JAIST Repository >

一覧: タイトル

移動先: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
タイトルの先頭数文字を入力して移動:   

検索結果: 303-323 / 2073.

前ページ 次ページ
発行日タイトル 著者
24-Nov-2024 Covering Codes as Near-Optimal Quantizers for Distributed Hypothesis Testing Against IndependenceKhaledian, Fatemeh; Asvadi, Reza; Dupraz, Elsa; Matsumoto, Tad
18-Oct-2010 CPG based Self-adapting Multi-DOF Robotic Arm ControlYang, Woosung; Bae, Ji-Hun; Oh, Yonghwan; Chong, Nak Young; You, Bum-Jae; Oh, Sang-Rok
2015 Critical Position Identification in Games and Its Application to Speculative PlayKhalid, Mohd Nor Akmal; Yusof, Umi Kalsom; Iida, Hiroyuki; Ishitobi, Taichi
18-Dec-2018 CROND Cyber Security Training System v1.0 インストールガイド小松, 源
27-Apr-2019 Cross-correlation task-related component analysis (xTRCA) for enhancing evoked and induced responses of event-related potentialsTanaka, Hirokazu; Miyakoshi, Makoto
Oct-2013 Cross-lingual Speech Emotion Recognition System Based on a Three-Layer Model for Human PerceptionElbarougy, Reda; Akagi, Masato
2-Mar-2021 Cross-Lingual Voice Conversion With Controllable Speaker Individuality Using Variational Autoencoder and Star Generative Adversarial NetworkHo, Tuan Vu; Akagi, Masato
30-Nov-2001 Crosstalk-Free Permutation in Rearrangeable Nonblocking OpticalJiang, X. H.; Khandker, Md. M. R.; Shen, H.; Horiguchi, S
Jan-2003 Cryptanalysis of Reduced-Round RC6 without WhiteningMIYAJI, Atsuko; NONAKA, Masao; TAMURA, Yuko; SHIOTSUKI, Toru; MIYAJI, Atsuko
1-Dec-2012 Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery AttackChen, Jiageng; Miyaji, Atsuko
2002 Cryptanalysis of the reduced-round RC6Miyaji, Atsuko; Nonaka, Masao
Apr-1993 CTM2マニュアル佐藤, 理史; Sato, Satoshi; サトウ, サトシ
1-Oct-2018 Culturally aware Planning and Execution of Robot ActionsKhaliq, Ali Abdul; Köckemann, Uwe; Pecora, Federico; Saffiotti, Alessandro; Bruno, Barbara; Recchiuto, Carmine Tommaso; Sgorbissa, Antonio; Bui, Ha-Duong; Chong, Nak Young
10-Nov-1999 Cut-free sequent calculi for Visser's propositional logicsKikuchi, kentaro
1-Mar-2018 Cybersecurity Education and Training Support System: CyRISBeuran, Razvan; Pham, Cuong; Tang, Dat; Chinen, Ken-ichi; Tan, Yasuo; Shinoda, Yoichi
8-Dec-2016 CyRIS: A Cyber Range Instantiation System for Facilitating Security TrainingPham, Cuong; Tang, Dat; Chinen, Ken-ichi; Beuran, Razvan
2017 CyTrONE: An Integrated Cybersecurity Training FrameworkBeuran, Razvan; Pham, Cuong; Tang, Dat; Chinen, Ken-ichi; Tan, Yasuo; Shinoda, Yoichi
19-May-2020 CyTrONE: Cyber Range Framework for Effective Cybersecurity TrainingBEURAN, Razvan
2015 Data and error rate bounds for binary data gathering wireless sensor networksHe, Xin; Zhou, Xiaobo; Juntti, Markku; Matsumoto, Tad
Sep-2022 Data Augmentation Using McAdams-Coefficient-Based Speaker Anonymization for Fake Audio DetectionLi, Kai; Li, Sheng; Lu, Xugang; Akagi, Masato; Liu, Meng; Zhang, Lin; Zeng, Chang; Wang, Longbiao; Dang, Jianwu; Unoki, Masashi
Oct-2010 Data collection for distributed surveillance sensor networks in disaster-hit regionsZhao, Yao; Wang, Xin; Zhao, Jin; Lim, Azman Osman
前ページ 次ページ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)