JAIST Repository >

一覧: タイトル

移動先: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
タイトルの先頭数文字を入力して移動:   

検索結果: 1196-1216 / 2073.

前ページ 次ページ
発行日タイトル 著者
26-Feb-2024 Proceedings of the 2nd International Workshop on Formal Analysis and Verification of Post-Quantum Cryptographic Protocols (FAVPQC), 2023Escobar, Santiago; Otmani, Ayoub; Akleylek, Sedat; Ogata, Kazuhiro
2015 Process Acceleration in the Iterated Learning Model with String ClippingMatoba, Ryuichi; Sudo, Hiroki; Nakamura, Makoto; Hagiwara, Shingo; Tojo, Satoshi
26-Sep-2003 Process Model Combining the Artifact Process with Communication PathZhou, Yi; Ochimizu, Koichiro
2016 Production of Emotion-based Behaviors for a Human-like Computer PlayerTemsiririrkkul, Sila; Luong, Huu Phuc; Ikeda, Kokolo
Aug-2013 Production of Various Strategies and Position Control for Monte-Carlo Go - Entertaining human playersIkeda, Kokolo; Viennot, Simon
1-May-2010 Program Transformation Templates for Tupling Based on Term RewritingChiba, Yuki; Aoto, Takahito; Toyama, Yoshihito
20-Feb-1998 A proof of the conjecture of zantema on a persistent property of term rewriting systemsAoto, Takahito
2010 Proof Score Approach to Analysis of Electronic Commerce ProtocolsOgata, Kazuhiro; Futatsugi, Kokichi
1-Dec-2008 Proof Score Approach to Verification of Liveness PropertiesOGATA, Kazuhiro; FUTATSUGI, Kokichi
4-Aug-1999 Proof-theoretic analysis of termination proofs by recursive path orderingIshii, Katsumasa
21-Jul-2018 The proof-theoretic strength of Ramsey's theorem for pairs and two colorsPatey, Ludovic; Yokoyama, Keita
12-Nov-2013 Propagation of partial randomnessHiguchi, Kojiro; Hudelson, W. M. Phillip; Simpson, Stephen G.; Yokoyama, Keita
4-Nov-1997 Propositional calculus with identityIshii, Tadao
Jul-2013 ProRATE: Obtaining the potential throughput from the system view in two-way relay networksZhu, Lingyun; Wang, Hai; Wang, Xin; Zhu, Yu; Lim, Azman Osman
Apr-2008 Protection and Recovery of Disk Encryption Key Using Smart CardsOmote, Kazumasa; Kato, Kazuhiko
2014 A Provable Secure Batch Authentication Scheme for EPCGen2 TagsChen, Jiageng; Miyaji, Atsuko; Su, Chunhua
Aug-2002 Provably Secure Multi-signature Scheme with Signers' IntentionsKawauchi, Kei; Minato, Hiroshi; Miyaji, Atsuko; Tada, Mitsuru
24-Jul-2002 Providing a framework for conflict resolutionSchroeter, Kirsten; Sung, Shao Chin
2005 Proving Properties of Incremental Merkle TreesOgawa, Mizuhito; Horita, Eiichi; Ono, Satoshi
Jan-2004 Pseudo approximation algorithms with applications to optimal motion planningAsano, Tetsuo; Kirkpatrick, David; Yap, Chee
23-Sep-2008 Psychoacoustically-motivated adaptive β-order generalized spectral subtraction based on data-driven optimizationLi, Junfeng; Jiang, Hui; Akagi, Masato
前ページ 次ページ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)