JAIST Repository >
b. 情報科学研究科・情報科学系 >
b10. 学術雑誌論文等 >
b10-1. 雑誌掲載論文 >

一覧: タイトル

移動先: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
タイトルの先頭数文字を入力して移動:   

検索結果: 535-555 / 919.

前ページ 次ページ
発行日タイトル 著者
8-Jul-2010 Polynomial-Time Algorithm for Controllability Test of a Class of Boolean Biological NetworksKobayashi, Koichi; Imura, Jun-ichi; Hiraishi, Kunihiko
15-Dec-2014 Polynomial-Time Algorithm for Sliding Tokens on TreesDemaine, Erik D.; Demaine, Martin; Fox-Epstein, Eli; Hoang, Duc A.; Ito, Takehiro; Ono, Hirotaka; Otachi, Yota; Uehara, Ryuhei; Yamada, Takeshi
23-Feb-2016 Polynomial-time algorithms for Subgraph Isomorphism in small graph classes of perfect graphsKonagaya, Matsuo; Otachi, Yota; Uehara, Ryuhei
Jan-2016 A polynomial-time approximation scheme for the geometric unique coverage problem on unit squaresIto, Takehiro; Nakano, Shin-ichi; Okamoto, Yoshio; Otachi, Yota; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi
26-Mar-2018 Possible Interpretation of Mass-in-Mind: A Case Study Using SCRABBLEKananat, Suwanviwatana; Terrillon, Jean-Christophe; Iida, Hiroyuki
3-Nov-2016 Power Allocation in an Asymmetric Wireless Sensor NetworkJiang, Weiwei; He, Xin; Matsumoto, Tadashi
2-Aug-2017 Power Flow Coloring System Over a Nanogrid With Fluctuating Power Sources and LoadsJavaid, Saher; Kato, Takekazu; Matsuyama, Takashi
1-May-2010 Practical and Secure Recovery of Disk Encryption Key Using Smart CardsOMOTE, Kazumasa; KATO, Kazuhiko
2001 A Practical English Auction with One-time RegistrationOmote, Kazumasa; Miyaji, Atsuko
May-2002 A Practical English Auction with Simple RevocationOMOTE, Kazumasa; MIYAJI, Atsuko
31-Dec-2011 A predicative completion of a uniform spaceBerger, Josef; Ishihara, Hajime; Palmgren, Erik; Schuster, Peter
21-Aug-2008 Predicting phase synchronization of non-phase-coherent chaosTokuda, Isao T.; Kurths, Jurgen; Kiss, Istvan Z.; Hudson, John L.
2006 Predictive LabelingHirokawa, Nao; Middeldorp, Aart
2010 Privacy-Preserving Data Mining in Presence of Covert AdversariesMiyaji, Atsuko; Rahman, Mohammad Shahriar
29-Jun-2011 Privacy-Preserving Data Mining: A Game-theoretic ApproachMiyaji, Atsuko; Rahman, Mohammad Shahriar
2015 A privacy-preserving efficient RFID authentication protocol from SLPN assumptionIslam Mamun, Mohammad Saiful; Miyaji, Atsuko
17-Sep-2014 A Probabilistic Approach to Control of Complex Systems and Its Application to Real-Time PricingKobayashi, Koichi; Hiraishi, Kunihiko
2012 Probabilistic-constrained optimal control of a class of stochastic hybrid systemsKobayashi, Koichi; Matou, Koichiro; Hiraishi, Kunihiko
2015 Process Acceleration in the Iterated Learning Model with String ClippingMatoba, Ryuichi; Sudo, Hiroki; Nakamura, Makoto; Hagiwara, Shingo; Tojo, Satoshi
1-May-2010 Program Transformation Templates for Tupling Based on Term RewritingChiba, Yuki; Aoto, Takahito; Toyama, Yoshihito
2010 Proof Score Approach to Analysis of Electronic Commerce ProtocolsOgata, Kazuhiro; Futatsugi, Kokichi
前ページ 次ページ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)