発行日 | タイトル |
著者 |
Dec-2007 | A Robust Fingerprint Indexing Scheme Using Minutia Neighborhood Structure and Low-Order Delaunay Triangles | Liang, Xuefeng; Bishnu, A; Asano, T |
6-Dec-2012 | Robust pseudo virtual passive dynamic walking with control of swing-leg retraction | Asano, Fumihiko |
Feb-2013 | Route-Enabling Graph Orientation Problems | Ito, Takehiro; Miyamoto, Yuichiro; Ono, Hirotaka; Tamaki, Hisao; Uehara, Ryuhei |
1-Jul-2014 | Sankaku-Tori: An Old Western-Japanese Game Played on a Point Set | Horiyama, Takashi; Kiyomi, Masashi; Okamoto, Yoshio; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi; Yamauchi, Yukiko |
2017 | Sankaku-tori: An Old Western-Japanese Game Played on a Point Set | Horiyama, Takashi; Iizuka, Takashi; Kiyomi, Masashi; Okamoto, Yoshio; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi; Yamauchi, Yukiko |
9-Aug-2011 | Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic | Goundar, Raveen R.; Joye, Marc; Miyaji, Atsuko; Rivain, Matthieu; Venelli, Alexandre |
22-Aug-2009 | Scale Free Interval Graphs | Miyoshi, Naoto; Shigezumi, Takeya; Uehara, Ryuhei; Watanabe, Osamu |
16-Apr-2010 | Scale free properties of random k-trees | Cooper, Colin; Uehara, Ryuhei |
1-Sep-2013 | Scan Matching Online Cell Decomposition for Coverage Path Planning in an Unknown Environment | Dugarjav, Batsaikhan; Lee, Soon-Geul; Kim, Donghan; Kim, Jong Hyeong; Chong, Nak Young |
Aug-2002 | A Second-price Sealed-bid Auction with Public Verifiability | Omote, Kazumasa; Miyaji, Atsuko |
2003 | A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th Root | Omote, Kazumasa; Miyaji, Atsuko |
2012 | A Secure and private RFID authentication protocol under SLPN problem | Mamun, Mohammad S. I.; Miyaji, Atsuko; Rahman, Mohammad S. |
Aug-2006 | Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA | MAMIYA, Hideyo; MIYAJI, Atsuko; MORIMOTO, Hiroaki |
Mar-2015 | Secure sets and defensive alliances in graphs: A faster algorithm and improved bounds | Amano, Kazuyuki; Oo, Kyaw May; Otachi, Yota; Uehara, Ryuhei |
Sep-2007 | The security of RC6 against asymmetric Chi-square test attack | Hinoue, Tomohiko; Miyaji, Atsuko; Wada, Takatomi |
2009 | A Selectable k-Times Relaxed Anonymous Authentication Scheme | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
8-Apr-2015 | Self-healing wireless sensor networks | Miyaji, Atsuko; Omote, Kazumasa |
1-Aug-2004 | Self-Reconfigurable Multi-Layer Neural Networks with Genetic Algorithms | SUGAWARA, Eiko; FUKUSHI, Masaru; HORIGUCHI, Susumu |
19-Sep-2009 | Self-stabilizing Human-Like Motion Control Framework for Humanoids Using Neural Oscillators | Yang, Woosung; Chong, Nak Young; Ra, Syungkwon; Bae, Ji-Hun; You, Bum Jae |
30-Aug-2018 | A Self-trainable Depth Perception Method from Eye Pursuit and Motion Parallax | Prucksakorn, Tanapol; Jeong, Sungmoon; Chong, Nak Young |
11-Jan-2024 | Semantic-Forward Relaying: A Novel Framework Towards 6G Cooperative Communications | Lin, Wensheng; Yan, Yuna; Li, Lixin; Han, Zhu; Matsumoto, Tad |