発行日 | タイトル |
著者 |
24-Nov-2024 | Covering Codes as Near-Optimal Quantizers for Distributed Hypothesis Testing Against Independence | Khaledian, Fatemeh; Asvadi, Reza; Dupraz, Elsa; Matsumoto, Tad |
18-Oct-2010 | CPG based Self-adapting Multi-DOF Robotic Arm Control | Yang, Woosung; Bae, Ji-Hun; Oh, Yonghwan; Chong, Nak Young; You, Bum-Jae; Oh, Sang-Rok |
2015 | Critical Position Identification in Games and Its Application to Speculative Play | Khalid, Mohd Nor Akmal; Yusof, Umi Kalsom; Iida, Hiroyuki; Ishitobi, Taichi |
18-Dec-2018 | CROND Cyber Security Training System v1.0 インストールガイド | 小松, 源 |
27-Apr-2019 | Cross-correlation task-related component analysis (xTRCA) for enhancing evoked and induced responses of event-related potentials | Tanaka, Hirokazu; Miyakoshi, Makoto |
Oct-2013 | Cross-lingual Speech Emotion Recognition System Based on a Three-Layer Model for Human Perception | Elbarougy, Reda; Akagi, Masato |
2-Mar-2021 | Cross-Lingual Voice Conversion With Controllable Speaker Individuality Using Variational Autoencoder and Star Generative Adversarial Network | Ho, Tuan Vu; Akagi, Masato |
30-Nov-2001 | Crosstalk-Free Permutation in Rearrangeable Nonblocking Optical | Jiang, X. H.; Khandker, Md. M. R.; Shen, H.; Horiguchi, S |
Jan-2003 | Cryptanalysis of Reduced-Round RC6 without Whitening | MIYAJI, Atsuko; NONAKA, Masao; TAMURA, Yuko; SHIOTSUKI, Toru; MIYAJI, Atsuko |
1-Dec-2012 | Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack | Chen, Jiageng; Miyaji, Atsuko |
2002 | Cryptanalysis of the reduced-round RC6 | Miyaji, Atsuko; Nonaka, Masao |
Apr-1993 | CTM2マニュアル | 佐藤, 理史; Sato, Satoshi; サトウ, サトシ |
1-Oct-2018 | Culturally aware Planning and Execution of Robot Actions | Khaliq, Ali Abdul; Köckemann, Uwe; Pecora, Federico; Saffiotti, Alessandro; Bruno, Barbara; Recchiuto, Carmine Tommaso; Sgorbissa, Antonio; Bui, Ha-Duong; Chong, Nak Young |
10-Nov-1999 | Cut-free sequent calculi for Visser's propositional logics | Kikuchi, kentaro |
1-Mar-2018 | Cybersecurity Education and Training Support System: CyRIS | Beuran, Razvan; Pham, Cuong; Tang, Dat; Chinen, Ken-ichi; Tan, Yasuo; Shinoda, Yoichi |
8-Dec-2016 | CyRIS: A Cyber Range Instantiation System for Facilitating Security Training | Pham, Cuong; Tang, Dat; Chinen, Ken-ichi; Beuran, Razvan |
2017 | CyTrONE: An Integrated Cybersecurity Training Framework | Beuran, Razvan; Pham, Cuong; Tang, Dat; Chinen, Ken-ichi; Tan, Yasuo; Shinoda, Yoichi |
19-May-2020 | CyTrONE: Cyber Range Framework for Effective Cybersecurity Training | BEURAN, Razvan |
2015 | Data and error rate bounds for binary data gathering wireless sensor networks | He, Xin; Zhou, Xiaobo; Juntti, Markku; Matsumoto, Tad |
Sep-2022 | Data Augmentation Using McAdams-Coefficient-Based Speaker Anonymization for Fake Audio Detection | Li, Kai; Li, Sheng; Lu, Xugang; Akagi, Masato; Liu, Meng; Zhang, Lin; Zeng, Chang; Wang, Longbiao; Dang, Jianwu; Unoki, Masashi |
Oct-2010 | Data collection for distributed surveillance sensor networks in disaster-hit regions | Zhao, Yao; Wang, Xin; Zhao, Jin; Lim, Azman Osman |