Vladimir Mulukha

Orcid: 0000-0002-3583-7324

According to our database1, Vladimir Mulukha authored at least 25 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BENK: The Beran Estimator with Neural Kernels for Estimating the Heterogeneous Treatment Effect.
Algorithms, 2024

2023
Improved Anomaly Detection by Using the Attention-Based Isolation Forest.
Algorithms, January, 2023

LARF: Two-Level Attention-Based Random Forests with a Mixture of Contamination Models.
Informatics, 2023

Neural Attention Forests: Transformer-Based Forest Improvement.
CoRR, 2023

Multiple Instance Learning with Trainable Soft Decision Tree Ensembles.
Algorithms, 2023

GBMILs: Gradient Boosting Models for Multiple Instance Learning.
Proceedings of the Interactive Collaborative Robotics - 8th International Conference, 2023

2021
Gradient Boosting Machine with Partially Randomized Decision Trees.
Proceedings of the 28th Conference of Open Innovations Association, 2021

2020
Anomaly Detection Approach in Cyber Security for User and Entity Behavior Analytics System.
Proceedings of the 28th European Symposium on Artificial Neural Networks, 2020

2019
Preemptive Priority Queuing System with Randomized Push-Out Mechanism and Negative Customers.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2019

An Intelligent Method for Comparing Shapes of Three-Dimensional Objects.
Proceedings of the 25th Conference of Open Innovations Association, 2019

Database Acquisition for the Lung Cancer Computer Aided Diagnostic Systems.
Proceedings of the 25th Conference of Open Innovations Association, 2019

2018
The Phenomenon of Secondary Flow Explosion in Retrial Priority Queueing System with Randomized Push-Out Mechanism.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2018

2017
Communication Technologies in the Space Experiment "Kontur-2".
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017

A Retrial Queueing System with Preemptive Priority and Randomized Push-Out Mechanism.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017

Space experiment "Kontur-2": Applied methods and obtained results.
Proceedings of the 21st Conference of Open Innovations Association, 2017

2016
Randomized Priorities in Queuing System with Randomized Push-Out Mechanism.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016

2015
Preemptive queueing system with randomized push-out mechanism.
Commun. Nonlinear Sci. Numer. Simul., 2015

Corrigendum to "Preemptive queueing system with randomized push-out mechanism" [Commun Nonlinear Sci Numer Simulat 21 (2015) 147-158].
Commun. Nonlinear Sci. Numer. Simul., 2015

Cyber-Physical Approach in a Series of Space Experiments "Kontur".
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

Alternating Priorities Queueing System with Randomized Push-Out Mechanism.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

2014
Cyber-Physical Approach to the Network-Centric Robot Control Problems.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2014

Distributed Packet Trace Processing Method for Information Security Analysis.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2014

Further Investigations of the Priority Queuing System with Preemptive Priority and Randomized Push-Out Mechanism.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2014

2011
Dynamic access control in cloud services.
Proceedings of the IEEE International Conference on Systems, 2011

2010
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation.
Proceedings of the 2010 International Conference on Security & Management, 2010


  Loading...