Risk prediction system for pharmacological problems A. KirshnersE. LiepinshA. Borisov OriginalPaper 04 May 2012 Pages: 57 - 65
A method for cryptographic key generation from fingerprints Ya. N. ImamverdievL. V. Sukhostat OriginalPaper 04 May 2012 Pages: 66 - 75
Evaluation of the rate of the data transfer between vehicles and base stations in wireless networks A. IpatovsN. BogdanovE. Petersons OriginalPaper 04 May 2012 Pages: 76 - 82
M2M communications based on the M-Bus protocol M. A. Schneps-Schneppe OriginalPaper 04 May 2012 Pages: 83 - 89
Interval statement of the input word recognition problem for a linear machine D. V. Speranskii OriginalPaper 04 May 2012 Pages: 90 - 94