• Особенности использования и защиты облачных инфраструктур и применение службы федераций Active Directory для задач аутентификации. Анализ результатов внедрения технологии ADFS. Угрозы информационной безопасности при использовании облачных вычислений.

    статья (331,5 K)
  • Основные возможности Adobe Acrobat. Быстрая печать и просмотр в режиме он-лайн. Приложение Adobe Acrobat eBook Reader 2.0. Достоинства применения формата PDF в сравнении с LIT. Особенности подхода Adobe к продуктам для чтения и распространения еBook.

    реферат (303,0 K)
  • Инструменты выделения и рисования. Магнитное лассо, "волшебная палочка", многоугольное лассо, пересадка голов", замена фона, градиентная заливка, "переодевание очков". Раскрашивание черно-белого изображения. Перевод цветного изображения в черно-белое.

    лабораторная работа (7,6 M)
  • Web Service Composition (WSC) is a process that helps to save much programming and cost effort by reusing existing components – web services. This paper presents an overview of current state-of-the-art Web Service Discovery and Selection methods.

    статья (93,1 K)
  • In this book offered a collection of the latest contributions to the area of computational intelligence applications to fault diagnosis. The book contains 10 chapters. Each of the chapters focuses on some theoretical aspects of intelligence methodologies.

    книга (6,5 M)
  • Cryptanalysis of countermeasures proposed for repairing. Security analysis of the gennaro-halevi-rabin signature scheme. Authenticated key exchange secure against dictionary attacks. The modern security aspects of practical quantum cryptography.

    курс лекций (5,2 M)
  • Factoring and discrete logarithm. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. Authenticate key exchange secure against dictionary attacks. Computing inverses over a shared secret modulus.

    курс лекций (5,2 M)
  • The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Programmable Hash Functions and Their Applications. Adaptive One-Way Functions and Applications. Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys. Cryptanalysis of MinRank.

    книга (5,6 M)
  • Show that computing e-th roots modulo n is easier than factoring n with currently known methods, given subexponential access to an oracle outputting the roots of numbers of the form xi + c. The strategy – a general outline. Polynomial construction.

    курс лекций (5,3 M)
  • Freedom of access to the global network. Ease of use compared with the library. The Internet is a cost-effective source of research and self-knowledge and confidence. Language tools that have the potential to translate pages. Disadvantages of the network.

    презентация (728,1 K)
  • A Bayesian algorithm for determining the statistical accuracy factor, which can be used to estimate the accuracy characteristics of on-board automatic landing system on the stage of operational control. Solution of the statistical accuracy problem.

    статья (336,9 K)
  • Hereditary Information and Protein Biosynthesis. Gel Electrophoresis and Direct Sequencing. Generalized Sux Trees and the Substring Problem. Ecient Computation of Overlaps. Denition and Scoring of Multiple Alignments. The FASTA and BLAST Heuristic.

    учебное пособие (3,6 M)
  • A bird's-eye view of modern cryptography. Preliminaries and Defining security in cryptography. Elementary number theory and algebra background. Approximations using partial Greatest common divisors computations. Birthday-based algorithms for functions.

    книга (2,5 M)
  • The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.

    статья (475,1 K)
  • Cryptography is the science of using mathematics to encrypt and decrypt data. PGP data compression routines, the random numbers used as session keys, the message digest. Compromised passphrase and private key. Protecting against bogus timestamps.

    дипломная работа (812,1 K)
  • To develop an extension to a traditional RDF model of describing knowledge graph in accordance with the standards of the Semantic Web. The concept of Executable Knowledge for Protege based on traditional types of properties within the RDF model.

    статья (1,6 M)
  • Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.

    книга (1,3 M)
  • An Introduction to Cryptography: Simple substitution ciphers, Divisibility and Common Divisors. Discrete Logarithms and Diffie–Hellman. The index calculus and discrete logarithms. Combinatorics, Probability and Information Theory, Digital Signatures.

    книга (4,2 M)
  • Basic Notions of Systems and Signals. State-space Models. Process Modeling for Control Purposes. Input–output Models and Realization Theory. Controllability and Observability of LTI Systems. Stability and The Lyapunov Method. State Feedback Controllers.

    учебное пособие (1,6 M)
  • A new model of the take-off weight of the aircraft determining process and the weight distribution of passengers’ law. A simulation of the operations in the preparation for departure process. The effect of weight on the passenger aircraft alignment.

    статья (401,0 K)