Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Bugerya, A. A."'
Publikováno v:
Труды Института системного программирования РАН, Vol 30, Iss 2, Pp 25-44 (2018)
The work is dedicated to the topic of parallelizing programs in especially difficult cases - when the used algorithm is purely sequential, there are no parallel alternatives to the algorithm used, and its execution time is unacceptably high. Various
Externí odkaz:
https://doaj.org/article/0c20a1b968f94296a18b65c19afe7978
Autor:
Bugerya T. M.
Publikováno v:
Pedagogìka, Psihologìâ ta Mediko-bìologìčnì Problemi Fìzičnogo Vihovannâ ì Sportu, Vol 1, Pp 17-20 (2011)
The role of intersubject relations during the formation of the future physical rehabilitologists' readiness for the professional activity was shown and the structural and logical scheme of training specialists content was represented. The such criter
Externí odkaz:
https://doaj.org/article/92673589d4324c8a97a5d58e5c558f74
Publikováno v:
Proceedings of the Institute for System Programming of the RAS. 31:33-64
One of the main problem of a binary code security analysis is a revealing of malicious behavior in an untrusted program. This task is hard to automate, and it requires a participation of a cybersecurity expert. Existing solutions are aimed on the ana
Autor:
Tat'yana Petrovna Baranova, Alexander Borisovich Bugerya, Ekaterina Nikolaevna Gladkova, A N Andrianov, K N Efimkin
Publikováno v:
Keldysh Institute Preprints. :1-48
Publikováno v:
Reviews & Advances in Chemistry; Dec2022, Vol. 12 Issue 4, p195-213, 19p
Autor:
Ekaterina Nikolaevna Gladkova, Alexander Borisovich Bugerya, K N Efimkin, Tat'yana Petrovna Baranova, A N Andrianov, Pavel Ivanovich Koludarov
Publikováno v:
Scientific Conference “Scientific Services & Internet”.
Autor:
Ivan Ivanovich Kulagin, Alexander Borisovich Bugerya, Andrei Yur'evich Tikhonov, Mikhail Aleksandrovich Solovev, Vartan A. Padaryan
Publikováno v:
2019 Ivannikov Memorial Workshop (IVMEM).
One of the tasks of binary code security analysis is detection of undocumented features in software. This task is hard to automate, and it requires participation of a cybersecurity expert. The way of representation of the algorithm under analysis str
Publikováno v:
Keldysh Institute Preprints. :1-24
Autor:
K N Efimkin, Isp Ras, Ekaterina Nikolaevna Gladkova, Tatiana Petrovna Baranova, Mikhail Aleksandrovich Solovev, Alexander Borisovich Bugerya
Publikováno v:
Scientific Conference “Scientific Services & Internet”.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.