JAIST Repository >
b. 情報科学研究科・情報科学系 >
b10. 学術雑誌論文等 >
b10-1. 雑誌掲載論文 >

一覧: タイトル

移動先: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
タイトルの先頭数文字を入力して移動:   

検索結果: 136-156 / 919.

前ページ 次ページ
発行日タイトル 著者
Jan-2017 Cooperative distributed control implementation of the power flow coloring over a Nano-grid with fluctuating power loadsJavaid, Saher; Kurose, Yuhei; Kato, Takekazu; Matsuyama, Takashi
10-Aug-2021 Cooperative Lossy Communications in Unmanned Aerial Vehicle Networks: Age-of-Information with Outage ProbabilityLin, Wensheng; Li, Lixin; Yuan, Jinhong; Han, Zhu; Juntti, Markku; Matsumoto, Tad
Mar-1999 Cooperative Signal Reception and Down-Link Beam Forming in Cellular Mobile CommunicationsAsakura, Hiromitsu; Matsumoto, Tadashi
21-Jan-2014 Correlated Sources Transmission in Orthogonal Multiple Access Relay Channel: Theoretical Analysis and Performance EvaluationZhou, Xiaobo; Lu, Pen-Shun; Anwar, Khoirul; Matsumoto, Tad
16-May-2010 The cost of probabilistic agreement in oblivious robot networksClement, Julien; Defago, Xavier; Potop-Butucaru, Maria Gradinariu; Izumi, Taisuke; Messika, Stephane
Jun-2008 Counting the number of independent sets in chordal graphsOkamoto, Yoshio; Uno, Takeaki; Uehara, Ryuhei
Feb-2013 Coverage with k-Transmitters in the Presence of ObstaclesBallinger, Brad; Benbernou, Nadia; Bose, Prosenjit; Damian, Mirela; Demaine, Erik D.; Dujmović, Vida; Flatland, Robin; Hurtado, Ferran; Iacono, John; Lubiw, Anna; Morin, Pat; Sacristán, Vera; Souvaine, Diane; Uehara, Ryuuhei
27-Apr-2019 Cross-correlation task-related component analysis (xTRCA) for enhancing evoked and induced responses of event-related potentialsTanaka, Hirokazu; Miyakoshi, Makoto
2-Mar-2021 Cross-Lingual Voice Conversion With Controllable Speaker Individuality Using Variational Autoencoder and Star Generative Adversarial NetworkHo, Tuan Vu; Akagi, Masato
Jan-2003 Cryptanalysis of Reduced-Round RC6 without WhiteningMIYAJI, Atsuko; NONAKA, Masao; TAMURA, Yuko; SHIOTSUKI, Toru; MIYAJI, Atsuko
1-Dec-2012 Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery AttackChen, Jiageng; Miyaji, Atsuko
2002 Cryptanalysis of the reduced-round RC6Miyaji, Atsuko; Nonaka, Masao
1-Mar-2018 Cybersecurity Education and Training Support System: CyRISBeuran, Razvan; Pham, Cuong; Tang, Dat; Chinen, Ken-ichi; Tan, Yasuo; Shinoda, Yoichi
23-Mar-2018 Data sharing among wireless client devices in cooperative manner with minimum transmissionsLin, Nyan; Kurkoski, Brian, M.; TAN, Yasuo; LIM, Yuto
Feb-2009 Decentralized Formation Control for Small-Scale Robot Teams with AnonymityLee, Geunho; Nak Young, Chong
Feb-1990 Decoding Performance of Linear Block Codes Using a Trellis in Digital Mobile RadioMatsumoto, Tadashi
Jun-1996 A Deductive Object-Oriented Database System for Situated Inference in LawWong, Stephen; Tojo, Satoshi
22-Dec-2017 Deep df-pn and Its Efficient ImplementationsSong, Zhang; Iida, Hiroyuki; Herik, Jaap van den
1-Sep-2015 Dependence on age of interference with phoneme perception by first- and second-language speech maskersKubo, Rieko; Akagi, Masato; Akahane-Yamada, Reiko
2004 Dependency Pairs RevisitedHirokawa, Nao; Middeldorp, Aart
1-Nov-2004 Deriving Discrete Behavior of Hybrid Systems under Incomplete KnowledgeHIRAISHI, Kunihiko
前ページ 次ページ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)