Fuzzy automaton finite state recognition D. V. Speransky OriginalPaper 25 October 2012 Pages: 185 - 190
Investigation of simulation-based verification methods for descriptions with functional indeterminacy D. Ya. NovikovL. D. Cheremisinova OriginalPaper 25 October 2012 Pages: 191 - 199
The base model of role-based access control and the “cost-risk” criterion of data processing M. V. Shakhanova OriginalPaper 25 October 2012 Pages: 200 - 206
An algebraic method for synthesizing fast algorithms of discrete cosine transform of arbitrary size M. I. VashkevichA. A. Petrovsky OriginalPaper 25 October 2012 Pages: 207 - 213
A two-stage method for building classifiers A. LorencsYu. Sinitsa-Sinyavskis OriginalPaper 25 October 2012 Pages: 214 - 222
Data positioning as an instrument of constructive data compression N. K. Kasumov OriginalPaper 25 October 2012 Pages: 223 - 231
The adaptive “up-and-down” method with a variable step V. Karklinsh OriginalPaper 25 October 2012 Pages: 232 - 237