• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Article
Circular transmission resonances and magnetic field effects in a ring of quantum dots connected to external leads in the meta-configuration
In press

Хэдин Э., Сатанин А. М., Джо Й. С.

Journal of Computational Electronics. 2019. Vol. 18. No. 1. P. 1-15.

Book chapter
Calculation of two-size particles filtration in a porous medium

L I Kuzmina, Osipov Y. V.

In bk.: IOP Conference Series: Materials Science and Engineering, vol. 456. Vol. 456: VII International Symposium Actual Problems of Computational Simulation in Civil Engineering. IOP Publishing, 2018. Ch. 012052. P. 1-6.

Working paper
On conjugacy of stabilizers of reductive group actions

Vladimir L. Popov.

arxiv.org. math. Cornell University, 2019

Tag "computer security" – News

HSE Student Qualifies for the First Time for EU Contest for Young Scientists

Andrey Schebetov, fiirst-year student of the Bachelor’s programme in Computer Security at MIEM HSE
First-year student of the Bachelor’s programme in Computer Security at MIEM HSE, Andrey Schebetov, has joined the team that will represent the Russian Federation at the EU Contest for Young Scientists (EUCYS).

How Not to Fall Victim to a Computer Virus

In the last few days, a very dangerous virus that encrypts all data on computers and demands money for decryption has been appearing on the Internet. Over 300,000 computers have been infected around the world. Computers running Microsoft Windows operating systems are at particular risk. As a result, Microsoft has released an update that eliminates vulnerability.