93 results on '"Lisitsa, Alexei"'
Search Results
2. Process Mining Algorithm for Online Intrusion Detection System
3. Interpreting NMR Spectra by Constraint Solving
4. Deep Reinforcement Learning for Continuous Control of Material Thickness
5. Representation and Processing of Instantaneous and Durative Temporal Phenomena
6. Cross-Datasets Evaluation of Machine Learning Models for Intrusion Detection Systems
7. Logic Rules Meet Deep Learning: A Novel Approach for Ship Type Classification
8. Gauss-Lintel, an Algorithm Suite for Exploring Chord Diagrams
9. Fine-Grained Access Control for Querying Over Encrypted Document-Oriented Database
10. Querying Encrypted Data in Graph Databases
11. Handling of Past and Future with Phenesthe+
12. Analysing Security Protocols Using Scenario Based Simulation
13. Investigating the Capability of Agile Processes to Support Medical Devices Regulations: The Case of XP, Scrum, and FDD with EU MDR Regulations
14. Visual Algebraic Proofs for Unknot Detection
15. Clarification of Ambiguity for the Simple Authentication and Security Layer
16. Revisiting MU-Puzzle. A Case Study in Finite Countermodels Verification
17. Secure Joint Querying Over Federated Graph Databases Utilising SMPC Protocols
18. Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data Streams
19. Detecting 2D NMR Signals Using Mask RCNN
20. Supervised Learning for Untangling Braids
21. Automated Reasoning for Knot Semigroups and $$\pi $$ π -orbifold Groups of Knots
22. Abstract State Machines and System Theoretic Process Analysis for Safety-Critical Systems
23. A Prediction Model Based Approach to Open Space Steganography Detection in HTML Webpages
24. Predicting plant Rubisco kinetics from RbcL sequence data using machine learning
25. Logic Rules Meet Deep Learning: A Novel Approach for Ship Type Classification (Extended Abstract)
26. Making Sense of Heterogeneous Maritime Data
27. Reinforcement learning algorithms for the Untangling of Braids
28. Efficient Knot Discrimination via Quandle Coloring with SAT and #-SAT
29. Mining Frequent Movement Patterns in Large Networks: A Parallel Approach Using Shapes
30. Efficient and Secure Encryption Adjustment for JSON Data
31. Training AI to Recognize Realizable Gauss Diagrams: The Same Instances Confound AI and Human Mathematicians
32. SMPG: Secure Multi Party Computation on Graph Databases
33. Molecular Fragments from Incomplete, Real-life NMR Data: Framework for Spectra Analysis with Constraint Solvers
34. A Combinatorial Approach to Knot Recognition
35. Untangling Braids with Multi-Agent Q-Learning
36. Detecting Unknots via Equational Reasoning, I: Exploration
37. A SAT Attack on the Erdős Discrepancy Conjecture
38. Matrix profile for DDoS attacks detection
39. Proceedings of the 9th International Workshop on Verification and Program Transformation
40. An Overview of Verification and Validation Challenges for Inspection Robots
41. Release-aware In-out Encryption Adjustment in MongoDB Query Processing
42. Planarity of Knots, Register Automata and LogSpace Computability
43. Declarative Abstractions for Agent Based Hybrid Control Systems
44. Reachability as Derivability, Finite Countermodels and Verification
45. Automata on Gauss Words
46. Temporal Verification of Fault-Tolerant Protocols
47. Release-Aware Encryption Adjustment Query processing for Document Database
48. Ontology-based Automation of Penetration Testing
49. Membership and Reachability Problems for Row-Monomial Transformations
50. Monodic ASMs and Temporal Verification
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.