発行日 | タイトル |
著者 |
1-May-2010 | Program Transformation Templates for Tupling Based on Term Rewriting | Chiba, Yuki; Aoto, Takahito; Toyama, Yoshihito |
2010 | Proof Score Approach to Analysis of Electronic Commerce Protocols | Ogata, Kazuhiro; Futatsugi, Kokichi |
1-Dec-2008 | Proof Score Approach to Verification of Liveness Properties | OGATA, Kazuhiro; FUTATSUGI, Kokichi |
21-Jul-2018 | The proof-theoretic strength of Ramsey's theorem for pairs and two colors | Patey, Ludovic; Yokoyama, Keita |
12-Nov-2013 | Propagation of partial randomness | Higuchi, Kojiro; Hudelson, W. M. Phillip; Simpson, Stephen G.; Yokoyama, Keita |
2014 | A Provable Secure Batch Authentication Scheme for EPCGen2 Tags | Chen, Jiageng; Miyaji, Atsuko; Su, Chunhua |
Aug-2002 | Provably Secure Multi-signature Scheme with Signers' Intentions | Kawauchi, Kei; Minato, Hiroshi; Miyaji, Atsuko; Tada, Mitsuru |
2005 | Proving Properties of Incremental Merkle Trees | Ogawa, Mizuhito; Horita, Eiichi; Ono, Satoshi |
Jan-2004 | Pseudo approximation algorithms with applications to optimal motion planning | Asano, Tetsuo; Kirkpatrick, David; Yap, Chee |
Aug-2004 | Pushback機構の一提案とそのモデル化に向けて | 寺田, 剛陽; 双紙, 正和; 宮地, 充子; Terada, Takeaki; Soshi, Masakazu; Miyaji, Atsuko |
12-Nov-2016 | Quality Improvement of Vietnamese HMM-Based Speech Synthesis System Based on Decomposition of Naturalness and Intelligibility using Non-negative Matrix Factorization | Dinh, Anh-Tuan; Phan, Thanh-Son; Akagi, Masato |
25-Jun-2012 | Quantum Monte Carlo study of high-pressure cubic TiO_2 | Abbasnejad, M.; Shojaee, E.; Mohammadizadeh, M. R.; Alaei, M.; Maezono, Ryo |
29-Aug-2008 | Quantum Monte Carlo study of porphyrin transition metal complexes | Koseki, Jun; Maezono, Ryo; Tachikawa, Masanori; Towler, M. D.; Needs, R. J. |
28-Sep-2012 | Quantum Monte Carlo study of pressure-induced B3−B1 phase transition in GaAs | Ouma, C. N. M.; Mapelu, M. Z.; Makau, N. W.; Amolo, G. O.; Maezono, Ryo |
1-Jun-2014 | An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
18-Nov-2011 | Random Generation and Enumeration of Bipartite Permutation Graphs | Saitoh, Toshiki; Otachi, Yota; Yamanaka, Katsuhisa; Uehara, Ryuhei |
31-May-2018 | Rapid Coverage of Regions of Interest for Environmental Monitoring | Pinkam, Nantawat; Newaz, Abdullah Al Redwan; Jeong, Sungmoon; Chong, Nak Young |
20-Sep-2019 | Rapid Coverage of Regions of Interest for Environmental Monitoring | Pinkam, Nantawat; Newaz, Abdullah Al Redwan; Jeong, Sungmoon; Chong, Nak Young |
2006 | RAPT : A Program Transformation System based on Term Rewriting | Chiba, Yuki; Aoto, Takahito |
Mar-2010 | Rate allocation for 2-user MAC with MMSE turbo equalization | Grossmann, Marcus; Ortlepp, Thomas; Matsumoto, Tad |
5-Sep-2019 | Rate-Distortion and Outage Probability Analyses for Single Helper Assisted Lossy Communications | Lin, Wensheng; Xue, Qiang; He, Jiguang; Juntti, Markku; Matsumoto, Tad |