for Journals by Title or ISSN
for Articles by Keywords
help
  Subjects -> COMPUTER SCIENCE (Total: 2132 journals)
    - ANIMATION AND SIMULATION (31 journals)
    - ARTIFICIAL INTELLIGENCE (105 journals)
    - AUTOMATION AND ROBOTICS (106 journals)
    - CLOUD COMPUTING AND NETWORKS (67 journals)
    - COMPUTER ARCHITECTURE (10 journals)
    - COMPUTER ENGINEERING (11 journals)
    - COMPUTER GAMES (21 journals)
    - COMPUTER PROGRAMMING (26 journals)
    - COMPUTER SCIENCE (1238 journals)
    - COMPUTER SECURITY (50 journals)
    - DATA BASE MANAGEMENT (14 journals)
    - DATA MINING (38 journals)
    - E-BUSINESS (22 journals)
    - E-LEARNING (30 journals)
    - ELECTRONIC DATA PROCESSING (22 journals)
    - IMAGE AND VIDEO PROCESSING (40 journals)
    - INFORMATION SYSTEMS (108 journals)
    - INTERNET (97 journals)
    - SOCIAL WEB (53 journals)
    - SOFTWARE (34 journals)
    - THEORY OF COMPUTING (9 journals)

COMPUTER SCIENCE (1238 journals)                  1 2 3 4 5 6 7 | Last

Showing 1 - 200 of 872 Journals sorted alphabetically
3D Printing and Additive Manufacturing     Full-text available via subscription   (Followers: 25)
Abakós     Open Access   (Followers: 4)
ACM Computing Surveys     Hybrid Journal   (Followers: 31)
ACM Journal on Computing and Cultural Heritage     Hybrid Journal   (Followers: 9)
ACM Journal on Emerging Technologies in Computing Systems     Hybrid Journal   (Followers: 17)
ACM Transactions on Accessible Computing (TACCESS)     Hybrid Journal   (Followers: 3)
ACM Transactions on Algorithms (TALG)     Hybrid Journal   (Followers: 15)
ACM Transactions on Applied Perception (TAP)     Hybrid Journal   (Followers: 5)
ACM Transactions on Architecture and Code Optimization (TACO)     Hybrid Journal   (Followers: 9)
ACM Transactions on Autonomous and Adaptive Systems (TAAS)     Hybrid Journal   (Followers: 9)
ACM Transactions on Computation Theory (TOCT)     Hybrid Journal   (Followers: 12)
ACM Transactions on Computational Logic (TOCL)     Hybrid Journal   (Followers: 3)
ACM Transactions on Computer Systems (TOCS)     Hybrid Journal   (Followers: 18)
ACM Transactions on Computer-Human Interaction     Hybrid Journal   (Followers: 16)
ACM Transactions on Computing Education (TOCE)     Hybrid Journal   (Followers: 8)
ACM Transactions on Design Automation of Electronic Systems (TODAES)     Hybrid Journal   (Followers: 6)
ACM Transactions on Economics and Computation     Hybrid Journal   (Followers: 1)
ACM Transactions on Embedded Computing Systems (TECS)     Hybrid Journal   (Followers: 3)
ACM Transactions on Information Systems (TOIS)     Hybrid Journal   (Followers: 20)
ACM Transactions on Intelligent Systems and Technology (TIST)     Hybrid Journal   (Followers: 8)
ACM Transactions on Interactive Intelligent Systems (TiiS)     Hybrid Journal   (Followers: 5)
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)     Hybrid Journal   (Followers: 9)
ACM Transactions on Reconfigurable Technology and Systems (TRETS)     Hybrid Journal   (Followers: 6)
ACM Transactions on Sensor Networks (TOSN)     Hybrid Journal   (Followers: 8)
ACM Transactions on Speech and Language Processing (TSLP)     Hybrid Journal   (Followers: 9)
ACM Transactions on Storage     Hybrid Journal  
ACS Applied Materials & Interfaces     Hybrid Journal   (Followers: 35)
Acta Automatica Sinica     Full-text available via subscription   (Followers: 2)
Acta Informatica Malaysia     Open Access  
Acta Universitatis Cibiniensis. Technical Series     Open Access  
Ad Hoc Networks     Hybrid Journal   (Followers: 11)
Adaptive Behavior     Hybrid Journal   (Followers: 10)
Advanced Engineering Materials     Hybrid Journal   (Followers: 29)
Advanced Science Letters     Full-text available via subscription   (Followers: 11)
