発行日 | タイトル |
著者 |
Dec-2015 | The power flow coloring: Giving a unique ID to a power flow from a specific power source to a specific power load | Javaid, Saher; Kurose, Yuhei; Kato, Takekazu; Matsuyama, Takashi |
2019 | Power Flow Management for Smart Grids: Considering Renewable Energy and Demand Uncertainty | Javaid, Saher; Kaneko, Mineo; Tan, Yasuo |
Dec-2019 | Power flow management: solvability condition for a system with controllable and fluctuating devices | Javaid, Saher; Kaneko, Mineo; Tan, Yasuo |
1-Dec-2016 | Practical Diffusion Monte Carlo Simulations for Large Noncovalent Systems | Hongo, Kenta; Maezono, Ryo |
15-Jul-2024 | Practical Short-Length Coding Schemes for Binary Distributed Hypothesis Testing | Dupraz, Elsa; Adamou, Ismaila Salihou; Asvadi, Reza; Matsumoto, Tad |
19-Nov-2020 | Predicting Valence and Arousal by Aggregating Acoustic Features for Acoustic-Linguistic Information Fusion | Atmaja, Bagus Tris; Hamada, Yasuhiro; Akagi, Masato |
Jul-2018 | Predictive thermal comfort control for cyber-physical home systems | En, Ooi Sian; Yoshiki, Makino; Lim, Yuto; Tan, Yasuo |
Aug-2008 | Preserving The Coding Structure in Relay Transmission in The Presence of Unknown Interference | Aihua Hong; Matsumoto, Tad |
Feb-2014 | Priority based maximum consuming power control in smart homes | Umer, Saher; Kaneko, Mineo; Tan, Yasuo; Lim, Azman Osman |
22-Aug-2012 | Privacy protection for speech based on concepts of auditory scene analysis | AKAGI, Masato; IRIE, Yoshihiro |
Mar-2012 | Privacy-preserving Set Operations in the Presence of Rational Parties | Miyaji, Atsuko; Rahman, Mohammad Shahriar |
Jul-2013 | Private Multiparty Set Intersection Protocol in Rational Model | Emura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar |
4-Nov-2019 | Procedural Content Generation of Rhythm Games Using Deep Learning Methods | Liang, Yubin; Li, Wanxiang; Ikeda, Kokolo |
2016 | Production of Emotion-based Behaviors for a Human-like Computer Player | Temsiririrkkul, Sila; Luong, Huu Phuc; Ikeda, Kokolo |
Aug-2013 | Production of Various Strategies and Position Control for Monte-Carlo Go - Entertaining human players | Ikeda, Kokolo; Viennot, Simon |
Jul-2013 | ProRATE: Obtaining the potential throughput from the system view in two-way relay networks | Zhu, Lingyun; Wang, Hai; Wang, Xin; Zhu, Yu; Lim, Azman Osman |
Apr-2008 | Protection and Recovery of Disk Encryption Key Using Smart Cards | Omote, Kazumasa; Kato, Kazuhiko |
23-Sep-2008 | Psychoacoustically-motivated adaptive β-order generalized spectral subtraction based on data-driven optimization | Li, Junfeng; Jiang, Hui; Akagi, Masato |
Apr-2009 | Psychoacoustically-motivated adaptive β-order generalized spectral subtraction for cochlear implant patients | Li, Junfeng; Fu, Qian-Jie; Jiang, Hui; Akagi, Masato |
May-2018 | A PTDOA-DRSS Hybrid Factor Graph-based Unknown Radio Wave Geolocation | Karimah, Shofiyati Nur; Aziz, Muhammad Reza Kahar; Matsumoto, Tad |
9-Nov-2016 | Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions | Fujisaki, Eiichiro; Xagawa, Keita |