?
Информационно-коммуникационные технологии в управленческой практике
Ч. 1: Web-дизайн.
СПб. :
OOP, 2011.
Kerov L. A.
Kerov L. A., СПб. : Отдел оперативной полиграфии НИУ ВШЭ – Санкт-Петербург, 2011
В учебном пособии рассматриваются практические приемы создания информационных Web-сайтов с использованием инструментальной системы Microsoft Visual Studio. Излагаются основные понятия компьютерных сетей, теги HTML-разметки Web-страниц, создание таблиц стилей с использованием визуального дизайнера, разработка визуального дизайна Web-сайта и хостинг Web-сайта с HTML-страницами. Приводятся схема функционирования Web-сайтов с HTML‑страницами и схема функционирования Web-сайтов c активными серверными страницами. Даются ...
Added: March 19, 2013
Krasilnikov A., Вопросы информатизации образования 2010 № 15
С появлением у массового пользователя компьютерных технологий, образовательный процесс, традиционно лояльный к инновациям, начинает адаптировать классические печатные учебные пособия к электронному виду. Появление первых версий графических операционных систем дало возможность создавать наглядные и простые в использовании образовательные оболочки. В этот период образовательные оболочки создавались как обычные программы, с минимальным дизайном и четко типизированными элементами. Как ...
Added: November 27, 2012
Маевский Ф. В., Федерализм 2010 № 2 С. 211-215
Basing on N. Kondratiev's theory of long waves, the author describes possible causes of the global financial crisis and notes that we are experiencing a time of "innovation pause. Cloud computing technology could serve as a force of changes, which can give a new impetus to information technologies development. ...
Added: October 12, 2012
Kerov L. A., Saarbrucken : LAP LAMBERT Academic Publishing, 2015
In the book iterative process of system engineering of the business information resources management, based on use of system of models is considered. At an analysis stage of requirements the conceptual model of information resources of business in the form of ER-model is developed. In the given work the original notation of ER-diagrams based on ...
Added: January 27, 2015
Silakov D., Системный администратор 2018 № 6 С. 24-28
CentOS 7 was released in 2014, but many system administrators still use the old CentOS 6.x. The more so since updates for CentOS 6 are going to be released till the year 2020. There are a lot of reasons to use the old version, but one of the major ones is significants of functional changes ...
Added: October 19, 2018
Wien : DAAAM International Vienna, 2017
The use of cloud computing to ensure interaction between the state and citizens allows to speed up information interaction, to realize state services, to reduce the costs of providing such interaction, but at the same time this interaction raises important questions about the reliability of the cloud provider and security of interaction. Providers of the ...
Added: February 1, 2018
Пермь : Пермский государственный национальный исследовательский университет, 2018
В сборник включены статьи, относящиеся к следующим направлениям научной работы: моделирование и анализ процессов и систем; разработка, анализ и тестирование программных систем, методы и инструментальные средства разработки программных систем.
Представлены результаты выполнения проектов, поддержанных грантами РФФИ (проекты № 18-01-00359, № 18-37-00070) и научного фонда НИУ ВШЭ (проект № 17-05-0020).
Материалы сборника могут представлять интерес для научных работников, специалистов ...
Added: December 16, 2018
L. : IEEE, 2016
IntelliSys 2016 conference will focus on areas of intelligent systems and artificial intelligence and how it applies to the real world. It is an opportunity for researchers in this field to meet and discuss solutions, scientific results, and methods in solving important problems in this field. Conference Topics include, but are not limited to: Artificial ...
Added: February 25, 2017
Babash A. V., М. : ИНФРА-М, РИОР, 2013
Пособие предназначено для студентов высших учебных заведений, обучающихся по специальности «Прикладная информатика (в экономике)». Оно также содержит методический материал для ряда инновационных курсов лекций по профилю «Информационная безопасность» и может быть использовано и для блока дисциплин этого профиля. Ряд представленных результатов полезен специалистам и аспирантам, специализирующихся в указанной области. ...
Added: January 14, 2014
Aier S., Gordijn J., Proper H. . et al., IEEE Computer Society, 2020
The 22nd IEEE International Conference on Business Informatics (IEEE CBI 2020) was held June 22–24, 2020. This time, the conference was hosted by the University of Antwerp, Belgium but due to the COVID-19 pandemic, the conference was organized online. While this is not the preferred format of an academic conference, it provided the opportunity to ...
Added: July 13, 2020
Baranov P., Системы высокой доступности 2014 № 4 С. 94-98
During creation of a centralized identity management IT-service the IT-project's management division faces necessity of making a number of decisions that influence the project as a whole and could be crucial for its overall success. These decisions include: automation processes' selection (creation, modification, removal of user identities, user rights' reconciliation), managed IT-systems' user rights role ...
