Volokyta, Artem
14  Ergebnisse:
Personensuche X
?
1

Method of Automatic Depersonalization of Databases for Appl..:

, In: Advances in Computer Science for Engineering and Education VI; Lecture Notes on Data Engineering and Communications Technologies,
Volokyta, Artem ; Lipska, Vlada - p. 774-787 , 2023
 
?
2

Methods of Topological Organization Synthesis Based on Tree..:

, In: Advances in Computer Science for Engineering and Education VI; Lecture Notes on Data Engineering and Communications Technologies,
 
?
3

Topology Synthesis Method Based on Excess De Bruijn and Dra..:

, In: Advances in Computer Science for Engineering and Education IV; Lecture Notes on Data Engineering and Communications Technologies,
Loutskii, Heorhii ; Volokyta, Artem ; Rehida, Pavlo... - p. 315-325 , 2021
 
?
4

Method for Synthesis Scalable Fault-Tolerant Multi-level To..:

, In: Advances in Computer Science for Engineering and Education III; Advances in Intelligent Systems and Computing,
Loutskii, Heorhii ; Volokyta, Artem ; Rehida, Pavlo.. - p. 350-362 , 2020
 
?
5

Routing Method Based on the Excess Code for Fault Tolerant ..:

, In: Advances in Computer Science for Engineering and Education II; Advances in Intelligent Systems and Computing,
 
?
6

Increasing the fault tolerance of distributed systems for t..:

, In: 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT),
 
?
7

Notice of Violation of IEEE Publication Principles: Securit..:

, In: Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems,
Mukhin, Vadym ; Volokyta, Artem - p. 737-742 , 2011
 
?
8

Research and Development of a Stereo Encoder of a FM-Transm..:

, In: Advances in Intelligent Systems and Computing; Advances in Computer Science for Engineering and Education,
 
?
13

Development of Real TIME Method of Detecting Attacks Based ..:

Loutskii, H. (Heorhii) ; Volokyta, A. (Artem) ; Yakushev, O. (Oleksandr)..
https://www.neliti.com/publications/312154/development-of-real-time-method-of-detecting-attacks-based-on-artificial-intelli.  , 2016
 
1-14