Advances in Adaptive Data Analysis     Hybrid Journal   (Followers: 8)
Advances in Artificial Intelligence     Open Access   (Followers: 15)
Advances in Calculus of Variations     Hybrid Journal   (Followers: 6)
Advances in Catalysis     Full-text available via subscription   (Followers: 5)
Advances in Computational Mathematics     Hybrid Journal   (Followers: 19)
Advances in Computer Engineering     Open Access   (Followers: 4)
Advances in Computer Science : an International Journal     Open Access   (Followers: 15)
Advances in Computing     Open Access   (Followers: 2)
Advances in Data Analysis and Classification     Hybrid Journal   (Followers: 59)
Advances in Engineering Software     Hybrid Journal   (Followers: 29)
Advances in Geosciences (ADGEO)     Open Access   (Followers: 16)
Advances in Human Factors/Ergonomics     Full-text available via subscription   (Followers: 23)
Advances in Human-Computer Interaction     Open Access   (Followers: 21)
Advances in Materials Science     Open Access   (Followers: 15)
Advances in Operations Research     Open Access   (Followers: 12)
Advances in Parallel Computing     Full-text available via subscription   (Followers: 7)
Advances in Porous Media     Full-text available via subscription   (Followers: 5)
Advances in Remote Sensing     Open Access   (Followers: 52)
Advances in Science and Research (ASR)     Open Access   (Followers: 6)
Advances in Technology Innovation     Open Access   (Followers: 6)
AEU - International Journal of Electronics and Communications     Hybrid Journal   (Followers: 8)
African Journal of Information and Communication     Open Access   (Followers: 9)
African Journal of Mathematics and Computer Science Research     Open Access   (Followers: 4)
AI EDAM     Hybrid Journal   (Followers: 1)
Air, Soil & Water Research     Open Access   (Followers: 14)
AIS Transactions on Human-Computer Interaction     Open Access   (Followers: 7)
Algebras and Representation Theory     Hybrid Journal   (Followers: 1)
Algorithms     Open Access   (Followers: 11)
American Journal of Computational and Applied Mathematics     Open Access   (Followers: 5)
American Journal of Computational Mathematics     Open Access   (Followers: 4)
American Journal of Information Systems     Open Access   (Followers: 6)
American Journal of Sensor Technology     Open Access   (Followers: 4)
Anais da Academia Brasileira de Ciências     Open Access   (Followers: 2)
Analog Integrated Circuits and Signal Processing     Hybrid Journal   (Followers: 7)
Analysis in Theory and Applications     Hybrid Journal   (Followers: 1)
Animation Practice, Process & Production     Hybrid Journal   (Followers: 5)
Annals of Combinatorics     Hybrid Journal   (Followers: 4)
Annals of Data Science     Hybrid Journal   (Followers: 12)
Annals of Mathematics and Artificial Intelligence     Hybrid Journal   (Followers: 12)
Annals of Pure and Applied Logic     Open Access   (Followers: 4)
Annals of Software Engineering     Hybrid Journal   (Followers: 13)
Annals of West University of Timisoara - Mathematics and Computer Science     Open Access  
Annual Reviews in Control     Hybrid Journal   (Followers: 8)
Anuario Americanista Europeo     Open Access  
Applicable Algebra in Engineering, Communication and Computing     Hybrid Journal   (Followers: 2)
Applied and Computational Harmonic Analysis     Full-text available via subscription   (Followers: 1)
Applied Artificial Intelligence: An International Journal     Hybrid Journal   (Followers: 12)
Applied Categorical Structures     Hybrid Journal   (Followers: 5)
Applied Clinical Informatics     Hybrid Journal   (Followers: 3)
Applied Computational Intelligence and Soft Computing     Open Access   (Followers: 14)
Applied Computer Systems     Open Access   (Followers: 2)
Applied Informatics     Open Access  
