Искать
Отображаемые элементы 31-40 из 111
Object-relational data models for real the world
(ХАІ, 2007)
Object oriented programming became very popular in the last years. The idea to imitate real-world patterns
(building systems with interacting objects) in system modeling and software development is yet as simple as
powerful. ...
Normalized rank selection method and its application in design of fault-tolerant PLD-based systems using genetic algorithms
(ХАІ, 2007)
The paper deals with several selection schemes which evolve fault-tolerant PLD-based systems using genetic algorithms.
It has been suggested to use the new normalized rank selection method instead of common rank ...
Features of banking information systems dependability taxonomy
(ХАІ, 2007)
Banking information systems (BIS) evolution history and general structure are considered. The main BIS requirements
are analyzed. The dependability attributes with regard to BIS are determined.
Assessing software vulnerabilities and recovery time using open resources: elements of technique and results
(ХАІ, 2007)
Modern vulnerability resources are considered, their content, security and recovery time of different software
products are analyzed. To make the process smoother and more efficient three main stages are distinguished:
source ...
Fault-tolerant SoPC-based approaches with multi-version IIP
(ХАІ, 2007)
In this paper different approaches of Infrastructure Intellectual Property (IIP) implementation for System-on-
Programmable-Chip (SoPC) are discussed. Several diversity-oriented SoPC approaches and different techniques
of ...
Architecture and implementing service-oriented pharmacological system «medicine»
(ХАІ, 2007)
Present work is devoted to service-oriented systems problems. Particularly, medical web-services are discussed. Information
technologies classification in medicine and urgency of web-services using in medicine are ...
The analysis of vulnerability databases in view of web-services architecture
(ХАІ, 2007)
In this article the comparative analysis of existing vulnerability databases (VDB) is carried out. The traditional
architecture of Web-services is considered. One of the most popular VDB is analyzed in view of ...
The system of the data protection for the critical computer systems in energetic
(ХАІ, 2008)
The system of the data protection for the critical computer systems (Atomic Power Plant) which is transferred
through network Internet, between the atomic power plants and National Committee of the Atom Energetic ...
Medical information systems: analysis of development and application experience
(ХАІ, 2008)
Public Health is one of the main areas, where information technologies are intensively employed. Here we have
reviewed and analyzed a number of foreign and native medical information systems (MIS), experience of ...
Classification of the information integrity recovery methods in the systems of various complexity
(ХАІ, 2008)
The main methods of data recovery are considered, the efficiency analysis according to the cost criteria, recovery speed and ability to apply it to various tasks was carried out.