Skip to main content

Abstract

As part of its strategic goals for technological development, the Russian Federation aims to create ultrahigh productivity supercomputer technologies or exascale computing by 2025. To this end, it is necessary to effectively develop domestic production of highly productive and trusted computer aids; to overcome physical limitations relating to energy consumption, reliability, and structural dimension of modern processors; and also to develop and implement effective organization of exascale calculation. Intensive research work is taking place in Russian research and education institutions to solve these scientific and technical problems [1–5].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.top500.org

  2. 2.

    https://www.top500.org/lists/2016/11

  3. 3.

    https://www.Graph500.org

  4. 4.

    http://www.sdsc.edu/pmac/papers/docs/dongarra2008darpa.pdf

  5. 5.

    http://www.jscc.ru/

  6. 6.

    http://www.nrcki.ru/

  7. 7.

    http://www.vniief.ru/

  8. 8.

    https://www.niisi.ru/

  9. 9.

    https://www.mcst.ru/

  10. 10.

    http://www.rdi-kvant.ru/Branches.aspx

  11. 11.

    http://www.kiam.ru/MVS/research

  12. 12.

    http://www.rosta.ru/about

  13. 13.

    http://www.t-platforms.ru/

  14. 14.

    Petrenko A. S., Petrenko S. A. Super-productive monitoring centers for security threats. Part 1 // Protection of information. Inside. - 2017. - No. 2. - P. 29-36

  15. 15.

    http://rskgroup.ru/

  16. 16.

    http://www.niagara.ru/about

  17. 17.

    http://immers.ru/

  18. 18.

    http://www.msu.ru/lomonosov/science/computer.html

  19. 19.

    hpc-russia.ru/

  20. 20.

    http://www.neuroscience.ru/showthread.php?t=5669

  21. 21.

    https://vestnik.utmn.ru/energy/spisok-avtorov/112622

  22. 22.

    http://www.mathnet.ru/php/archive.phtml?wshow=paper&jrnid=trspy&paperid=787&option_lang=

  23. 23.

    http://www.taso.pro/?page_id=416/

  24. 24.

    http://homotopytypetheory.org/book/

References

  1. Abramov, S.M.: Research in the field of supercomputer technologies of the IPS RAS: a retrospective and perspective. In: Proceedings of the International Conference “Software Systems: Theory and Applications”, vol. 1, pp. 153–192. Publishing house “University of Pereslavl”, Pereslavl (2009)

    Google Scholar 

  2. Guzik, V.F., Kalyaev, I.A., Levin, I.I.: Reconfigurable computing systems; [under the Society. ed. I.A. Kalyayeva], 472 p. Publishing house SFU, Rostov-on-Don (2016)

    Google Scholar 

  3. Kalyaev, I.A., Levin, I.I., Semernikov, E.A., Shmoilov, V.I.: Reconfigurable Multicopy Computing Structures; [under the Society. ed. I. A. Kaliayev]. 2nd edn, 344 p. Pub. House of the Southern Scientific Center RAS, Rostov-on-Don (2009)

    Google Scholar 

  4. Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 1. Protect. Inf. Inside. 2(74), 29–36 (2017)

    Google Scholar 

  5. Petrenko, S.A., Asadullin, A.Y., Petrenko, A.S.: Evolution of the von Neumann architecture. Protect. Inf. Inside. 2(74), 18–28 (2017)

    Google Scholar 

  6. Petrenko, A.S., Petrenko, S.A.: Designing of corporate segment SOPKA. Protect. Inf. Inside. 6(72), 48–50 (2016)

    Google Scholar 

  7. Petrenko, A.S., Petrenko, S.A.: Large data technologies (BigData) in the field of information security. Inf. Protect. Inside. 4(70), 82–88 (2016)

    Google Scholar 

  8. Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 2. Protect. Inf. Inside. 3(75), 48–57 (2017)

    Google Scholar 

  9. Petrenko, S.A., Kurbatov, V.A., Bugaev, I.A., Petrenko, A.S.: Cognitive system of early warning about computer attack. Protect. Inf. Inside. 3(69), 74–82 (2016)

    Google Scholar 

  10. Petrenko, S.A., Petrenko, A.S.: Lecture 12. Perspective tasks of information security. Intelligent information radiophysical systems. Introductory lectures [A. O. Armyakov and others; ed. S.F. Boev, D.D. Stupin, A.A. Kochkarova], pp. 155–166. MSTU them. N.E. Bauman, Moscow (2016)

