検索結果: 920-940 / 2071.
発行日 | タイトル |
著者 |
15-Dec-2011 | 組込みプロセッサ向けキャッシュフィル制御方式 | 請園, 智玲; 田中, 清史; Ukezono, Tomoaki; Tanaka, Kiyofumi |
Dec-2011 | Performance of Turbo Equalization using Doped Accumulator with Channel Estimation | Takano, Yasuhiro; Anwar, Khoirul; Matsumoto, Tad |
29-Nov-2011 | Limit cycle walking, running, and skipping of telescopic-legged rimless wheel | Asano, Fumihiko; Suguro, Masashi |
29-Nov-2011 | Safety Lead Curve and Entertainment in Games | Iida, Hiroyuki; Nakagawa, Takeo; Sone, Shogo; Muangkasem, Apimuk; Ishitobi, Taichi |
18-Nov-2011 | Random Generation and Enumeration of Bipartite Permutation Graphs | Saitoh, Toshiki; Otachi, Yota; Yamanaka, Katsuhisa; Uehara, Ryuhei |
16-Nov-2011 | Game Information Dynamics | Iida, Hiroyuki; Nakagawa, Takeo |
1-Nov-2011 | Generalized Analysis on Key Collisions of Stream Cipher RC4 | Chen, Jiageng; Atsuko Miyaji |
1-Nov-2011 | Unconditionally Secure Oblivious Transfer Based on Channel Delays | Cheong, Kai-Yuen; Miyaji, Atsuko |
1-Nov-2011 | Non-interactive Opening for Ciphertexts Encrypted by Shared Keys | Chen, Jiageng; Emura, Keita; Miyaji, Atsuko |
1-Nov-2011 | Ideal Secret Sharing Schemes with Share Selectability | Emura, Keita; Miyaji, Atsuko; Nomura, Akito; Rahman, Mohammad Shahriar; Soshi, Masakazu |
12-Oct-2011 | How to Find Short RC4 Colliding Key Pairs | Chen, Jiageng; Miyaji, Atsuko |
12-Oct-2011 | Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
8-Oct-2011 | POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks | Iida, Tatsuro; Miyaji, Atsuko; Omote, Kazumasa |
1-Oct-2011 | Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes | Miyaji, Atsuko; Omote, Kazumasa |
Oct-2011 | Hardness Results and an Exact Exponential Algorithm for the Spanning Tree Congestion Problem | Okamoto, Yoshio; Otachi, Yota; Uehara, Ryuhei; Uno, Takeaki |
25-Sep-2011 | Low Complexity Time-Concatenated Turbo Equalization for Block Transmission without Guard Interval: Part 2—Application to SC-FDMA | Zhou, Hui; Anwar, Khoirul; Matsumoto, Tad |
13-Sep-2011 | Very Simple BICM-ID Using Repetition Code and Extended Mapping with Doped Accumulator | Anwar, Khoirul; Matsumoto, Tad |
Sep-2011 | Efficient and Low-Cost RFID Authentication Schemes | Miyaji, Atsuko; Rahman, Mohammad Shahriar; Soshi, Masakazu |
29-Aug-2011 | An autonomous framework to produce and distribute personalized team-sport video summaries: a basket-ball case study | Chen, Fan; Delannay, Damien; Vleeschouwer, Christophe De |
17-Aug-2011 | Serially Concatenated Joint Source-Channel Coding for Binary Markov Sources | Zhou, Xiaobo; Anwar, Khoirul; Matsumoto, Tad |
16-Aug-2011 | Classification of change detection and change blindness from near-infrared spectroscopy signals | Tanaka, Hirokazu; Katura, Takusige |