発行日 | タイトル |
著者 |
2014 | Cell-Paths in Mono- and Bichromatic Line Arrangements in the Plane | Aichholzer, Oswin; Cardinal, Jean; Hackl, Thomas; Hurtado, Ferran; Korman, Matias; Pilz, Alexander; Silveira, Rodrigo; Uehara, Ryuhei; Valtr, Pavl; Birgit Vogtenhuber; Emo Welzl |
Sep-2000 | Channel Identification and Sequential Sequence Estimation Using Antenna Array for Broad-Band Mobile Communications | Matsumoto, Tadashi |
1-Dec-2002 | Characterization and Computation of Steiner Routing Based on Elmore's Delay Model | TAYU, Satoshi; KANEKO, Mineo |
2001 | Characterization of Elliptic Curve Traces under FR-reduction | Miyaji, Atsuko; Nakabayashi, Masaki; Takano, Shunzo |
1992 | Chew's theorem revisited - uniquely normalizing property of nonlinear term rewriting systems | Ogawa, Mizuhito |
2009 | A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length | Emura, Keita; Miyaji, Atsuko; Nomura, Akito; Omote, Kazumasa; Soshi, Masakazu |
2-Jul-2010 | A ciphertext-policy attribute-based encryption scheme with constant ciphertext length | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa; Nomura, Akito; Soshi, Masakazu |
16-Aug-2011 | Classification of change detection and change blindness from near-infrared spectroscopy signals | Tanaka, Hirokazu; Katura, Takusige |
25-Aug-2015 | Classification of Precedents by Modeling Tool for Action and Epistemic State: DEMO | Goto, Tetsuji; Tojo, Satoshi |
2009 | Clause Splitting with Conditional Random Fields | Nguyen, Vinh Van; Nguyen, Minh Le; Shimazu, Akira |
2010 | Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves | Goundar, Raveen Ravinesh; Joye, Marc; Miyaji, Atsuko |
5-Dec-2014 | Cognitive Similarity Grounded by Tree Distance from the Analysis of K.265/300e | Hirata, Keiji; Tojo, Satoshi; Hamanaka, Masatoshi |
18-Feb-2003 | A Collaborative Multi-site Teleoperation over an ISDN | Chong, Nak Young; Kotoku, Tetsuo; Ohba, Kohtaro; Komoriya, Kiyoshi; Tanie, Kazuo; Oaki, Junji; Hashimoto, Hideaki; Ozaki, Fumio; Maeda, Katsuhiro; Matsuhira, Nobuto |
17-Mar-2015 | A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 | Chen, Jiageng; Hirose, Shoichi; Kuwakado, Hidenori; Miyaji, Atsuko |
Aug-2007 | Collision prevention platform for a dynamic group of asynchronous cooperative mobile robots | Yared, Rami; Defago, Xavier; Iguchi-Cartigny, Julien; Wiesmann, Matthias |
8-Aug-2011 | Collision Probability in an In-Line Machines Model | Chiba, Eishi; Asano, Tetsuo; Miura, Takeshi; Katoh, Naoki; Mitsuka, Ikuo |
9-Nov-2010 | A Combination of Forward and Backward Reachability Analysis Methods | Ogata, Kazuhiro; Futatsugi, Kokichi |
2003 | Combinatorial and Geometric Problems Related to Digital Halftoning | Asano, Tetsuo; Katoh, Naoki; Obokata, Koji; Tokuyama, Takeshi |
15-Mar-2010 | A Combinatorics Proliferation Model with Threshold for Malware Countermeasure | Omote, Kazumasa; Shimoyama, Takeshi; Torii, Satoru |
Sep-1993 | Combined Adaptive RAKE Diversity (ARD) and Coding for DPSK DS/CDMA Mobile Radio | Higashi, Akihiro; Matsumoto, Tadashi |
20-Jun-1991 | Combined Convolutional Coding/Diversity Reception for QDPSK Land Mobile Radio | MATSUMOTO, Tadashi; ADACHI, Fumiyuki |