|
|
Publications in Math-Net.Ru
-
Method for analysis of code-reuse attacks
Proceedings of ISP RAS, 30:5 (2018), 31–54
-
Dynamic detection of use after free bugs
Proceedings of ISP RAS, 30:3 (2018), 7–20
-
Fine-grained address space layout randomization on program load
Proceedings of ISP RAS, 29:6 (2017), 163–182
-
Building security predicates for some types of vulnerabilities
Proceedings of ISP RAS, 29:6 (2017), 151–162
-
Development of parallel software for 3d tornado arising modeling by Nikolaevskiy theory
Mat. Model., 20:8 (2008), 28–40
-
Productivity prediction of MPI programs based on models
Avtomat. i Telemekh., 2007, no. 5, 8–17
-
Data parallel programming in the ParJava system
Num. Meth. Prog., 2:2 (2001), 70–87
-
The choice of optimal nets in the numerical solution of the Cauchy problem for a system of ordinary differential equations
Zh. Vychisl. Mat. Mat. Fiz., 10:2 (1970), 465–474
-
The choice of optimum networks in the approximate calculation of quadratures
Zh. Vychisl. Mat. Mat. Fiz., 9:5 (1969), 1170–1176
-
A certain optimal algorithm for the approximate computation of quadratures
Zh. Vychisl. Mat. Mat. Fiz., 9:5 (1969), 1015–1023
-
Numerical solution of ordinary and partial differential equation. Ed. L. Fox . Book Review
Zh. Vychisl. Mat. Mat. Fiz., 4:3 (1964), 615–617
© , 2026