• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Of all publications in the section: 31 716
Sort:
by name
by year
Book chapter
Архангельский А. Н. В кн.: Интернет-уроки по литературе 5-8 класс. М.: InternetUrok.ru, 2016.
Added: Jan 24, 2017
Book chapter
Архангельский А. Н. В кн.: Интернет-уроки по литературе 5-8 класс. М.: InternetUrok.ru, 2016.
Added: Jan 24, 2017
Book chapter
Архангельский А. Н. В кн.: Интернет-уроки по литературе 5-8 класс. М.: InternetUrok.ru, 2016.
Added: Jan 24, 2017
Book chapter
Архангельский А. Н. В кн.: Интернет-уроки по литературе 5-8 класс. М.: InternetUrok.ru, 2016.
Added: Jan 24, 2017
Book chapter
Архангельский А. Н. В кн.: Интернет-уроки по литературе 5-8 класс. М.: InternetUrok.ru, 2016.
Added: Jan 24, 2017
Book chapter
Архангельский А. Н. В кн.: Интернет-уроки по литературе 5-8 класс. М.: InternetUrok.ru, 2016.
Added: Jan 24, 2017
Book chapter
Архангельский А. Н. В кн.: Интернет-уроки по литературе 5-8 класс. М.: InternetUrok.ru, 2016.
Added: Jan 24, 2017
Book chapter
Архангельский А. Н. В кн.: Интернет-уроки по литературе 5-8 класс. М.: InternetUrok.ru, 2016.
Added: Jan 24, 2017
Book chapter
Абакумова И. В., Берберян Э. С. В кн.: Психология общения и доверия: теория и практика: Сборник материалов Международной конференции УРАО, ПИ РАО, МГУ.- 6-7 ноября 2014 г./ Под ред. Т.П. Скрипкиной. - 777 с.. М.: Университет РАО, 2014. С. 391-395.

Relevance of the work is related to the priority of the new educational paradigm, learner-centered, which aim is to provide the development of personality , the formation of its value-semantic sphere and give the opportunities for self-development and self-realization. Value-semantic sphere of  educational activity subjects, in our study students of different ages and directions, is a key factor in learner-orientated education. Semantic formations as motivational-semantic and value sphere manifestations of the personality are dominant in the regulation of human vital activity (Abakumov IV) and extend the content of the training process- as a special form of culture, as "crystallized meanings" (Leontiev). The aim of our article is to study value-semantic sphere of  of educational activity subjects, in our study, students of different ages and directions.

Added: Dec 1, 2015
Book chapter
Андреев Е., Кваша Е.А., Харькова Т.Л. В кн.: Население России 2010-2011. Восемнадцатый-девятнадцатый ежегодный демографический доклад. М.: Издательский дом НИУ ВШЭ, 2013. С. 385-443.
Added: Jan 23, 2014
Book chapter
Lourié B. In bk.: Studies in Ethiopian Languages, Literature, and History. Festschrift for Getatchew Haile Presented by his Friends and Colleagues. Bk. 83. Wiesbaden: Harrassowitz Verlag, 2017. P. 379-429.

A 364-Day Calendar Encapsulated in the Liturgy of the Seventh Sabbath of the Betä Ǝsra’el of Ethiopia

Added: Oct 18, 2017
Book chapter
Krichever I. M., Shiota T. In bk.: Geometry, Topology, and Mathematical Physics: S. P. Novikov's Seminar: 2006-2007. American Mathematical Society, 2008. Ch. 9. P. 173-192.
We introduce the notion of abelian solutions of KP equations and show that all of them are algebro-geometric.
Added: Apr 18, 2014
Book chapter
Krichever I. M., Shiota T. In bk.: Liaison, Schottky Problem and Invariant Theory. Remembering Federico Gaeta. Basel: Birkhauser/Springer, 2010. P. 197-222.
We introduce the notion of abelian solutions of the 2D Toda lattice equations and the bilinear discrete Hirota equation, and show that all of them are algebro-geometric.
Added: Apr 17, 2014
Book chapter
Skorobogataya A. In bk.: National Minorities, Identity, Education. Prague: Institute of Contemporary Historary of the Academy of Sciences of the Czech Republic, 2011. P. 107-112.
Added: May 30, 2013
Book chapter
Sobolevski A., Khanin K., Khmelev D. V. In bk.: Idempotent mathematics and mathematical physics. Providence: American Mathematical Society, 2005. P. 161-179.