Applied Mathematics and Computation     Hybrid Journal   (Followers: 33)
Applied Medical Informatics     Open Access   (Followers: 12)
Applied Numerical Mathematics     Hybrid Journal   (Followers: 5)
Applied Soft Computing     Hybrid Journal   (Followers: 17)
Applied Spatial Analysis and Policy     Hybrid Journal   (Followers: 7)
Applied System Innovation     Open Access  
Architectural Theory Review     Hybrid Journal   (Followers: 3)
Archive of Applied Mechanics     Hybrid Journal   (Followers: 6)
Archive of Numerical Software     Open Access  
Archives and Museum Informatics     Hybrid Journal   (Followers: 153)
Archives of Computational Methods in Engineering     Hybrid Journal   (Followers: 6)
arq: Architectural Research Quarterly     Hybrid Journal   (Followers: 8)
Artifact     Open Access   (Followers: 2)
Artificial Life     Hybrid Journal   (Followers: 7)
Asia Pacific Journal on Computational Engineering     Open Access  
Asia-Pacific Journal of Information Technology and Multimedia     Open Access   (Followers: 1)
Asian Journal of Control     Hybrid Journal  
Assembly Automation     Hybrid Journal   (Followers: 2)
at - Automatisierungstechnik     Hybrid Journal   (Followers: 1)
Australian Educational Computing     Open Access   (Followers: 1)
Automatic Control and Computer Sciences     Hybrid Journal   (Followers: 6)
Automatic Documentation and Mathematical Linguistics     Hybrid Journal   (Followers: 5)
Automatica     Hybrid Journal   (Followers: 13)
Automation in Construction     Hybrid Journal   (Followers: 7)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 8)
Balkan Journal of Electrical and Computer Engineering     Open Access  
Basin Research     Hybrid Journal   (Followers: 5)
Behaviour & Information Technology     Hybrid Journal   (Followers: 51)
Big Data and Cognitive Computing     Open Access   (Followers: 4)
Biodiversity Information Science and Standards     Open Access  
Bioinformatics     Hybrid Journal   (Followers: 333)
Biomedical Engineering     Hybrid Journal   (Followers: 16)
Biomedical Engineering and Computational Biology     Open Access   (Followers: 13)
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 19)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 35)
Briefings in Bioinformatics     Hybrid Journal   (Followers: 51)
British Journal of Educational Technology     Hybrid Journal   (Followers: 163)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 12)
c't Magazin fuer Computertechnik     Full-text available via subscription   (Followers: 1)
CALCOLO     Hybrid Journal  
Calphad     Hybrid Journal   (Followers: 2)
Canadian Journal of Electrical and Computer Engineering     Full-text available via subscription   (Followers: 15)
Capturing Intelligence     Full-text available via subscription  
Catalysis in Industry     Hybrid Journal   (Followers: 1)
CEAS Space Journal     Hybrid Journal   (Followers: 2)
Cell Communication and Signaling     Open Access   (Followers: 2)
Central European Journal of Computer Science     Hybrid Journal   (Followers: 5)
CERN IdeaSquare Journal of Experimental Innovation     Open Access   (Followers: 3)
Chaos, Solitons & Fractals     Hybrid Journal   (Followers: 3)
Chemometrics and Intelligent Laboratory Systems     Hybrid Journal   (Followers: 15)
ChemSusChem     Hybrid Journal   (Followers: 7)
China Communications     Full-text available via subscription   (Followers: 8)
Chinese Journal of Catalysis     Full-text available via subscription   (Followers: 2)
CIN Computers Informatics Nursing     Hybrid Journal   (Followers: 11)
Circuits and Systems     Open Access   (Followers: 15)
Clean Air Journal     Full-text available via subscription   (Followers: 1)
CLEI Electronic Journal     Open Access  
Clin-Alert     Hybrid Journal   (Followers: 1)
