JAIST Repository >
b. 情報科学研究科・情報科学系 >
b10. 学術雑誌論文等 >
b10-1. 雑誌掲載論文 >

一覧: タイトル

移動先: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
タイトルの先頭数文字を入力して移動:   

検索結果: 597-617 / 919.

前ページ 次ページ
発行日タイトル 著者
Dec-2007 A Robust Fingerprint Indexing Scheme Using Minutia Neighborhood Structure and Low-Order Delaunay TrianglesLiang, Xuefeng; Bishnu, A; Asano, T
6-Dec-2012 Robust pseudo virtual passive dynamic walking with control of swing-leg retractionAsano, Fumihiko
Feb-2013 Route-Enabling Graph Orientation ProblemsIto, Takehiro; Miyamoto, Yuichiro; Ono, Hirotaka; Tamaki, Hisao; Uehara, Ryuhei
1-Jul-2014 Sankaku-Tori: An Old Western-Japanese Game Played on a Point SetHoriyama, Takashi; Kiyomi, Masashi; Okamoto, Yoshio; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi; Yamauchi, Yukiko
2017 Sankaku-tori: An Old Western-Japanese Game Played on a Point SetHoriyama, Takashi; Iizuka, Takashi; Kiyomi, Masashi; Okamoto, Yoshio; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi; Yamauchi, Yukiko
9-Aug-2011 Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmeticGoundar, Raveen R.; Joye, Marc; Miyaji, Atsuko; Rivain, Matthieu; Venelli, Alexandre
22-Aug-2009 Scale Free Interval GraphsMiyoshi, Naoto; Shigezumi, Takeya; Uehara, Ryuhei; Watanabe, Osamu
16-Apr-2010 Scale free properties of random k-treesCooper, Colin; Uehara, Ryuhei
1-Sep-2013 Scan Matching Online Cell Decomposition for Coverage Path Planning in an Unknown EnvironmentDugarjav, Batsaikhan; Lee, Soon-Geul; Kim, Donghan; Kim, Jong Hyeong; Chong, Nak Young
Aug-2002 A Second-price Sealed-bid Auction with Public VerifiabilityOmote, Kazumasa; Miyaji, Atsuko
2003 A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th RootOmote, Kazumasa; Miyaji, Atsuko
2012 A Secure and private RFID authentication protocol under SLPN problemMamun, Mohammad S. I.; Miyaji, Atsuko; Rahman, Mohammad S.
Aug-2006 Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPAMAMIYA, Hideyo; MIYAJI, Atsuko; MORIMOTO, Hiroaki
Mar-2015 Secure sets and defensive alliances in graphs: A faster algorithm and improved boundsAmano, Kazuyuki; Oo, Kyaw May; Otachi, Yota; Uehara, Ryuhei
Sep-2007 The security of RC6 against asymmetric Chi-square test attackHinoue, Tomohiko; Miyaji, Atsuko; Wada, Takatomi
2009 A Selectable k-Times Relaxed Anonymous Authentication SchemeEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa
8-Apr-2015 Self-healing wireless sensor networksMiyaji, Atsuko; Omote, Kazumasa
1-Aug-2004 Self-Reconfigurable Multi-Layer Neural Networks with Genetic AlgorithmsSUGAWARA, Eiko; FUKUSHI, Masaru; HORIGUCHI, Susumu
19-Sep-2009 Self-stabilizing Human-Like Motion Control Framework for Humanoids Using Neural OscillatorsYang, Woosung; Chong, Nak Young; Ra, Syungkwon; Bae, Ji-Hun; You, Bum Jae
30-Aug-2018 A Self-trainable Depth Perception Method from Eye Pursuit and Motion ParallaxPrucksakorn, Tanapol; Jeong, Sungmoon; Chong, Nak Young
11-Jan-2024 Semantic-Forward Relaying: A Novel Framework Towards 6G Cooperative CommunicationsLin, Wensheng; Yan, Yuna; Li, Lixin; Han, Zhu; Matsumoto, Tad
前ページ 次ページ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)