JAIST Repository >
b. 情報科学研究科・情報科学系 >

一覧: タイトル

移動先: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
タイトルの先頭数文字を入力して移動:   

検索結果: 407-427 / 560.

前ページ 次ページ
発行日タイトル 著者
Oct-2017 A risk model for indoor environment safetyYang, Zhengguo; Lim, Yuto; Tan, Yasuo
Nov-2019 Robot Social Emotional Development through Memory RetrievalBui, Ha-Duong; Dang, Thi Le Quyen; Chong, Nak Young
2004 Robots on Self-Organizing Knowledge NetworksChong, Nak Young; Hongu, Hiroshi; Miyazaki, Manabu; Takemura, Koji; Ohara, Kenichi; Ohba, Kohtaro; Hirai, Shigeoki; Tanie, Kazuo
24-Sep-2008 Robust front end processing for speech recognition in reverberant environments: Utilization of speech characteristicsPetrick, Rico; Lu, Xugang; Unoki, Masashi; Akagi, Masato; Hoffmann, Ruediger
Aug-2007 Robust Self-Deployment for a Swarm of Autonomous Mobile Robots with Limited Visibility RangeLee, Geunho; Chong, Nak Young; Defago, Xavier
Dec-2019 Robustness test method of power flow system containing controllable and fluctuating power devicesJavaid, Saher; Kaneko, Mineo; Tan, Yasuo
Dec-2010 RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor NetworksIto, Hisashige; Miyaji, Atsuko ; Omote, Kazumasa
20-Nov-2024 S-CycleGAN: Semantic Segmentation Enhanced CT-Ultrasound Image-to-Image Translation for Robotic UltrasonographySong, Yuhan; Chong, Nak Young
8-Jan-2024 S3M: Semantic Segmentation Sparse Mapping for UAVs with RGB-D CameraCanh, Thanh Nguyen; Nguyen, Van-Truong; Van, Xiem Hoang; Elibol, Armagan; Chong, Nak Young
Oct-2008 Safe clocking register assignment in datapath synthesisInoue, Keisuke; Kaneko, Mineo; Iwagaki, Tsuyoshi
29-Nov-2011 Safety Lead Curve and Entertainment in GamesIida, Hiroyuki; Nakagawa, Takeo; Sone, Shogo; Muangkasem, Apimuk; Ishitobi, Taichi
26-Jul-2024 Safety-optimized Strategy for Grasp Detection in High-clutter ScenariosLi, Chenghao; Zhou, Peiwen; Chong, Nak Young
May-2014 A Scalable and Secure RFID Ownership Transfer ProtocolMamun, Mohammad Saiful Islam; Miyaji, Atsuko
30-May-2016 Scheduling overload for real-time systems using SMT solverCheng, Zhuo; Zhang, Haitao; Tan, Yasuo; Lim, Yuto
Mar-2009 A Secure RFID Authentication Protocol with Low Communication CostRahman, Mohammad Shahriar; Soshi, Masakazu; Miyaji, Atsuko
Jul-2014 Secure VANET Applications with a refined Group SignatureIslam Mamun, Mohammad Saiful; Miyaji, Atsuko
Oct-2008 Security and Access Control for Vehicular CommunicationsZrelli, Saber; Miyaji, Atsuko; Shinoda, Yoichi; Ernst, Thierry
22-May-2016 Security and Experimental Performance Analysis of a Matrix ORAMGordon, Steven; Miyaji, Atsuko; Su, Chunhua; Sumongkaoythin, Karin
Oct-2020 Segment-level Effects of Gender, Nationality and Emotion Information on Text-independent Speaker VerificationLi, Kai; Akagi, Masato; Wu, Yibo; Dang, and Jianwu
2007 Self-adapting humanoid locomotion using a neural oscillator networkYang, Woosung; Chong, Nak Young; Kim, ChangHwan; You, Bum Jae
Oct-2009 Self-adapting Robot Arm Movement Employing Neural OscillatorsYang, Woosung; Bae, Ji-Hun; Kwon, Jaesung; Chong, Nak Young; Oh, Yonghwan; You, Bum Jae
前ページ 次ページ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)