Clinical eHealth     Open Access  
Cluster Computing     Hybrid Journal   (Followers: 2)
Cognitive Computation     Hybrid Journal   (Followers: 3)
COMBINATORICA     Hybrid Journal  
Combinatorics, Probability and Computing     Hybrid Journal   (Followers: 4)
Combustion Theory and Modelling     Hybrid Journal   (Followers: 14)
Communication Methods and Measures     Hybrid Journal   (Followers: 13)
Communication Theory     Hybrid Journal   (Followers: 24)
Communications Engineer     Hybrid Journal   (Followers: 1)
Communications in Algebra     Hybrid Journal   (Followers: 3)
Communications in Computational Physics     Full-text available via subscription   (Followers: 2)
Communications in Information Science and Management Engineering     Open Access   (Followers: 4)
Communications in Partial Differential Equations     Hybrid Journal   (Followers: 4)
Communications of the ACM     Full-text available via subscription   (Followers: 51)
Communications of the Association for Information Systems     Open Access   (Followers: 16)
COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering     Hybrid Journal   (Followers: 3)
Complex & Intelligent Systems     Open Access   (Followers: 1)
Complex Adaptive Systems Modeling     Open Access  
Complex Analysis and Operator Theory     Hybrid Journal   (Followers: 2)
Complexity     Hybrid Journal   (Followers: 6)
Complexus     Full-text available via subscription  
Composite Materials Series     Full-text available via subscription   (Followers: 8)
Computación y Sistemas     Open Access  
Computation     Open Access   (Followers: 1)
Computational and Applied Mathematics     Hybrid Journal   (Followers: 3)
Computational and Mathematical Biophysics     Open Access   (Followers: 1)
Computational and Mathematical Methods in Medicine     Open Access   (Followers: 2)
Computational and Mathematical Organization Theory     Hybrid Journal   (Followers: 2)
Computational and Structural Biotechnology Journal     Open Access   (Followers: 1)
Computational and Theoretical Chemistry     Hybrid Journal   (Followers: 9)
Computational Astrophysics and Cosmology     Open Access   (Followers: 1)
Computational Biology and Chemistry     Hybrid Journal   (Followers: 13)
Computational Chemistry     Open Access   (Followers: 2)
Computational Cognitive Science     Open Access   (Followers: 2)
Computational Complexity     Hybrid Journal   (Followers: 4)
Computational Condensed Matter     Open Access   (Followers: 1)
Computational Ecology and Software     Open Access   (Followers: 10)
Computational Economics     Hybrid Journal   (Followers: 10)
Computational Geosciences     Hybrid Journal   (Followers: 17)
Computational Linguistics     Open Access   (Followers: 23)
Computational Management Science     Hybrid Journal  
Computational Mathematics and Modeling     Hybrid Journal   (Followers: 8)
Computational Mechanics     Hybrid Journal   (Followers: 5)
Computational Methods and Function Theory     Hybrid Journal  
Computational Molecular Bioscience     Open Access   (Followers: 2)
Computational Optimization and Applications     Hybrid Journal   (Followers: 8)
Computational Particle Mechanics     Hybrid Journal   (Followers: 1)
Computational Research     Open Access   (Followers: 1)
Computational Science and Discovery     Full-text available via subscription   (Followers: 2)
Computational Science and Techniques     Open Access  
Computational Statistics     Hybrid Journal   (Followers: 14)
Computational Statistics & Data Analysis     Hybrid Journal   (Followers: 35)
Computer     Full-text available via subscription   (Followers: 105)
Computer Aided Surgery     Open Access   (Followers: 6)
Computer Applications in Engineering Education     Hybrid Journal   (Followers: 8)
Computer Communications     Hybrid Journal   (Followers: 16)

