JAIST Repository >

一覧: タイトル

移動先: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
タイトルの先頭数文字を入力して移動:   

検索結果: 1308-1328 / 2073.

前ページ 次ページ
発行日タイトル 著者
26-Jul-2024 Safety-optimized Strategy for Grasp Detection in High-clutter ScenariosLi, Chenghao; Zhou, Peiwen; Chong, Nak Young
1-Jul-2014 Sankaku-Tori: An Old Western-Japanese Game Played on a Point SetHoriyama, Takashi; Kiyomi, Masashi; Okamoto, Yoshio; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi; Yamauchi, Yukiko
2017 Sankaku-tori: An Old Western-Japanese Game Played on a Point SetHoriyama, Takashi; Iizuka, Takashi; Kiyomi, Masashi; Okamoto, Yoshio; Uehara, Ryuhei; Uno, Takeaki; Uno, Yushi; Yamauchi, Yukiko
May-2014 A Scalable and Secure RFID Ownership Transfer ProtocolMamun, Mohammad Saiful Islam; Miyaji, Atsuko
14-Nov-1995 A scalable disk system with data reconstruction functionsYokota, Haruo; Mimatsu, Yasuyuki; 横田, 治夫; 味松, 康行; ヨコタ, ハルオ; ミマツ, ヤスユキ
9-Aug-2011 Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmeticGoundar, Raveen R.; Joye, Marc; Miyaji, Atsuko; Rivain, Matthieu; Venelli, Alexandre
22-Aug-2009 Scale Free Interval GraphsMiyoshi, Naoto; Shigezumi, Takeya; Uehara, Ryuhei; Watanabe, Osamu
16-Apr-2010 Scale free properties of random k-treesCooper, Colin; Uehara, Ryuhei
1-Sep-2013 Scan Matching Online Cell Decomposition for Coverage Path Planning in an Unknown EnvironmentDugarjav, Batsaikhan; Lee, Soon-Geul; Kim, Donghan; Kim, Jong Hyeong; Chong, Nak Young
31-Jul-2001 A scenario-based object-oriented modeling method with algebraic specification techniquesNakajima, Shin; Futatsugi, Kokichi
17-Feb-2000 Scheduling of parallel identical machines to maximize the weighted numberHiraishi, Kunihiko; Levner, Eugene; Vlach, Milan
30-May-2016 Scheduling overload for real-time systems using SMT solverCheng, Zhuo; Zhang, Haitao; Tan, Yasuo; Lim, Yuto
25-Jul-1997 Second order tangent sets and optimality conditionsCambini, Alberto; Martein, Laura; Vlach, Milan
Aug-2002 A Second-price Sealed-bid Auction with Public VerifiabilityOmote, Kazumasa; Miyaji, Atsuko
2003 A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th RootOmote, Kazumasa; Miyaji, Atsuko
2012 A Secure and private RFID authentication protocol under SLPN problemMamun, Mohammad S. I.; Miyaji, Atsuko; Rahman, Mohammad S.
Aug-2006 Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPAMAMIYA, Hideyo; MIYAJI, Atsuko; MORIMOTO, Hiroaki
Mar-2009 A Secure RFID Authentication Protocol with Low Communication CostRahman, Mohammad Shahriar; Soshi, Masakazu; Miyaji, Atsuko
Mar-2015 Secure sets and defensive alliances in graphs: A faster algorithm and improved boundsAmano, Kazuyuki; Oo, Kyaw May; Otachi, Yota; Uehara, Ryuhei
Jul-2014 Secure VANET Applications with a refined Group SignatureIslam Mamun, Mohammad Saiful; Miyaji, Atsuko
Oct-2008 Security and Access Control for Vehicular CommunicationsZrelli, Saber; Miyaji, Atsuko; Shinoda, Yoichi; Ernst, Thierry
前ページ 次ページ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)