| |
| |
From a logic map to a fuzzy expert system for the description of the Middle East destabilization | |
| |
| |
| |
A fuzzy expert system for auction reserve prices | |
| |
| |
| |
Vessel traffic optimization using a linear model with fuzzy coefficients | |
| |
| |
| |
Variable precision rough sets | |
| |
| |
| |
Application of rough sets in the presumptive diagnosis of urinary system diseases | |
| |
| |
| |
Neural networks and their economic applications | |
| |
| |
| |
Application of data with missing attributes in the probability rbf neural network learning and classification | |
| |
| |
| |
A method of investigating a significance of input variables in non-linear high-dimensional systems | |
| |
| |
| |
Evolutionary algorithm in problem of avoidance collision at sea | |
| |
| |
| |
Improvement and evaluation of autonomous load distribution method | |
| |
| |
| |
Idea of the national system of education and verification traffic's knowledge as a tool of traffic safety increasing | |
| |
| |
| |
Distribution of resources by means of multi-agent simulation based on incomplete information | |
| |
| |
| |
A multi-agent approach to modeling and simulation of transport on demand problem | |
| |
| |
| |
Practical realization of modelling an airplane for an intelligent tutoring system | |
| |
| |
| |
Model of natural language communication system for virtual market of services | |
| |
| |
| |
Models of integration in decision support systems | |
| |
| |
| |
Object classification and recognition using toeplitz matrices | |
| |
| |
| |
A propositional logic for access control policy in distributed systems | |
| |
| |
| |
Certificate-based access control policies description language | |
| |
| |
| |
Encryption using two-dimensional cellular automata with applications | |
| |
| |
| |
Secure data storing in a pool of vulnerable servers | |
| |
| |
| |
On automatic secret generation and sharing for Karin-Greene-Hellman scheme | |
| |
| |
| |
The FSR-255 family of hash functions with a variable length of hash result | |
| |
| |
| |
Using backward strategy to the Needham-Schroeder public key protocol verification | |
| |
| |
| |
OF-FMEA : an approach to safety analysis of object-oriented software intensive systems | |
| |
| |
| |
Providing for continuous risk management in distributed software projects | |
| |
| |
| |
About some application of risk analysis and evaluation | |
| |
| |
| |
Linear approximation of arithmetic sum function | |
| |