We construct an example of blow-up in a ”ow of min-plus linear operators arising as solution operators for a Hamilton…Jacobi equation @S/@t+|∇S| / + U(x, t) = 0, where > 1 and the potential U(x, t) is uniformly bounded together with its gradient. The construction is based on the fact that, for a suitable potential de“ned on a time interval of length T, the absolute value of velocity for a Lagrangian minimizer can be as large as O􀀀(log T)2−2/ . We also show that this growth estimate cannot be surpassed. Implications of this example for existence of global generalized solutions to randomly forced Hamilton…Jacobi or Burgers equations are discussed.

Added: Apr 29, 2013
Book chapter
Gordin V. A. In bk.: Research activities in atmospheric and oceanic modelling. Iss. 48. Geneva: World Meteorological Organization, 2018. Ch. 1. P. 1.15-1.16.
Added: Jul 13, 2018
Book chapter
Nikitina M., Zolotukhina L. In bk.: The Fourth International Conference “Game Theory and Management”. Iss. 4. St. Petersburg: 2010.

A multivariate generalization of the classical collective risk model is considered. In this model  in which each component is dependent on the others.The exact solutions and asymptotic approximations to the probability of ruin were obtained.

Added: Nov 9, 2014
Book chapter
Krouk E., Ovchinnikov A., Vostokova E. In bk.: 2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY). IEEE, 2016. P. 75-78.

In this paper the modification of McEliece public-key cryptosystem is considered, which uses the codes based on Plotkin construction as the private key, instead of Goppa codes traditionally considered for this purpose. Proposed modification allows strengthening of McEliece cryptosystem by attacks complication based on the secret code structure.

Added: Oct 19, 2018
Book chapter
Krouk E., Ovchinnikov A. In bk.: 2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY). IEEE, 2016. P. 71-74.

In this paper an attack on McEliece cryptosystem is considered. In this system the private and public keys are generator matrices of equivalent codes, i.e. they differ by fixed (secret) permutation. At the same time it is known that for every code there are the group of permutations preserving the code. Such code's structure may be used for analysis of McEliece cryptosystem.

Added: Oct 19, 2018
Book chapter
Irina Karpova. In bk.: Biologically Inspired Cognitive Architectures (BICA) for Young Scientists. Springer, 2017. P. 78-84.

One of the actively developing approaches of group robotics systems creation is the use of social behavior models. Aggressive behavior is one of the underlying mechanisms forming social behavior. In this paper, the application of aggressive behavior concepts is considered by analogy with animal aggressive behavior that can be used for solving tasks of group robotics. As a role model, an ant – a true social insect – is proposed. It was shown that in aggressive behavior of ants, the numerical factor and imitative behavior play an important role. Agent’s aggressive behavior model depending on accumulated aggression and the number of other nearby agents is proposed. The results of computer experiments for territory defense tasks are presented. The results show that aggression is a stabilizing factor for an approximately equal number of agents in different groups. By an increase in group size, aggression becomes a way of capturing foreign territory.

Added: Dec 6, 2017
Book chapter
Lepskiy A. In bk.: Proceedings of the 8th conference of the European Society for Fuzzy Logic and Technology (EUSFLAT-13). Amsterdam; Beijing; P.: Atlantis Press, 2013. P. 355-362.

The conflict measure and index of decreasing of igno-rance in frame of Dempster-Shafer theory are intro-duced. Those functionals are analyzed on the bodies of evidences of special type. It is shown that the great correlation between the bodies of evidence is a sufficient condition of decreasing of ignorance after the applying of combining rule. The relationships between the measure of conflict and the index of decreasing of ignorance in the case of different types of evidences and the application of different combining rules were investigated.

Added: Sep 22, 2013