発行日 | タイトル |
著者 |
22-May-2019 | All-Electron Quantum Monte Carlo with Jastrow Single Determinant Ansatz: Application to the Sodium Dimer | Nakano, Kousuke; Maezono, Ryo; Sorella, Sandro |
26-Jun-2008 | Alternate Stacking Technique Revisited: Inclusion Problem of Superdeterministic Pushdown Automata | Nguyen, Van Tang; Ogawa, Mizuhito |
28-Feb-2014 | An analog VLSI implementation of one-class support vector machine for multiclass classification of highly dimensional vectors | Zhang, Renyuan; Kaneko, Mineo; Shibata, Tadashi |
Dec-2017 | An Analysis of Winning Streak's Effects in Language Course of "Duolingo" | Huynh, Duy; Iida, Hiroyuki |
Jan-2007 | An Analytical Method for MMSE MIMO Turbo Equalizer EXIT Chart Computation | Kansanen, K.; Matsumoto, T. |
25-Aug-2015 | Analyzing Reliability Change in Legal Case | Jirakunkanok, Pimolluck; Sano, Katsuhiko; Tojo, Satoshi |
Sep-2007 | Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption | Miyaji, Atsuko |
29-Jan-2014 | Anomalous nonadditive dispersion interactions in systems of three one-dimensional wires | Misquitta, Alston J.; Maezono, Ryo; Drummond, Neil D.; Stone, Anthony J.; Needs, Richard J. |
2003 | Anonymity-enhanced Pseudonym System | Tamura, Yuko; Miyaji, Atsuko |
1-Feb-2020 | Anonymization Technique based on SGD Matrix Factrization | Mimoto, Tomoaki; Hidano, Seira; Kiyomoto, Shinsaku; Miyaji, Atsuko |
2000 | An anonymous auction protocol with a single non-trusted center using binary trees | Omote, Kazumasa; Miyaji, Atsuko |
2010 | An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation | Emura, Keita; Miyaji, Atsuko ; Omote, Kazumasa |
Aug-2001 | An Anonymous Sealed-bid Auction with a Feature of Entertainment | Omote, Kazumasa; Miyaji, Atsuko |
Nov-1997 | Another Countermeasure to Forgeries over Message Recovery Signature | MIYAJI, Atsuko |
19-Mar-2012 | Any Monotone Function is Realized by Interlocked Polygons | Demaine, Erik D.; Demaine, Martin L.; Uehara, Ryuhei |
1-Feb-2009 | Application of DES Theory to Verification of Software Components | HIRAISHI, Kunihiko; KUČERA, Petr |
1-Aug-2009 | Approximate Algorithm for Hybrid Model Predictive Control with Time-Varying Reference | Kobayashi, Koichi; Hiraishi, Kunihiko; Tang, Nguyen Van |
2013 | Architecture for organizing context-aware data in smart home for activity recognition system | Wongpatikaseree, Konlakorn; Kim, Junsoo; Makino, Yoshiki; Lim, Azman Osman; Tan, Yasuo |
1-May-2004 | Arranging Fewest Possible Probes to Detect a Hidden Object with Industrial Application | SHIMAMOTO, Taisuke; ASANO, Tetsuo |
Jun-2013 | Aspects of Opening Play | Muangkasem, Apimuk; Iida, Hiroyuki; Spoerer, Kristian |
1-Apr-2002 | Assignment-Driven Loop Pipeline Scheduling and Its Application to Data-Path Synthesis | YOROZUYA, Toshiyuki; OHASHI, Koji; KANEKO, Mineo |