JAIST Repository >

Browse by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:   

Showing items 4269-4289 of 17455.

Previous page Next page
Date of IssueTitle Authors
30-Oct-2021 SDGs・デジタル時代における、需要の特性やニーズに応じた電力供給のあり方についての考察満保, 智之
25-Jul-1997 Second order tangent sets and optimality conditionsCambini, Alberto; Martein, Laura; Vlach, Milan
Nov-2005 The Second Scientific Revolution in Capital Letters : Informatic TurnYoshida, Tamito; Jifa, Gu; Gerhard, Chroust
9-Jun-2017 Second-order nonlinear optical microscopy of spider silkZhao, Yue; Hien, Khuat Thi Thu; Mizutani, Goro; Rutt, Harvey N.
Aug-2002 A Second-price Sealed-bid Auction with Public VerifiabilityOmote, Kazumasa; Miyaji, Atsuko
2003 A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th RootOmote, Kazumasa; Miyaji, Atsuko
21-Oct-2006 Sectoral Innovation System in Software in Asian CountriesMIYAZAKI, Kumiko; KLINCWEICZ, Krzysztof
Nov-2005 Sectoral System of Innovation in China - the Case of Software SectorQiong, Wu; Miyazaki, Kumiko; Jifa, Gu; Gerhard, Chroust
2012 A Secure and private RFID authentication protocol under SLPN problemMamun, Mohammad S. I.; Miyaji, Atsuko; Rahman, Mohammad S.
Aug-2006 Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPAMAMIYA, Hideyo; MIYAJI, Atsuko; MORIMOTO, Hiroaki
Mar-2009 A Secure RFID Authentication Protocol with Low Communication CostRahman, Mohammad Shahriar; Soshi, Masakazu; Miyaji, Atsuko
Mar-2015 Secure sets and defensive alliances in graphs: A faster algorithm and improved boundsAmano, Kazuyuki; Oo, Kyaw May; Otachi, Yota; Uehara, Ryuhei
Jul-2014 Secure VANET Applications with a refined Group SignatureIslam Mamun, Mohammad Saiful; Miyaji, Atsuko
Oct-2008 Security and Access Control for Vehicular CommunicationsZrelli, Saber; Miyaji, Atsuko; Shinoda, Yoichi; Ernst, Thierry
22-May-2016 Security and Experimental Performance Analysis of a Matrix ORAMGordon, Steven; Miyaji, Atsuko; Su, Chunhua; Sumongkaoythin, Karin
Sep-2007 The security of RC6 against asymmetric Chi-square test attackHinoue, Tomohiko; Miyaji, Atsuko; Wada, Takatomi
Oct-2020 Segment-level Effects of Gender, Nationality and Emotion Information on Text-independent Speaker VerificationLi, Kai; Akagi, Masato; Wu, Yibo; Dang, and Jianwu
Mar-2017 Segmentation of molar and premolar teeth of the lower jaw from panoramic radiographs for the forensic processHasan, Md Mosaddik; はさん, えむでぃー もっさでぃく
22-Jul-2011 Segregation Behavior of Polyethylene with Broad Molecular Weight Distribution by Annealing Procedure in Temperature GradientSiriprumpoonthum, Monchai; Mieda, Naoya; Nobukawa, Shogo; Yamaguchi, Masayuki
2009 A Selectable k-Times Relaxed Anonymous Authentication SchemeEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa
Mar-2016 Selection Criteria of Sharing Accommodation: Host-Guest Relationship in AirbnbJavaid, Ahson
Previous page Next page


Contact : Library Information Section, Japan Advanced Institute of Science and Technology