|
 |
2015 Volume
6
Issue 2
Clicking on a menu header directs you to the abstracts of papers. Each
abstract is preceded by an assigned number, submission date, and the
number of A5 pages contained in the paper.
Please use the PDF icon to open the PDF version of the paper.
|
- Chudinov S., Kolesnikov M. Verification of high-level resources
in a distributed computing environment to re-address the project
objectives ensure signal integrity
DOI:
https://doi.org/10.25209/2079-3316-2015-6-2-19-27
- Abramov N., Fralenko V. Computersystems security threats:
classification, sources of origin and counteraction methods
DOI:
https://doi.org/10.25209/2079-3316-2015-6-2-63-83
- Kulakova Ye., Spitsina A., Orlova N., Dergilev A., Svichkarev
A., Safronova N., Chernykh, I., Orlov Yu. Supercomputer analysis
of genomics and transcriptomics data revealed by high-throughput DNA
sequencing
DOI:
https://doi.org/10.25209/2079-3316-2015-6-2-129-148
|
|
|
|
|