発行日 | タイトル |
著者 |
26-Jul-2024 | Safety-optimized Strategy for Grasp Detection in High-clutter Scenarios | Li, Chenghao; Zhou, Peiwen; Chong, Nak Young |
1-Jul-2014 | Sankaku-Tori: An Old Western-Japanese Game Played on a Point Set | Horiyama, Takashi; Kiyomi, Masashi; Okamoto, Yoshio; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi; Yamauchi, Yukiko |
2017 | Sankaku-tori: An Old Western-Japanese Game Played on a Point Set | Horiyama, Takashi; Iizuka, Takashi; Kiyomi, Masashi; Okamoto, Yoshio; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi; Yamauchi, Yukiko |
May-2014 | A Scalable and Secure RFID Ownership Transfer Protocol | Mamun, Mohammad Saiful Islam; Miyaji, Atsuko |
14-Nov-1995 | A scalable disk system with data reconstruction functions | Yokota, Haruo; Mimatsu, Yasuyuki; 横田, 治夫; 味松, 康行; ヨコタ, ハルオ; ミマツ, ヤスユキ |
9-Aug-2011 | Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic | Goundar, Raveen R.; Joye, Marc; Miyaji, Atsuko; Rivain, Matthieu; Venelli, Alexandre |
22-Aug-2009 | Scale Free Interval Graphs | Miyoshi, Naoto; Shigezumi, Takeya; Uehara, Ryuhei; Watanabe, Osamu |
16-Apr-2010 | Scale free properties of random k-trees | Cooper, Colin; Uehara, Ryuhei |
1-Sep-2013 | Scan Matching Online Cell Decomposition for Coverage Path Planning in an Unknown Environment | Dugarjav, Batsaikhan; Lee, Soon-Geul; Kim, Donghan; Kim, Jong Hyeong; Chong, Nak Young |
31-Jul-2001 | A scenario-based object-oriented modeling method with algebraic specification techniques | Nakajima, Shin; Futatsugi, Kokichi |
17-Feb-2000 | Scheduling of parallel identical machines to maximize the weighted number | Hiraishi, Kunihiko; Levner, Eugene; Vlach, Milan |
30-May-2016 | Scheduling overload for real-time systems using SMT solver | Cheng, Zhuo; Zhang, Haitao; Tan, Yasuo; Lim, Yuto |
25-Jul-1997 | Second order tangent sets and optimality conditions | Cambini, Alberto; Martein, Laura; Vlach, Milan |
Aug-2002 | A Second-price Sealed-bid Auction with Public Verifiability | Omote, Kazumasa; Miyaji, Atsuko |
2003 | A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th Root | Omote, Kazumasa; Miyaji, Atsuko |
2012 | A Secure and private RFID authentication protocol under SLPN problem | Mamun, Mohammad S. I.; Miyaji, Atsuko; Rahman, Mohammad S. |
Aug-2006 | Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA | MAMIYA, Hideyo; MIYAJI, Atsuko; MORIMOTO, Hiroaki |
Mar-2009 | A Secure RFID Authentication Protocol with Low Communication Cost | Rahman, Mohammad Shahriar; Soshi, Masakazu; Miyaji, Atsuko |
Mar-2015 | Secure sets and defensive alliances in graphs: A faster algorithm and improved bounds | Amano, Kazuyuki; Oo, Kyaw May; Otachi, Yota; Uehara, Ryuhei |
Jul-2014 | Secure VANET Applications with a refined Group Signature | Islam Mamun, Mohammad Saiful; Miyaji, Atsuko |
Oct-2008 | Security and Access Control for Vehicular Communications | Zrelli, Saber; Miyaji, Atsuko; Shinoda, Yoichi; Ernst, Thierry |