D.4.3 File Systems Management | Article |
A SURVEY OF MATHEMATICAL AND INFORMATIONAL FOUNDATIONS OF THE BIGARM ACCESS ... |
Abstract: The BigArM is an access method for storing and accessing Big Data. It is under
development. In this survey we present its mathematical and informational foundations as well as its
requirem |
D.4.3 File Systems Management | Article |
ADVANCE OF THE ACCESS METHODS |
Abstract: The goal of this paper is to outline the advance of the access methods in the last ten years as well as
to make review of all available in the accessible bibliography methods.
Keywords: |
D.4.6 Security and Protection | Article |
ANALYSIS OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS |
Abstract: In this paper a methodology for evaluation of information security of objects under attacks, processed
by methods of compression, is represented. Two basic parameters for evaluation of info |
D.4.6 Security and Protection | Article |
ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ... |
Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to
and within it, is made. Main techniques for accomplishing an attack to virtual enviro |
D.4.6 Security and Protection | Article |
ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ENVIRONMENT |
Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to
and within it, is made. Main techniques for accomplishing an attack to virtual enviro |
D.4.6 Security and Protection | Article |
APPLICATION OF METHODS OF MULTI-CRITERIA EVALUATION IN CHOOSING A METHOD ... |
Abstract: In this paper is proposed a model for researching the capability to influence, by selected methods’
groups of compression, to the co-efficient of information security of selected objects� |
D.4.8 Performance | Article |
APPLICATION OF SOME CYBERNETIC MODELS IN BUILDING INDIVIDUAL EDUCATIONAL ... |
Abstract. The individual educational trajectory (IET) is a medium-term didactic complex that provides optimal
opportunities for developing the creative potential of the learner by taking into account |
D.4.1 Process Management | Article |
BUILDING OF THE VIRTUAL ENVIRONMENT FOR GRID APPLICATIONS |
Abstract: The article considers the problems of configuring grid resources to perform computational
tasks in the grid environment. The technology of automated configuration environment to perform tas |
D.4.6 Security and Protection | Article |
CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES ... |
Abstract: This paper deals with the security problems of DRM protected e-learning content. After a short review
of the main DRM systems and methods used in e-learning, an examination is made of parti |
D.4.6 Security and Protection | Article |
CORRELATION-BASED PASSWORD GENERATION FROM FINGERPRINTS |
Abstract: In this paper, a methodology for reliable password generation from fingerprints is developed. In
contrast to traditional biometric systems, proposed algorithm does not authenticate user by |
D.4.6 Security and Protection | Article |
EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS ... |
Abstract: The principal methods of compression and different types of non-encrypted objects are described. An
analysis is made of the results obtained from examinations of the speed of compression fo |
D.4.3 File Systems Management | Article |
GENERAL STRUCTURE OF COLLECT/REPORT PARADIGM FOR STORING AND ACCESSING BIG DATA |
Abstract: The general structure of Collect/Report Paradigm (CRP) is outlined in this paper. CRP is a
new approach for storing and accessing large amounts of data. Main advantages of CRP are:
(1) col |
D.4.1 Process Management | Article |
GRID WORKFLOW DESIGN AND MANAGEMENT SYSTEM |
Abstract: Despite the increased development and use of grid-technologies for solving large-scale computational tasks in various scientific fields, the problem of complexity and efficiency of using dis |
D.4.m Miscellaneous | Article |
HTML VALIDATION THROUGH EXTENDED VALIDATION SCHEMA |
Abstract: The paper presents extensible software architecture and a prototype and an implementation of a highly
configurable system for HTML validation. It is based on validation rules defined in an |
D.4.6 Security and Protection | Article |
IMPROVING OF EXISTING PERMISSION SYSTEM IN ANDROID OS |
Abstract: Smartphones for last five-ten years had become ubiquitous. Despite the fact, that these small
devices are very widespread around the world - security are still being understood. As a result |
D.4.3 File Systems Management | Article |
INTRODUCTION TO STORING GRAPHS BY NL-ADDRESSING |
Abstract: This paper introduces an approach to storing graphs based on the Natural Language Addressing in
multidimensional numbered information spaces. A sample graph is analyzed to find its proper L |
D.4.3 File Systems Management | Article |
INTRODUCTION TO STORING GRAPHS BY NL-ADDRESSING |
Abstract: This paper introduces an approach to storing graphs based on the Natural Language Addressing in
multidimensional numbered information spaces. A sample graph is analyzed to find its proper N |
D.4.3 File Systems Management | Article |
INTRODUCTION TO THE NATURAL LANGUAGE ADDRESSING |
Abstract: Natural Language Addressing (NLA) is a possibility to access information using natural language words or phrases as direct addresses of the information in the computer memory. For this purpo |
D.4.6 Security and Protection | Article |
INVESTIGATING THE RELATIONS OF ATTACKS, METHODS AND OBJECTS ... |
Abstract: Possibilities for investigations of 43 varieties of file formats (objects), joined in 10 groups; 89
information attacks, joined in 33 groups and 73 methods of compression, joined in 10 grou |
D.4.6 Security and Protection | Article |
INVESTIGATION ON COMPRESSION METHODS USED AS A PROTECTION INSTRUMENT ... |
Abstract: This report examines important issues related to different ways to influence the information security of file objects, subjected to information attacks by the methods of compression. Accordi |
D.4.1 Process Management | Article |
MODELLING AND CONTROL OF COMPUTATIONAL PROCESSES USING MAX-PLUS ALGEBRA |
Abstract: In this paper we propose a modelling technique for the control of computational processes. The Petri
Net model, particularly a Timed Event Graph (TEG) can be used for analyzing. The propose |
D.4 OPERATING SYSTEMS | Article |
PASSIVE STEGANALYSIS OF MULTIDOMAIN EMBEDDING METHODS |
Abstract: The paper is devoted to analysis of effectiveness the usage of modern statistical model of
digital image for revealing the stego images with data, embedded in transformation domain of cover |
D.4.5 Reliability | Article |
Program Invariants Generation over Polynomial Ring using Iterative Methods. |
Abstract: A solution for program polynomial invariant generation problem is presented. An iteration upper approximation method that was successfully applied on free algebras in this paper was adopted |
D.4.6 Security and Protection | Article |
RESEARCH OF THE INFLUENCE OF METHODS OF COMPRESSION ON ... |
Abstract: In this paper a possibility for quantitative measuring of information security of objects, exposed to
information attacks and processed with methods of compression, is represented. A co-eff |