JAIST Repository >
b. 情報科学研究科・情報科学系 >
b10. 学術雑誌論文等 >
b10-1. 雑誌掲載論文 >

一覧: タイトル

移動先: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
タイトルの先頭数文字を入力して移動:   

検索結果: 21-41 / 919.

前ページ 次ページ
発行日タイトル 著者
22-May-2019 All-Electron Quantum Monte Carlo with Jastrow Single Determinant Ansatz: Application to the Sodium DimerNakano, Kousuke; Maezono, Ryo; Sorella, Sandro
26-Jun-2008 Alternate Stacking Technique Revisited: Inclusion Problem of Superdeterministic Pushdown AutomataNguyen, Van Tang; Ogawa, Mizuhito
28-Feb-2014 An analog VLSI implementation of one-class support vector machine for multiclass classification of highly dimensional vectorsZhang, Renyuan; Kaneko, Mineo; Shibata, Tadashi
Dec-2017 An Analysis of Winning Streak's Effects in Language Course of "Duolingo"Huynh, Duy; Iida, Hiroyuki
Jan-2007 An Analytical Method for MMSE MIMO Turbo Equalizer EXIT Chart ComputationKansanen, K.; Matsumoto, T.
25-Aug-2015 Analyzing Reliability Change in Legal CaseJirakunkanok, Pimolluck; Sano, Katsuhiko; Tojo, Satoshi
Sep-2007 Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast EncryptionMiyaji, Atsuko
29-Jan-2014 Anomalous nonadditive dispersion interactions in systems of three one-dimensional wiresMisquitta, Alston J.; Maezono, Ryo; Drummond, Neil D.; Stone, Anthony J.; Needs, Richard J.
2003 Anonymity-enhanced Pseudonym SystemTamura, Yuko; Miyaji, Atsuko
1-Feb-2020 Anonymization Technique based on SGD Matrix FactrizationMimoto, Tomoaki; Hidano, Seira; Kiyomoto, Shinsaku; Miyaji, Atsuko
2000 An anonymous auction protocol with a single non-trusted center using binary treesOmote, Kazumasa; Miyaji, Atsuko
2010 An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's ReputationEmura, Keita; Miyaji, Atsuko ; Omote, Kazumasa
Aug-2001 An Anonymous Sealed-bid Auction with a Feature of EntertainmentOmote, Kazumasa; Miyaji, Atsuko
Nov-1997 Another Countermeasure to Forgeries over Message Recovery SignatureMIYAJI, Atsuko
19-Mar-2012 Any Monotone Function is Realized by Interlocked PolygonsDemaine, Erik D.; Demaine, Martin L.; Uehara, Ryuhei
1-Feb-2009 Application of DES Theory to Verification of Software ComponentsHIRAISHI, Kunihiko; KUČERA, Petr
1-Aug-2009 Approximate Algorithm for Hybrid Model Predictive Control with Time-Varying ReferenceKobayashi, Koichi; Hiraishi, Kunihiko; Tang, Nguyen Van
2013 Architecture for organizing context-aware data in smart home for activity recognition systemWongpatikaseree, Konlakorn; Kim, Junsoo; Makino, Yoshiki; Lim, Azman Osman; Tan, Yasuo
1-May-2004 Arranging Fewest Possible Probes to Detect a Hidden Object with Industrial ApplicationSHIMAMOTO, Taisuke; ASANO, Tetsuo
Jun-2013 Aspects of Opening PlayMuangkasem, Apimuk; Iida, Hiroyuki; Spoerer, Kristian
1-Apr-2002 Assignment-Driven Loop Pipeline Scheduling and Its Application to Data-Path SynthesisYOROZUYA, Toshiyuki; OHASHI, Koji; KANEKO, Mineo
前ページ 次ページ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)