Analysis of a graph by a set of automata I. B. BourdonovA. S. KossatchevV. V. Kulyamin OriginalPaper 15 November 2015 Pages: 307 - 310
Projecting transition systems: Overcoming state explosion in concurrent system verification A. S. Kamkin OriginalPaper 15 November 2015 Pages: 311 - 324
A combined toolset for the verification of real-time distributed systems D. Yu. VolkanovV. A. ZakharovI. V. Konnov OriginalPaper 15 November 2015 Pages: 325 - 335
Methods for automatic term recognition in domain-specific text collections: A survey N. A. AstrakhantsevD. G. FedorenkoD. Yu. Turdakov OriginalPaper 15 November 2015 Pages: 336 - 349
Encapsulation of partitioned parallelism into open-source database management systems C. S. PanM. L. Zymbler OriginalPaper 15 November 2015 Pages: 350 - 360
The current state of art in program obfuscations: definitions of obfuscation security N. P. VarnovskiyV. A. ZakharovA. V. Shokurov OriginalPaper 15 November 2015 Pages: 361 - 372
Automated exploit generation for stack buffer overflow vulnerabilities V. A. PadaryanV. V. KaushanA. N. Fedotov OriginalPaper 15 November 2015 Pages: 373 - 380