Added: February 11, 2015
Fuad Aleskerov, Demin S., Shvydun S., SN Computer Science 2020 Vol. 1 No. 2 Article 68
The paper examines the choice problem when the total number of observations and criteria is too large. There are many different procedures, which are used for decision-making process under multiple criteria; however, most of them cannot be applied to large datasets due to their computational complexity while others provide sufficient accuracy. To solve the problem, ...
Added: February 20, 2020
NY : IEEE Computer Society, 2018
WF-IoT 2018, the 4th IEEE World Forum on Internet of Things, is the premier IEEE Forum for the Internet of Things. It is where conference attendees, from around the globe - including research institutes, academia, industry and the public sector -- share their knowledge, expertise and experiences about IoT technologies, applications, economic impacts, and social ...
Added: February 14, 2018
Samodurov V., Kornilov V., Isaev E., Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
Samodurov V., Kornilov V., Isaev E., Проблемы информационной безопасности. Компьютерные системы 2014 № 4 С. 176-186
The main threats to the reliability and information security data centers are designated and systematized. In first there are the technical threat of failure of the life support systems of various DC: server nodes, power system, air-conditioning, fire-fighting, provider's lines, cable systems, etc. In second there are external threats: in particular, the threat of DDoS-attacks ...
Added: February 19, 2015
Guimarães R. R., Passos L., Filho R. H. et al., IEEE Network 2019 Vol. 33 No. 2 P. 126-131
Distinguishing outliers from normal data in wireless sensor networks has been a big challenge in the anomaly detection domain, mostly due to the nature of the anomalies, such as software or hardware failures, reading errors or malicious attacks, just to name a few. In this article, we introduce an anomaly detection-based OPF classifier in the ...
Added: December 19, 2018
Silakov D., Системный администратор 2018 № 10 С. 34-39
С ростом популярности контейнеризации приложений растет спрос на приложения, способные управлять большим количеством контейнеров. На слуху прежде всего Kubernetes и Docker Swarm. Однако у них есть и другие достойные открытые конкуренты. В этой статье мы рассмотрим Mesos, развиваемый фондом Apache ...
Added: February 20, 2019
Akopov A. S., Beklaryan L. A., Saghatelyan A. K., Environmental Modelling and Software 2019 Vol. 116 P. 7-25
Urban greenery such as trees can effectively reduce air pollution in a natural and eco-friendly way. However, how to spatially locate and arrange greenery in an optimal way remains as a challenging task. We developed an agent-based model of air pollution dynamics to support the optimal allocation and configuration of tree clusters in a city. The Pareto ...
Added: February 24, 2019
Vikentyeva O., Deryabin A. I., Shestakova L. V., International Journal "Information Theories and Applications" 2015 Т. 22 № 2 С. 169-182
In this paper we continue the investigation related to the develpoment of tools for the design and implementation of computer business games, aimed at creating a certain level of competence in the process of realization of the scenarios defined by models of applied domain. ...
Added: July 15, 2015
Serova E., Guryeva I., Khvatova T., International Journal of Technology and Human Interaction 2018
In such a socially significant sphere as healthcare industry, innovation activity has become vital especially in such areas as automation of physician working place, creation of unified electronic medical record, distribution of intelligent decision support systems for medical solutions, application and wide dissemination of new medical technologies, telemedicine development. The intersection of medicine and ICT ...
Added: March 15, 2018
Хивинцев М. А., Akopov A. S., Бизнес-информатика 2013 № 3(25) С. 35-41
In the article is presented a novel approach to the solution of multi-objective optimizing problems of large-scale dimension systems realized, in particular, in the simulation systems of the class AnyLogic through distributed calculations. A new concept of creation of the distributed evolutionary network is suggested, based on splitting of space of required variables into clusters ...
Added: October 3, 2013
Zharova A. K., Бизнес-информатика 2011 № 3 С. 60-65
In a relationship, involving the use of digital product in the Internet environment, involving different actors. There is legal classification of the subjects of service providers in the article.
There is comparative legal analysis of information legislation in Russia and U.S. and the Directive on electronic commerce EU 2000/31/EC conducted in the article. Points to the ...
Added: September 27, 2012
Красноярск : ИВМ СО РАН, 2013
Труды Пятой Международной конференции «Системный анализ и информационные технологии» САИТ-2013 (19–25 сентября 2013 г., г.Красноярск, Россия): ...
Added: November 18, 2013