        1 2 3 4 5 6 7 | Last

Journal Cover
Automatic Control and Computer Sciences
Journal Prestige (SJR): 0.218
Citation Impact (citeScore): 1
Number of Followers: 6  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 1558-108X - ISSN (Online) 0146-4116
Published by Springer-Verlag Homepage  [2352 journals]
  • Architecture of the Protected Cloud Data Storage Using Intel SGX
           Technology
    • Abstract: The architecture of the cloud data storage using Intel SGX technology is proposed. The approach offered in the article is provided to protect the user data on the cloud server from the attacks on the part of the provider and on the client personal computer from the malicious software. The developed architecture supports the group access to the data for several users.
      PubDate: 2018-12-01
       
  • Implementation of Mandatory Access Control in Distributed Systems
    • Abstract: The implementation of mandatory distribution of access in distributed systems taking into account a user hierarchy is considered. The access control is based on the scheme of preliminary key distribution similar to KDP-scheme. The algorithm of building a family of subsets taking into account a user hierarchy was developed.
      PubDate: 2018-12-01
       
  • Spatially Inhomogeneous Periodic Solutions in a Distributed
           Hutchinson’s Equation
    • Abstract: —The asymptotics of spatially inhomogeneous periodic solutions of the complex, spatially distributed Hutchinson equation with periodic boundary conditions are presented. It is shown that such solutions are observable in a numerical experiment.
      PubDate: 2018-12-01
       
  • Detection of Threats in Cyberphysical Systems Based on Deep Learning
           Methods Using Multidimensional Time Series
    • Abstract: — A method for detecting anomalies in the work of cyberphysical systems by analyzing a multidimensional time series is proposed. The method is based on the use of neural network technologies to predict the values ​​of the time series of the system data and to identify deviations between the predicted value and the current data obtained from the sensors and actuators. The results of experimental studies are presented, which testify to the effectiveness of the proposed solution.
      PubDate: 2018-12-01
       
  • Modeling the Dissemination of Information Threats in Social Media
    • Abstract: — The goal of this article is raising the effectiveness of predicting the spread of information in social media. In order to achieve the set goal, the following scientific problem must be solved: based on the specified structure of a social network, typical algorithms of social interaction, statistics of coverage of certain profile groups of social media users, it is necessary to determine the probability distribution for the dissemination of destructive information in the social network, which will make it possible to predict its coverage of various social groups.
      PubDate: 2018-12-01
       
  • Invariant Characteristics of Forced Oscillations of Beams with
           Longitudinal Compression
    • Abstract: Oscillations of an elastic beam with longitudinal compressions are investigated. The beam consists of two steel strips connected at the free ends. The compression is caused by tensioned thread. The oscillations are excited by the action of an alternating magnetic field on a magnet mounted at the end of the beam. The law of motion under changes of the frequency of harmonic action is registered. As a result of a full-scale experiment, a large set of data has been obtained. This set contains ordered periodic oscillations as well as disordered oscillations specific to dynamic systems with chaotic behavior. To study the invariant numerical characteristics of the attractor of the corresponding dynamic system, the correlation integral and correlation dimensionality as well as β-statentropy are calculated. A large numerical experiment showed that the calculation of β-statentropy is preferable compared with calculation of the correlation index. Based on the developed algorithms, the dependence of β-statentropy on the frequency of external action is constructed. The constructed dependence can serve as an effective tool to measure the adequacy of the mathematical model of forced oscillations of a beam with loss of stability.
      PubDate: 2018-12-01
       
  • Semantic Security Tools in Software-Defined Networks
    • Abstract: — Software-defined networks are a promising technology for constructing communication networks, where network management is the software that configures network devices. This contrasts the traditional approach based on configuring individual devices. This controlling software make it possible to dynamically route the configuration of data streams in the network, depending on service quality requirements. That said, however, it becomes necessary to ensure a secure data transfer [23], e.g., so that streams from confidential nodes could not reach an open segment of the network. The article shows how this task is solved by semantic tools.
      PubDate: 2018-12-01
       
