Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Prikladnaâ diskretnaâ matematika
Année 2009
Précédent
Suivant
Sommaire du
Fascicule no. 1
Minimization of Boolean functions of many variables~-- iterative method and program realization
A. D. Zakrevskij
;
N. R. Toropov
p. 5-14
Bent functions: results and applications. A~survey
N. N. Tokareva
p. 15-37
Logical methods for design and analysis of choice models
L. A. Sholomov
p. 38-71
Approximate solution of the traveling salesman problem
V. I. Dulkeyt
;
R. T. Faizullin
p. 72-78
Modelling of the PKI protocols in the universally composable framework using model checkers
S. E. Prokopyev
p. 79-92
Approaches to the construction of the DP-model of file systems
P. V. Burenin
p. 93-112
Usage formal models for vulnerability analysis
D. N. Kolegov
p. 113-116
Security analysis of the information flows by memory in the computer systems with functional and parametric associated entities
D. N. Kolegov
p. 117-125
Sommaire du
Fascicule no. 2
Foreword
G. P. Agibalov
p. 5-8
Programming language LYaPAS
N. R. Toropov
p. 9-25
Discrete automata on semilattices
G. P. Agibalov
p. 26-49
Realization of functions on semilattices by switching networks
I. A. Pankratova
p. 50-55
Completeness problems for descrete functions
N. G. Parvatov
p. 56-78
Algorithms for constructing the shortest allowable partitions of finite sets
L. N. Andreeva
p. 79-95
Design and research of the parallel combinatorial algorithms
N. E. Timoshevskaya
p. 96-103
50 years of cryptography in Tomsk State University
G. P. Agibalov
p. 104-126
The method for messages automatic encryption
A. D. Zakrevskij
p. 127-137
Sommaire du
Fascicule no. 3
Lower and upper neighborhoods in set with closure property
N. G. Parvatov
p. 5-13
APN-functions
M. E. Tuzhilin
p. 14-20
On complexity of formal coding method for analysis of generator with monocycle substitutional transition function
V. M. Fomichev
p. 21-28
Almost all Latin squares have trivial autoparatopy group
A. V. Cheremushkin
p. 29-32
Discrete models of physical-chemical processes
O. L. Bandman
p. 33-49
Cellular-automaton model for explosion simulation
Yu. G. Medvedev
p. 50-58
Symmetric stream and finite automaton ciphersystems
I. V. Pankratov
p. 59-68
Analysis of conditions for reception of access owning within the base role DP-model of computer systems without memory information flows
P. N. Devyanin
p. 69-84
DP-model of computer steganography system
E. V. Devyanina
p. 85-90
Modeling network computer systems with vulnerabilities
D. N. Kolegov
p. 91-99
The implementation of the DBMS credentials protection method in the web applications
P. A. Pautov
p. 100-105
Test suites derivation for nondeterministic finite state mashines with respect to the separability relation
E. A. Akenshina
;
N. V. Shabaldina
p. 106-111
An analitic approach in the theory of context-free languages Greibach normal form
O. I. Egorushkin
;
K. V. Safonov
p. 112-116
Method for automated program errors search in complex data processing algorithms
A. N. Makarov
p. 117-127
Sommaire du
Fascicule no. 4
Properties of bent functions with minimal distance
N. A. Kolomeec
;
A. V. Pavlov
p. 5-20
About invariants for some classes of quasimonotonic functions on a~semilattice
N. G. Parvatov
p. 21-27
About Tseitin transformation in logical equations
A. A. Semenov
p. 28-50
A recursive algorithm for cover-free family construction
A. V. Cheremushkin
p. 51-55
Differential cryptanalysis of the MARS block cipher
A. I. Pestunov
p. 56-63
Argument of knowledge protocol for a~Goppa codeword and for an error of a~bounded weigth
V. E. Fedyukovych
p. 64-71
