Browsing by Author Urbanovich, P. P.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
А Б В Г Д Е Ж З И Й К Л М Н О П Р С Т У Ф Х Ц Ч Ш Щ Ъ Ы Ь Э Ю Я
or enter first few letters:  
Showing results 13 to 32 of 48 < previous   next >
Issue DateTitleAuthor(s)
2007License Protection of a Component of Web-Applications on .Net FrameworkMakas, S. B.; Urbanovich, P. P.
2012Mathematical foundations of complex desirability function for evalution of the product quality in the relationship with antropogenic impacts on the enviromentBrakovich, Andrei; Kolesnikov, Vitaliy; Urbanovich, P. P.
2009Mathematical model of control points placing for monitoring polluting substances emissions in the atmosphere on the basis of the NP-full coloring graph task decisionBrakovich, A. I.; Urbanovich, P. P.
2018A method of syntactic text steganography based on modification of the document-container aproshShutko, Nadzeya; Urbanovich, P. P.; Zukowski, Pawel
2019Methods, software and hardware tools for cryptocurrency technologiesRąb, P.; Urbanovich, P. P.
2018A model of multi-key steganographic systemUrbanovich, P. P.; Shutko, N. P.; Zapała, A. M.
2016Modeling and software implementation of fibrous waste disposal processesKolesnikov, Vitaliy; Urbanovich, P. P.; Brakovich, Andrei
2015Modeling and Software Implementation of Fibrous Waste Disposal ProcessesKolesnikov, V. L.; Urbanovich, P. P.; Brakovich, D. M.
2007Modeling and the Processes Analysis in Engineering EcologyBrakovich, A. I.; Kolesnikov, V. L.; Romantsevich, A. V.; Urbanovich, P. P.; Zharsky, I. M.
2011Multithreshold majority decoding of LDP-codesUrbanovich, P. P.; Romanenko, D. M.; Shiman, D. V.
2012Multithreshold majority decoding of LDPC-codesUrbanovich, P. P.; Romanenko, D.; Shiman, D.; Vitkova, M.
2004Ochrona informacji w sieciach komputerowychUrbanovich, P. P.
2000On the Design of Error Detection and Correction Cryptography SchemesPatsei, N. V.; Urbanovich, P. P.
2019Security of applications for computer gamesCiesielka, P.; Urbanovich, P. P.
2019Server security of the multiplayer game «PROJECT I.G.I. 2: COVERT STRIKE»Błaszczak, M.; Urbanovich, P. P.
2009Software for modeling the neural-cryptographic systemUrbanovich, P. P.; Lisitsa, E. L.
2011Split-complex numbers in neural cryptographyPłonkowski, M.; Urbanovich, P. P.
2021Steganographic method based on hidden messages embedding into Bezier curves of SVG imagesBlinova, E. A.; Urbanovich, P. P.; Блинова, Е. А.; Урбанович, П. П.
2009Text steganography application for protection and transfer of the informationUrbanovich, P. P.; Chourikov, K. V.; Rima, A. V.; Urbanovich, N. P.
2010Text steganography application for protection and transfer of the informationUrbanovich, P. P.; Chourikov, Konstantin; Rimorev, Andrey; Urbanovich, Nadzeya