JAIST Repository >
b. 情報科学研究科・情報科学系 >
b10. 学術雑誌論文等 >
b10-1. 雑誌掲載論文 >

一覧: タイトル

移動先: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
タイトルの先頭数文字を入力して移動:   

検索結果: 594-614 / 919.

前ページ 次ページ
発行日タイトル 著者
Apr-2004 Rewriting-Based Verification of Authentication ProtocolsOgata, Kazuhiro; Futatsugi, Kokichi
2007 RFID-based mobile robot guidance to a stationary targetKim, Myungsik; Chong, Nak Young
Jan-2009 Robust DOA estimation and target docking for mobile robotsKim, Myungsik; Nak Young, Chong; Yu, Wonpil
Dec-2007 A Robust Fingerprint Indexing Scheme Using Minutia Neighborhood Structure and Low-Order Delaunay TrianglesLiang, Xuefeng; Bishnu, A; Asano, T
6-Dec-2012 Robust pseudo virtual passive dynamic walking with control of swing-leg retractionAsano, Fumihiko
Feb-2013 Route-Enabling Graph Orientation ProblemsIto, Takehiro; Miyamoto, Yuichiro; Ono, Hirotaka; Tamaki, Hisao; Uehara, Ryuhei
1-Jul-2014 Sankaku-Tori: An Old Western-Japanese Game Played on a Point SetHoriyama, Takashi; Kiyomi, Masashi; Okamoto, Yoshio; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi; Yamauchi, Yukiko
2017 Sankaku-tori: An Old Western-Japanese Game Played on a Point SetHoriyama, Takashi; Iizuka, Takashi; Kiyomi, Masashi; Okamoto, Yoshio; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi; Yamauchi, Yukiko
9-Aug-2011 Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmeticGoundar, Raveen R.; Joye, Marc; Miyaji, Atsuko; Rivain, Matthieu; Venelli, Alexandre
22-Aug-2009 Scale Free Interval GraphsMiyoshi, Naoto; Shigezumi, Takeya; Uehara, Ryuhei; Watanabe, Osamu
16-Apr-2010 Scale free properties of random k-treesCooper, Colin; Uehara, Ryuhei
1-Sep-2013 Scan Matching Online Cell Decomposition for Coverage Path Planning in an Unknown EnvironmentDugarjav, Batsaikhan; Lee, Soon-Geul; Kim, Donghan; Kim, Jong Hyeong; Chong, Nak Young
Aug-2002 A Second-price Sealed-bid Auction with Public VerifiabilityOmote, Kazumasa; Miyaji, Atsuko
2003 A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th RootOmote, Kazumasa; Miyaji, Atsuko
2012 A Secure and private RFID authentication protocol under SLPN problemMamun, Mohammad S. I.; Miyaji, Atsuko; Rahman, Mohammad S.
Aug-2006 Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPAMAMIYA, Hideyo; MIYAJI, Atsuko; MORIMOTO, Hiroaki
Mar-2015 Secure sets and defensive alliances in graphs: A faster algorithm and improved boundsAmano, Kazuyuki; Oo, Kyaw May; Otachi, Yota; Uehara, Ryuhei
Sep-2007 The security of RC6 against asymmetric Chi-square test attackHinoue, Tomohiko; Miyaji, Atsuko; Wada, Takatomi
2009 A Selectable k-Times Relaxed Anonymous Authentication SchemeEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa
8-Apr-2015 Self-healing wireless sensor networksMiyaji, Atsuko; Omote, Kazumasa
1-Aug-2004 Self-Reconfigurable Multi-Layer Neural Networks with Genetic AlgorithmsSUGAWARA, Eiko; FUKUSHI, Masaru; HORIGUCHI, Susumu
前ページ 次ページ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)