Cellular automata simulation on surface triangulation for diffusion processes
A. A. Evseev
;
O. I. Nechaeva
p. 72-83
``Strings'' theorem and its applications
V. V. Skobelev
p. 84-89
Adaptive tests derivation for nondeterministic automata
M. L. Gromov
;
N. V. Yevtushenko
p. 90-101
Modification of hierarchies analysis method for the dynamic set of alternatives
S. I. Kolesnikova
p. 102-109
Instructions and recommendations for authors to prepare articles in \LaTeX{} format for ``Applied Discrete Mathematics'' journal
D. A. Stephantsov
p. 110-120
Sommaire du
Fascicule no. 10
Solving parallel equations over
$\omega$
-regular languages
V. G. Bushkov
;
N. V. Evtushenko
p. 6-7
The degree of proximity of the Boolean function reduced representation to the class of monomial functions according to basis selection
A. V. Ivanov
p. 7-9
Properties of bent functions with minimal distance
N. A. Kolomeets
;
A. V. Pavlov
;
A. A. Levin
p. 9-10
About finite lower neighbourhood in functional space
N. G. Parvatov
About tseitin's transformation in logical equations
A. A. Semenov
p. 12-13
APN-functions
M. È. Tuzhilin
p. 13-14
The explicit form of information characteristic for partially defined data
L. A. Sholomov
p. 15-16
On Quaternary and Binary Bent Functions
P. Solé
;
N. N. Tokareva
p. 16-18
A~hybrid approach (SAT+ROBDD) to cryptanalysis of stream encryption systems
A. S. Ignat'ev
;
A. A. Semenov
;
D. V. Bespalov
;
O. S. Zaikin
p. 19-20
Generalized invertibility of dynamical systems for encryption problems
A. M. Kovalev
;
V. A. Kozlovskii
;
V. F. Shcherbak
p. 20-21
Stream and finite automaton ciphersystems
I. V. Pankratov
p. 21-24
On 2-transitivity of generalized Feistel ciphers
M. A. Pudovkina
p. 24-26
Analysis of perturbed quantization stegosystems
E. V. Razinkov
;
R. Kh. Latypov
p. 26-28
Transitions identification experiments with information-lossless automata
V. N. Trenkaev
p. 29-30
Argument of knowledge of a~Goppa codeword and of a~bounded error
V. E. Fedyukovich
p. 30-32
On complexity of formal coding method for analysis of generator with monocycle substitutional transition function
V. M. Fomichev
p. 32-34
Protocol verification tools
A. V. Cheremushkin
p. 34-36
The generalized automorphisms of Reed-Muller code and McEliece--Sidelnikov public key cryptosystem
I. V. Chizhov
p. 36-37
Analysis of conditions for taking ownership access within the base role DP-model without memory-information flows
P. N. Devyanin
p. 38-39
Teaching the models of access and information flows management within discipline ``Theoretical foundations of computer security''
P. N. Devyanin
p. 39-41
Closure of basic role DP-model
M. A. Kachanov
p. 41-44
Approaches to security of computer systems with functionally or parametrically associated entities
D. N. Kolegov
p. 44-46
Multivalued logic in the enterprise information management system
M. M. Kucherov
;
A. A. Kytmanov
p. 46-48
Analysis of network safety with Markov's chains
I. N. Kirko
;
V. P. Kushnir
p. 48-50
Implementation of a~method for protecting credentials in the multi-tier applications
P. A. Pautov
p. 50-51
Mathematical and software tools for programs obfuscation
A. G. Pozdeev
;
V. N. Krivopalov
;
E. V. Romashkin
;
E. D. Radchenko
p. 52-53
Software implementation of closure algorithms for the basic DP-model of computer systems with discretionary access control
I. V. Smith
p. 54-55
The technology and the instrumental environment for creation of protected information processing systems
D. A. Stefantsov
p. 55-56
Digital watermarks resistant to collusion attacks
R. S. Struzhkov
;
T. M. Solov'ev
;
R. I. Chernyak
