発行日 | タイトル |
著者 |
8-Jul-2010 | Polynomial-Time Algorithm for Controllability Test of a Class of Boolean Biological Networks | Kobayashi, Koichi; Imura, Jun-ichi; Hiraishi, Kunihiko |
15-Dec-2014 | Polynomial-Time Algorithm for Sliding Tokens on Trees | Demaine, Erik D.; Demaine, Martin; Fox-Epstein, Eli; Hoang, Duc A.; Ito, Takehiro; Ono, Hirotaka; Otachi, Yota; Uehara, Ryuhei; Yamada, Takeshi |
23-Feb-2016 | Polynomial-time algorithms for Subgraph Isomorphism in small graph classes of perfect graphs | Konagaya, Matsuo; Otachi, Yota; Uehara, Ryuhei |
Jan-2016 | A polynomial-time approximation scheme for the geometric unique coverage problem on unit squares | Ito, Takehiro; Nakano, Shin-ichi; Okamoto, Yoshio; Otachi, Yota; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi |
26-Mar-2018 | Possible Interpretation of Mass-in-Mind: A Case Study Using SCRABBLE | Kananat, Suwanviwatana; Terrillon, Jean-Christophe; Iida, Hiroyuki |
3-Nov-2016 | Power Allocation in an Asymmetric Wireless Sensor Network | Jiang, Weiwei; He, Xin; Matsumoto, Tadashi |
2-Aug-2017 | Power Flow Coloring System Over a Nanogrid With Fluctuating Power Sources and Loads | Javaid, Saher; Kato, Takekazu; Matsuyama, Takashi |
1-May-2010 | Practical and Secure Recovery of Disk Encryption Key Using Smart Cards | OMOTE, Kazumasa; KATO, Kazuhiko |
2001 | A Practical English Auction with One-time Registration | Omote, Kazumasa; Miyaji, Atsuko |
May-2002 | A Practical English Auction with Simple Revocation | OMOTE, Kazumasa; MIYAJI, Atsuko |
31-Dec-2011 | A predicative completion of a uniform space | Berger, Josef; Ishihara, Hajime; Palmgren, Erik; Schuster, Peter |
21-Aug-2008 | Predicting phase synchronization of non-phase-coherent chaos | Tokuda, Isao T.; Kurths, Jurgen; Kiss, Istvan Z.; Hudson, John L. |
2006 | Predictive Labeling | Hirokawa, Nao; Middeldorp, Aart |
2010 | Privacy-Preserving Data Mining in Presence of Covert Adversaries | Miyaji, Atsuko; Rahman, Mohammad Shahriar |
29-Jun-2011 | Privacy-Preserving Data Mining: A Game-theoretic Approach | Miyaji, Atsuko; Rahman, Mohammad Shahriar |
2015 | A privacy-preserving efficient RFID authentication protocol from SLPN assumption | Islam Mamun, Mohammad Saiful; Miyaji, Atsuko |
17-Sep-2014 | A Probabilistic Approach to Control of Complex Systems and Its Application to Real-Time Pricing | Kobayashi, Koichi; Hiraishi, Kunihiko |
2012 | Probabilistic-constrained optimal control of a class of stochastic hybrid systems | Kobayashi, Koichi; Matou, Koichiro; Hiraishi, Kunihiko |
2015 | Process Acceleration in the Iterated Learning Model with String Clipping | Matoba, Ryuichi; Sudo, Hiroki; Nakamura, Makoto; Hagiwara, Shingo; Tojo, Satoshi |
1-May-2010 | Program Transformation Templates for Tupling Based on Term Rewriting | Chiba, Yuki; Aoto, Takahito; Toyama, Yoshihito |
2010 | Proof Score Approach to Analysis of Electronic Commerce Protocols | Ogata, Kazuhiro; Futatsugi, Kokichi |