  • Analysis of the Information Security Threats in the Digital Production
           Networks
    • Abstract: The article analyzes the information security threats arising when constructing digital production networks; presents the problems, which the cybersecurity control system should solve; and proposes an approach for implementing such systems.
      PubDate: 2018-12-01
       
  • Hierarchical Software-Defined Security Management for Large-Scale Dynamic
           Networks
    • Abstract: An approach is presented to the construction of a hierarchical security management system for large-scale dynamic communication networks (MANET, VANET, FANET, WSN, etc.) with the use of software-defined network technologies and supercomputer elastic computations. The results of experiments to evaluate the effectiveness of the proposed approach are presented.
      PubDate: 2018-12-01
       
  • Providing Stable Operation of Self-Organizing Cyber-Physical System via
           Adaptive Topology Management Methods Using Blockchain-Like Directed
           Acyclic Graph
    • Abstract: The methods of protection against attacks on the ad hoc networks in the self-organizing cyber-physical systems are analyzed in the article, and their issues are identified. The authors propose an adaptive management method for the ad hoc network topology, where the blockchain-like directed acyclic graph is applied to solve the identified issues.
      PubDate: 2018-12-01
       
  • Noise Immunity of Noncoherent Reception under Complex Interference Effect
           on Communication and Monitoring Channels of Automated Information Systems
           of River Transport on Inland Waterways of the Russian Federation
    • Abstract: — The noise immunity of single noncoherent reception algorithms optimal in communication and monitoring channels of automated information systems with noise and concentrated interference under complex effect of fluctuating, concentrated, and impulse noise is investigated. Equations for error probabilities are obtained. Calculation examples are given.
      PubDate: 2018-12-01
       
  • An Efficient Algorithm for Finding the Level of Useful Signals on
           Interpretation of Magnetic and Eddy Current Defectograms
    • Abstract: To ensure traffic safety of railway transport, non-destructive testing of rails is regularly carried out by using various approaches and methods, including magnetic and eddy current flaw detection methods. An automatic analysis of large data sets (defectgrams) that come from the corresponding equipment is still an actual problem. The analysis means a process of determining the presence of defective sections along with identifying structural elements of railway tracks on defectograms. At the same time, under the conditions of significant volumes of incoming information, fast and efficient algorithms of data analysis are of most interest. This article is an addition to the previous article devoted to the problem of automatic determination of a threshold level of amplitudes of useful signals (from defects and structural elements of a railway track) during the analysis of defectograms (records) of magnetic and eddy current flaw detectors, which contains an algorithm for finding the threshold level of a rail noise and its theoretical justification with examples of its operation on several fragments of real magnetic and eddy current defectograms. The article presents a simple and effective implementation of the algorithm, which is successfully used in practice for the automatic analysis of magnetic and eddy current defectograms.
      PubDate: 2018-12-01
       
  • A Blockchain Decentralized Public Key Infrastructure Model
    • Abstract: — This article presents a comparative analysis of available solutions in authenticating access subjects in computer-aided information and telecommunication systems. Centralized and decentralized public key infrastructures (PKIs) are considered, and their weaknesses are brought to light. A blockchain model of decentralized PKI for access subject authentication in computer-aided information and telecommunication systems is proposed. The current embodiments of blockchain PKIs are checked for compliance with the proposed model.
      PubDate: 2018-12-01
       
  • Protection of Valuable Information in Information Technologies
    • Abstract: — This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is built. Approaches to protecting valuable information are investigated.
      PubDate: 2018-12-01
       
  • Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
    • Abstract: — This paper investigates the problem of ensuring secure input/output operations in the Intel SGX technology. The problem is extremely urgent, and its solution will make it possible to protect confidential user data from attacks from different malicious software while finding data outside the enclave. The authors present different methods for solving the posed problem developed by them. The complexity of the practical application of these methods as well as their main disadvantages and advantages are analyzed. The most preferred method which ensures secure storage and processing of data outside the enclave is also chosen.
      PubDate: 2018-12-01
       
  • Assurance of Cyber Resistance of the Distributed Data Storage Systems
           Using the Blockchain Technology
    • Abstract: The article studies the architectures of the modern systems of decentralized data storage and processing, applicability of the blockchain technology in these systems, existing security threats in comparison with the decentralized systems, and methods of security assurance allowing avoidance of these threats.
      PubDate: 2018-12-01
       
  • Clarification of the Properties of a Tree Centroid
    • Abstract: This paper is devoted to clarification of tree centroid properties. The authors attention was drawn to the popular problem of a (binary) partition of a graph, whose solution is known only by a brute force algorithm. It was found that for an “efficient” partition of the tree, it makes sense to consider partitions in the neighborhood of centroid vertices, the definition of which is presented. In the paper, we proposed proofs connected with the limitation of their weight. It is also proven that if there are two centroid vertices in a tree, they are adjacent. In what follows, it is noted that three such vertices cannot be in a tree. The corresponding statements are made. According to the first one, any vertex of a tree with a certain restriction on its weight is a centroid. According to one of the points of the second statement, if there are two centroid vertices in a tree, the order of the tree is an even number. The third statement says that if a tree has a centroid vertex of limited weight, there is another centroid vertex of the same weight, adjacent to the first one. To prove these statements, we consider a branch of the greatest weight with a centroid vertex and take another vertex adjacent to the centroid in this branch. In this paper, Jordan’s theorem is used; three images are used to illustrate the material.
      PubDate: 2018-12-01
       
  • Security Analysis Based on Controlling Dependences of Network Traffic
           Parameters by Wavelet Transformation
    • Abstract: — This article presents mathematical tools of wavelet transformations for use in detecting network traffic attacks. The technique consists in discrete wavelet transformation of parameters of network packets extracted from traffic and tracking the degree of dependence of various network traffic parameters using the multiple correlation coefficient. The efficiency of the proposed technique is shown in the results of experimental detections of SYN flood DoS attacks.
      PubDate: 2018-12-01
       
  • Modification of Preliminary Blom’s Key Distribution Scheme Taking into
           Account Simplex Channels
    • Abstract: A modification is presented of the scheme of preliminary Blom’s key distribution taking into account the direction of information flows. The modification makes it necessary to use a function of three variables. The function of forming key materials ceases to be symmetrical. An exponential form of this function was proposed, which does not increase the amount of key materials.
      PubDate: 2018-12-01
       
  • Loop-invariant Optimization in the Pifagor Language
    • Abstract: The paper considers methods of program transformation equivalent to optimizing the cycle invariant, applied to the functional data-flow model implemented in the Pifagor programming language. Optimization of the cycle invariant in imperative programming languages is reduced to a displacement from the cycle of computations that do not depend on variables that are changes in the loop. A feature of the functional data flow parallel programming language Pifagor is the absence of explicitly specified cyclic computations (the loop operator). However, recurring calculations in this language can be specified recursively or by applying specific language constructs (parallel lists). Both mechanisms provide the possibility of parallel execution. In the case of optimizing a recursive function, repeated calculations are carried out into an auxiliary function, the main function performing only the calculation of the invariant. When optimizing the invariant in computations over parallel lists, the calculation of the invariant moves from the function that executes over the list items to the function containing the call. The paper provides a definition of “invariant” applied to the Pifagor language, algorithms for its optimization, and examples of program source codes, their graph representations (the program dependence graph) before and after optimization. The algorithm shown for computations over parallel lists is applicable only to the Pifagor language, because it rests upon specific data structures and the computational model of this language. However, the algorithm for transforming recursive functions may be applied to other programming languages.
      PubDate: 2018-12-01
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.166.133.84
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-