p. 56-59
Wireless LAN security analysis in Tomsk
M. I. Tsoi
p. 59-60
The method for secure video streaming over distributed networks
E. V. Shcherba
p. 60-62
Test suites derivation for nondeterministic finite state mashines with respect to the separability relation
E. A. Aken'shina
;
N. V. Shabaldina
p. 63-65
Path delay and multiple stuck-at fault test design for circuits derived from irredundant systems with factorized synthesis method
V. V. Andreeva
;
A. Yu. Matrosova
;
A. V. Mel'nikov
;
A. V. Morozova
p. 65-66
Representation of an arbitrary number with weight sum of essential subtrees
N. B. Butorina
;
S. A. Lykhina
p. 66-68
Path delay fault classification
A. Yu. Matrosova
p. 68-69
Path delay fault test design for circuits obtained by covering ROBDDs with CLBs
E. A. Nikolaeva
;
A. Yu. Matrosova
p. 69-70
Fault tolerant combinational circuit design
S. A. Ostanin
p. 71-72
Analitic approach to context-free languages in the Greibach normal form
O. I. Egorushkin
;
K. V. Safonov
p. 73-74
Software errors search in complex data processing algorithms
A. N. Makarov
p. 75-76
Routed service of data transmission
V. I. Nikonov
p. 76-78
Approximation of the network traffic by model of alternating process
O. V. Nissenbaum
;
I. B. Pakhomov
p. 78-79
Towards the definition of the software subsystems integration measure
D. A. Stefantsov
p. 79-81
Translation of discrete finite automata descriptions from Microsoft Visio format to source code in C~language
L. V. Stolyarov
;
I. R. Dedinskii
;
A. A. Shalyto
p. 81-83
Experimental program estimation for the quantity of prime numbers necessary for elimination of polynomial equations without integer roots
Yu. L. Zachesov
;
N. P. Salikhov
p. 84-87
Discrete logarithm problem in subgroups of prime order
I. A. Pankratova
p. 87-90
Main problems of linear algebra related with satisfiability problem
R. T. Faizullin
p. 90-91
Transformation of CNF via resolution
I. G. Khnykin
p. 91-93
Computational complexity of graph extensions
M. B. Abrosimov
p. 94-95
Some properties of graph edge clique coverings
I. A. Badeha
;
P. V. Roldugin
p. 95-96
Graph recognition by moving agent
I. S. Grunskii
;
E. A. Tatarinov
p. 96-98
On exact extensions of tournaments
A. A. Dolgov
Algorithms for generation of rooted tree on the base of total partition procedure
V. V. Kruchinin
p. 99-101
Algorithms for the graph isomorphism problem based on graph deregularisation
I. V. Shirokov
;
A. V. Prolubnikov
p. 101-102
On some relations between graphic images and sounds
A. M. Grishin
p. 103-105
Risk management on quality indicators
V. V. Zolotarev
p. 105-107
Correct evaluation of alternatives weight coefficients in the method of analytical hierarchies
S. I. Kolesnikova
p. 107-109
Approach to recognition of technical system state on the base of entropy conception and formalism of multisets
S. I. Kolesnikova
;
V. G. Bukreev
p. 109-111
Information protection for law students
M. Ya. Tovstein
p. 111-112
Logical-combinatorial multicriteria selection of diagnostic tests optimal subset
A. E. Yankovskaya
;
A. E. Petelin
p. 113-114
Reduction of multicriteria selection of optimal subset tests in intelligent systems
A. E. Yankovskaya
p. 114-115
Sommaire du
Fascicule no. 11
Bent functions and their generalizations
N. N. Tokareva
p. 5-17
Elements of underdetermined information theory
L. A. Sholomov
p. 18-42
Finite automata in cryptography
G. P. Agibalov
p. 43-73
Combinatorics-algebraic models in cryptography
V. G. Skobelev
p. 74-114
Cryptographic protocols
A. V. Cheremushkin
p. 115-150
Review lection of security models of computer system
P. N. Devyanin
p. 151-190