    Google Scholar 

  11. Abramov, S.M., Lilitko, E.P.: State and prospects of ultra-high performance computing systems development. Inf. Technol. Comput. Syst. 2, 6–22 (2013)

    Google Scholar 

  12. Khomonenko, A.D., Tyrva, A.V., Bubnov, V.P.: Complex of programs for calculation of reliability and planning of software tests. Federal Service for Intellectual Property, Patents and Trademarks: Svid. about the state. reg. software for the computer № 2010615617. Moscow (2010)

    Google Scholar 

  13. Khoroshevsky, V.G.: Architecture of Computing Systems. MSTU Them, 520 p. N.E. Bauman, Moscow (2008)

    Google Scholar 

  14. Kurnosov, M.G.: Models and algorithms for embedding parallel programs in distributed computing systems: Doctoral thesis in Technical. Science, 177 p. Siberian State University of Telecommunications and Informatics, Novosibirsk (2008)

    Google Scholar 

  15. Levin, I.I., Dordopulo, A.I., Kalyaev, I.A., Doronchenko, Y.I., Razkladkin, M.K.: Modern and promising high-performance computing systems with reconfigurable architecture. Proceedings of the international scientific conference “Parallel Computing Technologies (PaVT’2015)”, Ekaterinburg, March 31–April 2, 2015, pp. 188–199. Publishing Center of SUSU, Chelyabinsk (2015)

    Google Scholar 

  16. Action plan. Document WSIS-03/GENEVA/DOC/5-R dated December 12, 2013. Geneva [Electronic resource]. Access mode: http://www.itu.int/dms_pub/itus/md/03/wsis/doc/S03-WSIS-DOC-0005*PDF-R.pdf

  17. Active Engagement, Modern Defence. Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organisation adopted by Heads of State and Government in Lisbon. November 19, 2010 [Electronic resource]. Access mode: http://www.nato.int/cps/en/SID-14EF0623-198FC77E/natolive/official_texts_68580.htm

  18. Advances in the field of information and telecommunications in the context of international security. Report of the UN Secretary-General. Document A/66/152 of 15 July 2011 [Electronic resource]. Access mode: http://www.un.org/en/documents/ods.asp?m=A/66/152

  19. Abramov, S.M.: History of development and implementation of a series of Russian supercomputers with cluster architecture. In: History of Domestic Electronic Computers. 2nd edn, Rev. and additional; color. Ill.: Publishing house “Capital Encyclopedia”, Moscow (2016)

    Google Scholar 

  20. Levin, V.K., et al.: Communication network MVS-express. Inf. Technol. Comput. Syst. 1C, 10–24 (2014)

    Google Scholar 

  21. Wiener, N.: Cybernetics, or Control and Communication in Animal and Machine. 2nd edn, 344 p. Science, Moscow; The main edition of publications for foreign countries (1983)

    Google Scholar 

  22. Ashby, U.R.: Principles of Self-Organization, pp. 314–343. Mir, Moscow (1966)

    Google Scholar 

  23. Bongard, M.M.: The Problem of Recognition. Fizmatgiz, Moscow (1967)

    Google Scholar 

  24. Gavrilova, T.A., Khoroshevsky, V.F.: Bases of Knowledge of Intellectual Systems: A Textbook for High Schools, 384 p. Peter, St. Petersburg (2000)

    Google Scholar 

  25. Redko, V.G.: Evolution, Neural Networks, Intellect. LIBROKOM Book House/URSS, Moscow (2013)

    Google Scholar 

  26. Widrow, B., Stirns, S.: Adaptive Signal Processing. Radio and communication, Moscow (1989)

    Google Scholar 

  27. Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Inf. Protect. Inside. 5(71), 37–43 (2016)

    Google Scholar 

  28. Petrenko, S.A.: Methods of detecting intrusions and anomalies of the functioning of cyber system, Proceedings of ISA RAS. Risk Manag. Safety. 41, 194–202 (2009)

    Google Scholar 

  29. Petrenko, S.A.: Methods of ensuring the stability of the functioning of cyber systems under conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security, 52, 106–151 (2010)

    Google Scholar 

  30. Petrenko, A.A., Petrenko, S.A.: Cyber units: methodical recommendations of ENISA. Quest. Cybersecurity. 3(11), 2–14 (2015)

    Google Scholar 

  31. Petrenko, A.A., Petrenko, S.A.: Intranet Security Audit (Information Technologies for Engineers), 416 p. DMK Press, Moscow (2002)

