|
 |
2015 Volume
6
Issue 1
Clicking on a menu header directs you to the abstracts of papers. Each
abstract is preceded by an assigned number, submission date, and the
number of A5 pages contained in the paper.
Please use the PDF icon to open the PDF version of the paper.
|
|
- Mishchenko P., Gubarev V. The distributed computer system for training specialists of high
performance computing
DOI:
https://doi.org/10.25209/2079-3316-2015-6-1-39-49
- Smirnov S. Cloud system for program parameters fine tuning
DOI:
https://doi.org/10.25209/2079-3316-2015-6-1-51-60
- Vorobiev V, Ryzhkov S.R,,
Fatkieva R.R. Cloud computing security perimeter
DOI:
https://doi.org/10.25209/2079-3316-2015-6-1-61-71
- Tsvetkov A. Multiagent approach to the controlling of the operational
environment containing extremely large databases
DOI:
https://doi.org/10.25209/2079-3316-2015-6-1-83-97
- Nepejvoda N., Khatkevich M.,
Tsvetkov A. Rational agents as probabilistic automata
DOI:
https://doi.org/10.25209/2079-3316-2015-6-1-99-108
- Klimov Yu., Shvorin A., Khrenov
A., Adamovich I, Orlov A., Abramov S., Shevchuk Yu., Ponomarev A. Pautina: the High Performance Interconnect
DOI:
https://doi.org/10.25209/2079-3316-2015-6-1-109-120
- Kuznetsov A. On the cryptographic security of the “BotikKey” authentication
protocol against attacks on MD5 hash function
DOI:
https://doi.org/10.25209/2079-3316-2015-6-1-135-145
- Kuznetsov A. Research into the issue of BotikKey protocol resistance to the
brute force attack
DOI:
https://doi.org/10.25209/2079-3316-2015-6-1-147-156
- Spitsina A., Orlov Yu.,
Podkolodnaya N., Svichkarev A., Dergilev A., Ming Chen, Kuchin N.,
Chernykh I., Glinskij B. Supercomputer analysis of genomics and transcriptomics data
revealed by high-throughput DNA sequencing
DOI:
https://doi.org/10.25209/2079-3316-2015-6-1-157-174
|
|
|
|
|
|