Author of the publication

Use of Xeon Phi Coprocessor for Solving Global Optimization Problems.

, , and . PaCT, volume 9251 of Lecture Notes in Computer Science, page 307-318. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Trust Management Framework for Robotic Multi-Agent Systems., , , , and . NEW2AN, volume 9870 of Lecture Notes in Computer Science, page 339-348. Springer, (2016)Comparison of Dimensionality Reduction Schemes for Parallel Global Optimization Algorithms., , and . RuSCDays, volume 965 of Communications in Computer and Information Science, page 50-62. Springer, (2018)Globalizer - A Parallel Software System for Solving Global Optimization Problems., , , , and . PaCT, volume 10421 of Lecture Notes in Computer Science, page 492-499. Springer, (2017)Comparing Two Approaches for Solving Constrained Global Optimization Problems., and . LION, volume 10556 of Lecture Notes in Computer Science, page 301-306. Springer, (2017)Self-localization of mobile robot in unknown environment., , , and . FRUCT, page 173-178. IEEE, (2015)The development and research of the indoor navigation system for a mobile robot with the possibility of obstacle detection., , and . FRUCT, page 115-122. IEEE, (2014)Adaptive Global Optimization Using Graphics Accelerators., , and . RuSCDays, volume 1331 of Communications in Computer and Information Science, page 150-161. Springer, (2020)Analysis of the state of information security on the basis of surious emission electronic components., , , , and . FRUCT, page 216-221. IEEE, (2017)Using preventive measures for the purpose of assuring information security of wireless communication channels., , , , , and . FRUCT, page 167-173. IEEE, (2016)An Approach to Selecting an Informative Feature in Software Identification., , , and . NEW2AN, volume 11118 of Lecture Notes in Computer Science, page 318-327. Springer, (2018)