Search
Now showing items 41-50 of 130
The analysis of vulnerability databases in view of web-services architecture
(ХАІ, 2007)
In this article the comparative analysis of existing vulnerability databases (VDB) is carried out. The traditional
architecture of Web-services is considered. One of the most popular VDB is analyzed in view of ...
The system of the data protection for the critical computer systems in energetic
(ХАІ, 2008)
The system of the data protection for the critical computer systems (Atomic Power Plant) which is transferred
through network Internet, between the atomic power plants and National Committee of the Atom Energetic ...
Medical information systems: analysis of development and application experience
(ХАІ, 2008)
Public Health is one of the main areas, where information technologies are intensively employed. Here we have
reviewed and analyzed a number of foreign and native medical information systems (MIS), experience of ...
Classification of the information integrity recovery methods in the systems of various complexity
(ХАІ, 2008)
The main methods of data recovery are considered, the efficiency analysis according to the cost criteria, recovery speed and ability to apply it to various tasks was carried out.
Method of realization of arithmetic operations on the basis of the use of modulyarnoy number system
(ХАІ, 2009)
In this article we consider two arithmetic operation realizations in modular arithmetics, based on the ring shift
principle. The method of binary position and remainder encoding has proved to be very efficient comparing ...
Информационная технология для системы поддержки принятия решений по отбору кадров при выполнении работ повышенной опасности
(ХАІ, 2010)
Предложена информационная технология «PROFITNESS» для решения задачи профессионального психофизиологического отбора кадров, выполняющих работы повышенной опасности, с целью усовершенствования метода определения профпригодности. ...
Event-B patterns for developing FPGA-BASED hardware
(ХАІ, 2010)
The paper describes the first step of methodology for designing dependable hardware which is based on field programmable gate array technology. This step means the development of patterns using Event-B language useful ...
About static analysis of variables physical dimensions for critical-mission software
(ХАІ, 2010)
Some strong method of static code analysis, namely, analysis of physical dimensions of program variables is researched in the paper. The formal model to analyze the dimensions of variables is built.
Instability analysis of delays contributing to web service response time
(ХАІ, 2010)
This paper reports our practical experience of benchmarking a complex System Biology Web Service, and investigates the instability of its behaviour and the delays induced by the communication medium.
Multi version service oriented architechtures dependability analisys
(ХАІ, 2010)
This article is targeted on investigating the web-services dependability problem and, in particular, the reasonableness of multi version architecture usage to solve it and guarantee the customer he is safe while using the ...