|
End-to-end information flow security model for software-defined networks D. Ju. Chaly, E. S. Nikitin, E. Ju. Antoshina, V. A. Sokolov
|
735 |
|
Model oriented approach for industrial software development P. D. Drobintsev, V. P. Kotlyarov, N. V. Voinov, I. V. Nikiforov
|
750 |
|
Fast and safe concrete code execution for reinforcing static analysis and verification M. Belyaev, V. Itsykson
|
763 |
|
Loop invariants elimination for definite iterations over unchangeable data structures in C programs I. V. Maryasov, V. A. Nepomniaschy
|
773 |
|
Teaching formal models of concurrency specification and analysis N. V. Shilov
|
783 |
|
Formal diagonalisation of Lax–Darboux schemes A. V. Mikhailov
|
795 |
|
System runs analysis with process mining S. A. Shershakov, V. A. Rubin
|
818 |
|
Лингвостатистический анализ терминологии для построения тезауруса предметной области М. С. Каряева
|
834 |
|
Разработка активного внешнего модуля сетевой топологии для контроллера программно-конфигурируемой сети Floodlight А. А. Носков, М. А. Никитинский, И. В. Алексеев
|
852 |