Vol. 56, No. 7, 2022
On the Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations
p. 595 abstract
Online Testing of Dynamic Reconfigurations w.r.t. Adaptation Policies
p. 606 abstract
An Algorithm for Finding Feedback in a Problem with Constraints for One Class of Nonlinear Control Systems
p. 623 abstract
Autotuning Parallel Programs by Model Checking
p. 634 abstract
Satisfiability and Model Checking for One Parameterized Extension of Linear Temporal Logic
p. 649 abstract
An Algorithm for Estimating the Signal Frequency at the Output of a Channel with a Controlled Information Flow under Phase Noise
p. 661 abstract
Towards Automatic Deductive Verification of C Programs with Sisal Loops Using the C-lightVer System
p. 669 abstract
Backtracking Algorithms for Constructing the Hamiltonian Decomposition of a 4-Regular Multigraph
p. 688 abstract
An Algorithm for Correcting Levels of Useful Signals on Interpretation of Eddy-Current Defectograms
p. 701 abstract
LTL-Specification of Counter Machines
p. 711 abstract
Assessing Flaw Severity on Interpretation of Eddy-Current Defectograms
p. 723 abstract
Text Classification by Genres Based on Rhythmic Characteristics
p. 735 abstract
Analysis of the Influence of Mixed-Level Stylometric Characteristics on the Verification of Authors of Literary Works
p. 744 abstract
A Mathematical Model of Parallel Programs and an Approach to Verification of MPI Programs Based on the Proposed Model
p. 762 abstract
On Properties of a Regular Simplex Inscribed into a Ball
p. 778 abstract
NP-Completeness of the Minimum Spanning Tree Problem of a Multiple Graph of Multiplicity k ≥ 3
p. 788 abstract
Computational Analysis of Quantitative Characteristics of Some Residual Properties of Solvable Baumslag–Solitar Groups
p. 800 abstract
Identification Conditions for the Solvability of NP-Complete Problems for the Class of Prefractal Graphs
p. 807 abstract
Transformation of Functional Dataflow Parallel Programs into Imperative Programs
p. 815 abstract
Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code
p. 828 abstract