443 | -- | 453 | Petr N. Devyanin, Alexey V. Khoroshilov, Victor V. Kuliamin, Alexander K. Petrenko, Ilya V. Shchepetkov. Integrating RBAC, MIC, and MLS in Verified Hierarchical Security Model for Operating System |
454 | -- | 462 | Vyatcheslav I. Gonakhchyan. Occlusion Culling Algorithm Based on Software Visibility Checks |
463 | -- | 472 | Yury L. Karpov, I. A. Volkova, A. A. Vylitok, Leonid E. Karpov, Yuri G. Smetanin. Designing Interfaces for Classes of a Neural Network Graph Model |
473 | -- | 482 | Alexander V. Shokurov, I. V. Abramova, Nikolay P. Varnovsky, Vladimir A. Zakharov. On the Possibility of Secure Program Obfuscation in Some Model of Cloud Computing |