fibrosis stage diagnostics. 273-278 - Leonid M. Mestetskii:

Representation of segment Voronoi diagram by Bezier curves. 279-288 - Mikhail V. Mikhaylyuk, Piotr Y. Timokhin

, M. A. Torgashev:
The method of real-time implementation of tone mapping and bloom effect. 289-294 - Dmitry D. Zhdanov

, A. A. Garbul, Igor Stanislavovich Potemin, Alexey G. Voloboy
, Vladimir A. Galaktionov, Sergey V. Ershov, V. G. Sokolov:
Photorealistic volume scattering model in the bidirectional stochastic ray tracing problem. 295-301 - Roman Pastukhov

, Anton Korshunov, D. Yu. Turdakov
, Sergei D. Kuznetsov:
Improving quality of graph partitioning using multi-level optimization. 302-306
Volume 41, Number 6, November 2015
- Igor B. Bourdonov

, Alexander S. Kossatchev
, Victor V. Kulyamin:
Analysis of a graph by a set of automata. 307-310 - Alexander S. Kamkin

:
Projecting transition systems: Overcoming state explosion in concurrent system verification. 311-324 - Dmitry Yu. Volkanov, Vladimir A. Zakharov, Daniil A. Zorin, Vladislav V. Podymov, Igor V. Konnov

:
A combined toolset for the verification of real-time distributed systems. 325-335 - N. A. Astrakhantsev, Denis G. Fedorenko, D. Yu. Turdakov

:
Methods for automatic term recognition in domain-specific text collections: A survey. 336-349 - Constantin S. Pan

, Mikhail L. Zymbler
:
Encapsulation of partitioned parallelism into open-source database management systems. 350-360 - Nikolay P. Varnovskiy, Vladimir A. Zakharov, Nikolay N. Kuzyurin, Alexander V. Shokurov:

The current state of art in program obfuscations: definitions of obfuscation security. 361-372 - Vartan A. Padaryan

, V. V. Kaushan, A. N. Fedotov:
Automated exploit generation for stack buffer overflow vulnerabilities. 373-380

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