    Google Scholar 

  32. Petrenko, A.A., Petrenko, S.A.: Research and Development Agency DARPA in the field of cybersecurity. Quest. Cybersecurity. 4(12), 2–22 (2015)

    Google Scholar 

  33. Petrenko, A.A., Petrenko, S.A.: The way to increase the stability of LTE-network in the conditions of destructive cyber-attacks. Quest. Cybersecurity. 2(10), 36–42 (2015)

    Google Scholar 

  34. Petrenko, A.S., Petrenko, S.A.: The first interstate cyber-training of the CIS countries: “Cyber-Antiterror2016”. Inf. Protect. Inside. 5(71), 57–63 (2016)

    Google Scholar 

  35. Petrenko, S.A.: Methods of Information and Technical Impact on Cyber Systems and Possible Countermeasures. Proceedings of ISA RAS. Risk Manag. Security, 41, 104–146 (2009)

    Google Scholar 

  36. Petrenko, S.A., Petrenko, A.A.: Ontology of cyber-security of self-healing SmartGrid. Protect. Inf. Inside. 2(68), 12–24 (2016)

    Google Scholar 

  37. Petrenko, S.A., Petrenko, A.S.: Creation of a cognitive supercomputer for the computer attacks prevention. Protect Inf. Inside. 3(75), 14–22 (2017)

    Google Scholar 

  38. Petrenko, S.A., Petrenko, A.S.: From detection to prevention: trends and prospects of development of situational centers in the Russian Federation. Intellect Technol. 1(12), 68–71 (2017)

    Google Scholar 

  39. Petrenko, S.A., Petrenko, A.S.: New doctrine as an impulse for the development of domestic information security technologies. Intellect Technol. 2(13), 70–75 (2017)

    Google Scholar 

  40. Petrenko, S.A., Petrenko, A.S.: New doctrine of information security of the Russian Federation. Inf. Protect. Inside. 1(73), 33–39 (2017)

    Google Scholar 

  41. Petrenko, S.A., Petrenko, A.S.: Practice of application of GOST R IEC 61508. Inf. Protect. Insider. 2(68), 42–49 (2016)

    Google Scholar 

  42. Petrenko, S.A., Shamsutdinov, T.I., Petrenko, A.S.: Scientific and technical problems of development of situational centers in the Russian Federation. Inf. Protect. Inside. 6(72), 37–43 (2016)

    Google Scholar 

  43. Petrenko, S.A., Simonov, S.V.: Management of Information Risks. Economically Justified Safety (Information technology for engineers), 384 p. DMK-Press, Moscow (2004)

    Google Scholar 

  44. Petrenko, S.A.: The concept of maintaining the efficiency of cyber system in the context of information and technical impacts. Proceedings of the ISA RAS. Risk Manag. Safety. 41, 175–193 (2009)

    Google Scholar 

  45. Petrenko, S.A.: The Cyber Threat model on innovation analytics DARPA. Trudy SPII RAN. 39, 26–41 (2015)

    Google Scholar 

  46. Petrenko, S.A.: The problem of the stability of the functioning of cyber systems under the conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security. 52, 68–105 (2010)

    Google Scholar 

  47. Petrenko, S.A., Kurbatov, V.A.: Information Security Policies (Information Technologies for Engineers), 400 p. DMK Press, Moscow (2005)

    Google Scholar 

  48. Aristotle. Comp. in 4 volumes (Series “Philosophical heritage”). Thought, Moscow. (1975–1983)

    Google Scholar 

  49. Biryukov, D.N.: Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems. Proc. SPIIRAS. 3(40), 55–76 (2015)

    Article  Google Scholar 

  50. Bocharov, V.A., Markin, V.I.: Fundamentals of Logic. Moscow State University, Moscow (2008)

    Google Scholar 

  51. Chereshkin, D.S.: Problems of Information Security Management, 224 p. Editorial URSS, Moscow (2002)

    Google Scholar 

  52. Grinyaev, S.N.: The battlefield – cyberspace: theory, methods, means, methods and systems of information warfare, 448 p. Harvest, Jordan (2004)

    Google Scholar 

  53. Voevodsky, V.: Voevodsky V. A Very Short Note on the Homotopy Lambda-Calculus (2006)

    Google Scholar 

  54. Rodin, A.V.: Logical and geometric atomism from Leibniz to Voevodsky. Prob. Philos. 6 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Petrenko, S. (2018). Limitations of Von Neumann Architecture. In: Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation. Springer, Cham. https://doi.org/10.1007/978-3-319-79036-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-79036-7_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-79035-0

  • Online ISBN: 978-3-319-79036-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics