callback( { "result":{ "query":":facetid:toc:\"db/conf/fruct/fruct2016.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"82.45" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"60", "@dc":"60", "@oc":"60", "@id":"43382836", "text":":facetid:toc:db/conf/fruct/fruct2016.bht" } }, "hits":{ "@total":"60", "@computed":"60", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"3247414", "info":{"authors":{"author":[{"@pid":"185/6375","text":"Ainur Abdrashitov"},{"@pid":"164/9818","text":"Anton Spivak"}]},"title":"Sensor data anonymization based on genetic algorithm clustering with L-Diversity.","venue":"FRUCT","pages":"3-8","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/AbdrashitovS16","doi":"10.1109/FRUCT-ISPIT.2016.7561500","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561500","url":"https://dblp.org/rec/conf/fruct/AbdrashitovS16"}, "url":"URL#3247414" }, { "@score":"1", "@id":"3247416", "info":{"authors":{"author":[{"@pid":"185/6339","text":"Alexander P. Antonov"},{"@pid":"185/6353","text":"Alexey S. Filippov"},{"@pid":"181/4325","text":"Olga V. Mamoutova"}]},"title":"Next generation FPGA-based platform for network security.","venue":"FRUCT","pages":"9-14","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/AntonovFM16","doi":"10.1109/FRUCT-ISPIT.2016.7561501","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561501","url":"https://dblp.org/rec/conf/fruct/AntonovFM16"}, "url":"URL#3247416" }, { "@score":"1", "@id":"3247417", "info":{"authors":{"author":{"@pid":"27/5482","text":"Sergey Baranov"}},"title":"Real-time multi-task simulation in Forth.","venue":"FRUCT","pages":"21-26","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/Baranov16","doi":"10.1109/FRUCT-ISPIT.2016.7561503","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561503","url":"https://dblp.org/rec/conf/fruct/Baranov16"}, "url":"URL#3247417" }, { "@score":"1", "@id":"3247418", "info":{"authors":{"author":[{"@pid":"27/5482","text":"Sergey Baranov"},{"@pid":"181/4352","text":"Victor Nikiforov"}]},"title":"The impact of blocking factor on real-time applications feasibility.","venue":"FRUCT","pages":"15-20","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/BaranovN16","doi":"10.1109/FRUCT-ISPIT.2016.7561502","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561502","url":"https://dblp.org/rec/conf/fruct/BaranovN16"}, "url":"URL#3247418" }, { "@score":"1", "@id":"3247419", "info":{"authors":{"author":[{"@pid":"180/1872","text":"Nurzhan Bazhayev"},{"@pid":"165/7461","text":"Ilya Lebedev"},{"@pid":"180/1846","text":"Irina E. Krivtsova"},{"@pid":"149/2960","text":"Igor A. Zikratov"}]},"title":"Research availability of devices based on wireless networks.","venue":"FRUCT","pages":"27-32","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/BazhayevLKZ16","doi":"10.1109/FRUCT-ISPIT.2016.7561504","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561504","url":"https://dblp.org/rec/conf/fruct/BazhayevLKZ16"}, "url":"URL#3247419" }, { "@score":"1", "@id":"3247421", "info":{"authors":{"author":{"@pid":"185/6301","text":"Kirill Chuvilin"}},"title":"Machine learning approach to automated correction of ETgX documents.","venue":"FRUCT","pages":"33-40","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/Chuvilin16","doi":"10.1109/FRUCT-ISPIT.2016.7561505","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561505","url":"https://dblp.org/rec/conf/fruct/Chuvilin16"}, "url":"URL#3247421" }, { "@score":"1", "@id":"3247424", "info":{"authors":{"author":[{"@pid":"78/11180","text":"Pavel Dovgalyuk"},{"@pid":"136/4254","text":"Denis Dmitriev"},{"@pid":"50/11002","text":"Vladimir Makarov"}]},"title":"Platform-independent reverse debugging of the virtual machines.","venue":"FRUCT","pages":"41-47","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/DovgalyukDM16","doi":"10.1109/FRUCT-ISPIT.2016.7561506","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561506","url":"https://dblp.org/rec/conf/fruct/DovgalyukDM16"}, "url":"URL#3247424" }, { "@score":"1", "@id":"3247427", "info":{"authors":{"author":[{"@pid":"169/3624","text":"Radek Fujdiak"},{"@pid":"144/2408","text":"Pavel Masek"},{"@pid":"64/10428","text":"Petr Mlynek"},{"@pid":"62/4828","text":"Jiri Misurec"},{"@pid":"156/6883","text":"Ammar Muthanna"}]},"title":"Advanced optimization method for improving the urban traffic management.","venue":"FRUCT","pages":"48-53","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/FujdiakMMMM16","doi":"10.1109/FRUCT-ISPIT.2016.7561507","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561507","url":"https://dblp.org/rec/conf/fruct/FujdiakMMMM16"}, "url":"URL#3247427" }, { "@score":"1", "@id":"3247428", "info":{"authors":{"author":[{"@pid":"185/6305","text":"Marsel Galimullin"},{"@pid":"185/6329","text":"Eugeny Kalishenko"},{"@pid":"185/6340","text":"Nikolay Rapotkin"}]},"title":"Performance analysis of thread synchronization strategies in concurrent data structures based on flat-combining.","venue":"FRUCT","pages":"54-59","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/GalimullinKR16","doi":"10.1109/FRUCT-ISPIT.2016.7561508","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561508","url":"https://dblp.org/rec/conf/fruct/GalimullinKR16"}, "url":"URL#3247428" }, { "@score":"1", "@id":"3247429", "info":{"authors":{"author":[{"@pid":"185/6383","text":"Ludmila I. Gerasimova-Meigal"},{"@pid":"185/6336","text":"Anna Fedosova"},{"@pid":"21/9208","text":"Alexander Meigal"}]},"title":"Hand skin temperature: A usability for health care services.","venue":"FRUCT","pages":"60-65","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/Gerasimova-Meigal16","doi":"10.1109/FRUCT-ISPIT.2016.7561509","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561509","url":"https://dblp.org/rec/conf/fruct/Gerasimova-Meigal16"}, "url":"URL#3247429" }, { "@score":"1", "@id":"3247430", "info":{"authors":{"author":[{"@pid":"185/6284","text":"René Haberland"},{"@pid":"19/9960","text":"Kirill Krinkin"},{"@pid":"185/6350","text":"Sergey Ivanovskiy"}]},"title":"Abstract predicate entailment over points-to heaplets is syntax recognition.","venue":"FRUCT","pages":"66-74","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/HaberlandKI16","doi":"10.1109/FRUCT-ISPIT.2016.7561510","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561510","url":"https://dblp.org/rec/conf/fruct/HaberlandKI16"}, "url":"URL#3247430" }, { "@score":"1", "@id":"3247433", "info":{"authors":{"author":[{"@pid":"86/6318","text":"Anton Ivaschenko"},{"@pid":"185/6292","text":"Nikolay Gorbachenko"},{"@pid":"177/1240","text":"Alexandr Kolsanov"},{"@pid":"132/6964","text":"Andrey Kuzmin"}]},"title":"Surgery scene representation in 3D simulation training SDK.","venue":"FRUCT","pages":"75-84","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/IvaschenkoGKK16","doi":"10.1109/FRUCT-ISPIT.2016.7561511","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561511","url":"https://dblp.org/rec/conf/fruct/IvaschenkoGKK16"}, "url":"URL#3247433" }, { "@score":"1", "@id":"3247434", "info":{"authors":{"author":[{"@pid":"86/6318","text":"Anton Ivaschenko"},{"@pid":"135/3339","text":"Andrey Lednev"},{"@pid":"185/6320","text":"Alfiya Diyazitdinova"}]},"title":"P2P outsourcing model for agile project tasks allocation.","venue":"FRUCT","pages":"85-91","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/IvaschenkoLD16","doi":"10.1109/FRUCT-ISPIT.2016.7561512","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561512","url":"https://dblp.org/rec/conf/fruct/IvaschenkoLD16"}, "url":"URL#3247434" }, { "@score":"1", "@id":"3247436", "info":{"authors":{"author":[{"@pid":"32/2769","text":"Alexey M. Kashevnik"},{"@pid":"117/8935","text":"Nikolay Teslya"},{"@pid":"185/6290","text":"Eugeny Yablochnikov"},{"@pid":"181/4398","text":"Valery Arckhipov"},{"@pid":"181/4395","text":"Kirill Kipriyanov"}]},"title":"Hybrid automated line workstations interaction scenario for optical devices assembly.","venue":"FRUCT","pages":"92-99","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/KashevnikTYAK16","doi":"10.1109/FRUCT-ISPIT.2016.7561513","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561513","url":"https://dblp.org/rec/conf/fruct/KashevnikTYAK16"}, "url":"URL#3247436" }, { "@score":"1", "@id":"3247438", "info":{"authors":{"author":[{"@pid":"39/8904","text":"Anatoly D. Khomonenko"},{"@pid":"249/9063","text":"Sergey I. Gindin"}]},"title":"Performance evaluation of cloud computing accounting for expenses on information security.","venue":"FRUCT","pages":"100-105","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/KhomonenkoG16","doi":"10.1109/FRUCT-ISPIT.2016.7561514","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561514","url":"https://dblp.org/rec/conf/fruct/KhomonenkoG16"}, "url":"URL#3247438" }, { "@score":"1", "@id":"3247440", "info":{"authors":{"author":[{"@pid":"185/6356","text":"Vyacheslav P. Klimentyev"},{"@pid":"46/9878","text":"Alexander B. Sergienko"}]},"title":"Detection of SCMA signal with channel estimation error.","venue":"FRUCT","pages":"106-112","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/KlimentyevS16","doi":"10.1109/FRUCT-ISPIT.2016.7561515","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561515","url":"https://dblp.org/rec/conf/fruct/KlimentyevS16"}, "url":"URL#3247440" }, { "@score":"1", "@id":"3247441", "info":{"authors":{"author":[{"@pid":"120/1897","text":"Maxim Kolchin"},{"@pid":"168/7761","text":"Nikolay Klimov"},{"@pid":"168/7431","text":"Ivan Shilin"},{"@pid":"168/7665","text":"Daniil Garayzuev"},{"@pid":"162/7819","text":"Alexey Andreev"}]},"title":"Unequal temperature changes in city: A case study using a semantic IoT platform.","venue":"FRUCT","pages":"113-119","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/KolchinKSGA16","doi":"10.1109/FRUCT-ISPIT.2016.7561516","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561516","url":"https://dblp.org/rec/conf/fruct/KolchinKSGA16"}, "url":"URL#3247441" }, { "@score":"1", "@id":"3247443", "info":{"authors":{"author":[{"@pid":"141/1975","text":"Maria Komar"},{"@pid":"158/4002","text":"Sviatoslav Edelev"},{"@pid":"10/5061","text":"Yevgeni Koucheryavy"}]},"title":"Handheld wireless authentication key and secure documents storage for the Internet of Everything.","venue":"FRUCT","pages":"120-130","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/KomarEK16","doi":"10.1109/FRUCT-ISPIT.2016.7561517","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561517","url":"https://dblp.org/rec/conf/fruct/KomarEK16"}, "url":"URL#3247443" }, { "@score":"1", "@id":"3247444", "info":{"authors":{"author":[{"@pid":"185/6309","text":"Aleksey Kondratyev"},{"@pid":"185/6286","text":"Igor Tishchenko"}]},"title":"Concept of distributed processing system of images flow in terms of π-calculus.","venue":"FRUCT","pages":"131-137","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/KondratyevT16","doi":"10.1109/FRUCT-ISPIT.2016.7561518","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561518","url":"https://dblp.org/rec/conf/fruct/KondratyevT16"}, "url":"URL#3247444" }, { "@score":"1", "@id":"3247445", "info":{"authors":{"author":[{"@pid":"09/9959","text":"Dmitry G. Korzun"},{"@pid":"181/4338","text":"Sergey A. Marchenkov"},{"@pid":"181/4381","text":"Andrey S. Vdovenko"},{"@pid":"185/6334","text":"Andrey N. Borodulin"},{"@pid":"87/873","text":"Sergey I. Balandin"}]},"title":"Performance evaluation of smart-M3 applications: A SmartRoom case study.","venue":"FRUCT","pages":"138-144","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/KorzunMVBB16","doi":"10.1109/FRUCT-ISPIT.2016.7561519","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561519","url":"https://dblp.org/rec/conf/fruct/KorzunMVBB16"}, "url":"URL#3247445" }, { "@score":"1", "@id":"3247447", "info":{"authors":{"author":[{"@pid":"181/4368","text":"Kirill A. Kulakov"},{"@pid":"181/4385","text":"Oksana B. Petrina"},{"@pid":"09/9959","text":"Dmitry G. Korzun"},{"@pid":"185/6338","text":"Aleksey G. Varfolomeyev"}]},"title":"Towards an understanding of smart service: The case study for cultural heritage e-Tourism.","venue":"FRUCT","pages":"145-152","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/KulakovPKV16","doi":"10.1109/FRUCT-ISPIT.2016.7561520","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561520","url":"https://dblp.org/rec/conf/fruct/KulakovPKV16"}, "url":"URL#3247447" }, { "@score":"1", "@id":"3247453", "info":{"authors":{"author":{"@pid":"169/2284","text":"Maxim Lapaev"}},"title":"Automated extraction of concept matcher thesaurus from semi-structured catalogue-like sources of data on the web.","venue":"FRUCT","pages":"153-160","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/Lapaev16","doi":"10.1109/FRUCT-ISPIT.2016.7561521","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561521","url":"https://dblp.org/rec/conf/fruct/Lapaev16"}, "url":"URL#3247453" }, { "@score":"1", "@id":"3247455", "info":{"authors":{"author":[{"@pid":"165/7461","text":"Ilya Lebedev"},{"@pid":"166/7797","text":"Viktoria M. Korzhuk"},{"@pid":"180/1846","text":"Irina E. Krivtsova"},{"@pid":"185/6299","text":"Kseniya I. Salakhutdinova"},{"@pid":"180/1855","text":"Mikhail E. Sukhoparov"},{"@pid":"185/6346","text":"Daniil Tikhonov"}]},"title":"Using preventive measures for the purpose of assuring information security of wireless communication channels.","venue":"FRUCT","pages":"167-173","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/LebedevKKSST16","doi":"10.1109/FRUCT-ISPIT.2016.7561523","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561523","url":"https://dblp.org/rec/conf/fruct/LebedevKKSST16"}, "url":"URL#3247455" }, { "@score":"1", "@id":"3247456", "info":{"authors":{"author":[{"@pid":"181/4853","text":"Anton Lebedev"},{"@pid":"252/7259","text":"Vladimir A. Pavlov"},{"@pid":"02/5690","text":"Vladimir V. Khryashchev"},{"@pid":"181/4400","text":"Olga Stepanova"}]},"title":"Face detection algorithm based on a cascade of ensembles of decision trees.","venue":"FRUCT","pages":"161-166","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/LebedevPKS16","doi":"10.1109/FRUCT-ISPIT.2016.7561522","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561522","url":"https://dblp.org/rec/conf/fruct/LebedevPKS16"}, "url":"URL#3247456" }, { "@score":"1", "@id":"3247457", "info":{"authors":{"author":[{"@pid":"17/8180","text":"Nikolai Lebedev"},{"@pid":"133/5171","text":"Ivan Timofeev"},{"@pid":"185/6324","text":"Iuliia Zavialova"}]},"title":"Design and implementation of the first aid assistance service based on Smart-M3 platform.","venue":"FRUCT","pages":"174-180","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/LebedevTZ16","doi":"10.1109/FRUCT-ISPIT.2016.7561524","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561524","url":"https://dblp.org/rec/conf/fruct/LebedevTZ16"}, "url":"URL#3247457" }, { "@score":"1", "@id":"3247458", "info":{"authors":{"author":[{"@pid":"162/4026","text":"Alla Levina"},{"@pid":"185/6325","text":"Daria Sleptsova"},{"@pid":"22/10621","text":"Oleg Zaitsev"}]},"title":"Side-channel attacks and machine learning approach.","venue":"FRUCT","pages":"181-186","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/LevinaSZ16","doi":"10.1109/FRUCT-ISPIT.2016.7561525","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561525","url":"https://dblp.org/rec/conf/fruct/LevinaSZ16"}, "url":"URL#3247458" }, { "@score":"1", "@id":"3247459", "info":{"authors":{"author":[{"@pid":"162/4026","text":"Alla Levina"},{"@pid":"162/4015","text":"Sergey V. Taranov"}]},"title":"New construction of algebraic manipulation detection codes based on wavelet transform.","venue":"FRUCT","pages":"187-192","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/LevinaT16","doi":"10.1109/FRUCT-ISPIT.2016.7561526","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561526","url":"https://dblp.org/rec/conf/fruct/LevinaT16"}, "url":"URL#3247459" }, { "@score":"1", "@id":"3247461", "info":{"authors":{"author":[{"@pid":"141/1273","text":"Anton Makarov"},{"@pid":"98/10359","text":"Elena S. Yakovleva"}]},"title":"Comparative analysis of halftoning algorithms for digital watermarking.","venue":"FRUCT","pages":"193-199","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/MakarovY16","doi":"10.1109/FRUCT-ISPIT.2016.7561527","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561527","url":"https://dblp.org/rec/conf/fruct/MakarovY16"}, "url":"URL#3247461" }, { "@score":"1", "@id":"3247463", "info":{"authors":{"author":[{"@pid":"144/2408","text":"Pavel Masek"},{"@pid":"169/3624","text":"Radek Fujdiak"},{"@pid":"169/3618","text":"Krystof Zeman"},{"@pid":"83/10428","text":"Jiri Hosek"},{"@pid":"156/6883","text":"Ammar Muthanna"}]},"title":"Remote networking technology for IoT: Cloud-based access for AllJoyn-enabled devices.","venue":"FRUCT","pages":"200-205","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/MasekFZHM16","doi":"10.1109/FRUCT-ISPIT.2016.7561528","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561528","url":"https://dblp.org/rec/conf/fruct/MasekFZHM16"}, "url":"URL#3247463" }, { "@score":"1", "@id":"3247464", "info":{"authors":{"author":[{"@pid":"m/OlegMaslennikov","text":"Oleg Maslennikov"},{"@pid":"185/6377","text":"Igor Komarov"}]},"title":"Efficiency metrics for flocking with implicit leadership.","venue":"FRUCT","pages":"206-211","year":"2016","type":"Conference and Workshop Papers","access":"open","key":"conf/fruct/MaslennikovK16","doi":"10.1109/FRUCT-ISPIT.2016.7561529","ee":"https://doi.org/10.1109/FRUCT-ISPIT.2016.7561529","url":"https://dblp.org/rec/conf/fruct/MaslennikovK16"}, "url":"URL#3247464" } ] } } } )