


default search action
Automatic Control and Computer Sciences, Volume 46
Volume 46, Number 1, February 2012
- Vladimir A. Bashkin

:
Modular nets of active resources. 1-11 - M. Broitman, N. Shilinskii, K. Solovyov:

Adaptive management algorithms for a fixed jitter buffer. 12-17 - Modris Greitans

, Vladimir N. Aristov, T. Laimina:
Application of the Karhunen-Loeve transformation in bio-radiolocation: Breath simulation. 18-24 - A. V. Zelenkov, D. Liepkalns, A. Yershov, A. Maklakovs:

Development and experimental validation of automatic radar recorder of the number and speed of vehicles for opposite traffic directions. 25-33 - V. Karklinsh:

The "up-and-down" method with a variable step in digital sampling conversion. 34-40 - A. V. Ostrouh, N. G. Kuftinova:

Automation of planning and management of the transportation of production for food-processing industry enterprises. 41-48 - N. I. Sulima:

Probabilistic model of overbooking for an airline. 49-56
Volume 46, Number 2, April 2012
- Arnis Kirshners

, Edgars Liepinsh
, Serge Parshutin
, Janis Kuka
, Arkady Borisov:
Risk prediction system for pharmacological problems. 57-65 - Ya. N. Imamverdiev, Lyudmila V. Sukhostat

:
A method for cryptographic key generation from fingerprints. 66-75 - Aleksandrs Ipatovs

, Nikolajs Bogdanov
, Ernests Petersons
:
Evaluation of the rate of the data transfer between vehicles and base stations in wireless networks. 76-82 - Manfred Schneps-Schneppe:

M2M communications based on the M-Bus protocol. 83-89 - Dmitrii V. Speranskii:

Interval statement of the input word recognition problem for a linear machine. 90-94
Volume 46, Number 3, May 2012
- Gazanfar A. Rustamov:

Constructing quasi-invariant control systems based on the Lyapunov function method for nonlinear plants with an incomplete mathematical model. 95-102 - Vladimir A. Bogatyrev

, S. V. Bogatyrev, I. Yu. Golubev:
Optimization and the process of task distribution between computer system clusters. 103-111 - V. N. Boicov:

Customer flows in a network with two types of service. 112-118 - V. S. Mukha:

Linear procrustes transformation for letter recognition. 119-129 - N. M. Ivanov:

Adaptive spatial processing of electromagnetic field signals in antenna arrays. 130-138 - K. Kruminsh, V. Plotsinsh:

Signal distortions in comparator pulse gate transformation using the statistical method for a low number of samples. 139-145
Volume 46, Number 4, July 2012
- A. B. Sizonenko:

A high-performance algorithm for calculating conjunctive and disjunctive terms in polynomial representations of Boolean functions. 147-156 - Vitaly I. Levin:

Optimization in terms of interval uncertainty: The determinization method. 157-163 - Fikrat G. Feyziyev, Mehrdad Arablu Babavand Aslan:

Description of decoding of cyclic codes in the class of sequential machines based on the Meggitt theorem. 164-169 - Aleksandra R. Eremina, Yu. V. Malinkovskii

:
Invariance of the stationary distribution of states of networks with multimode service, different types of requests, and discriminatory processor sharing. 170-178 - Modris Greitans

, Vladimir N. Aristov:
Conservation of the law of phase modulation for UWB pulse signals in the first principal component. 179-184
Volume 46, Number 5, September 2012
- D. V. Speransky:

Fuzzy automaton finite state recognition. 185-190 - Dmitry Ya. Novikov, Liudmila D. Cheremisinova:

Investigation of simulation-based verification methods for descriptions with functional indeterminacy. 191-199 - M. V. Shakhanova:

The base model of role-based access control and the "cost-risk" criterion of data processing. 200-206 - Maxim Vashkevich

, Alexander A. Petrovsky:
An algebraic method for synthesizing fast algorithms of discrete cosine transform of arbitrary size. 207-213 - Aivars Lorencs, Yuris Sinitsa-Sinyavskis:

A two-stage method for building classifiers. 214-222 - N. K. Kasumov:

Data positioning as an instrument of constructive data compression. 223-231 - V. Karklinsh:

The adaptive "up-and-down" method with a variable step. 232-237
Volume 46, Number 6, November 2012
- M. A. Gladshtein:

Quantum-dot cellular automata serial decimal subtractors. 239-247 - Alexander N. Sychev

:
Composition of logical switching networks in neural structures. 248-260 - Aldis Baums:

Indicators of the real time of a mobile autonomous robot. 261-267 - S. G. Kerimov, G. S. Kerimova:

Methods and means for arranging information content searches. 268-272 - V. N. Boicov:

Evaluation of network transport services objects. 273-279 - K. Kruminsh, V. Plotsinsh:

Adaptive k-up-and-down method for comparator type equivalent time conversion of UWB radar signals. 280-287 - A. S. Rybakov:

Compression functions used in the algorithms for the estimation of signal arrival time under high-precision event timing. 288-298
Volume 46, Number 7, December 2012
- Igor S. Anureev

:
Typical examples of using the atoment language. 299-307 - M. M. Atuchin, Igor S. Anureev

:
Attribute annotations and their use in C program deductive verification. 308-316 - Vladimir A. Bashkin

:
Approximating bisimulation in one-counter nets. 317-323 - Mikhail A. Belyaev

, V. A. Tsesko:
LLVM-based static analysis tool using type and effect systems. 324-330 - Natalya Olegovna Garanina:

Optimisation procedures in affine model checking. 331-337 - M. I. Glukhikh, Vladimir M. Itsykson

, V. A. Tsesko:
Using dependencies to improve precision of code analysis. 338-344 - Dmitry Anatoly Zaitsev

:
Inhibitor Petri net executing an arbitrary given Markov normal algorithm. 345-355 - Alexey V. Zakharov, Mikhail J. Moiseev:

Automatic data race detection in SystemC models. 356-363 - A. V. Klimov:

A simple algorithm for solving the coverability problem for monotonic counter systems. 364-370 - Sergey Baranov, Vsevolod Kotlyarov:

A formal application model for code and test generation. 371-378 - Natalia Kushik

, Amel Mammar, Ana R. Cavalli, Nina Yevtushenko, Willy Jimenez, Edgardo Montes de Oca
:
A SPIN-based approach for detecting vulnerabilities in C programs. 379-386 - Dmitri M. Beloglazov, Mikhail Mashukov, V. A. Nepomnyashchiy:

Verification of telecommunication systems specified using communicating finite-state automata using colored Petri nets. 387-393 - Alexey V. Promsky

:
C program verification: Verification condition explanation and standard library. 394-401 - Nikolay V. Shilov

:
Verification of backtracking and branch and bound design templates. 402-409

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














