発行日 | タイトル |
著者 |
Jan-2007 | An Analytical Method for MMSE MIMO Turbo Equalizer EXIT Chart Computation | Kansanen, K.; Matsumoto, T. |
25-Aug-2015 | Analyzing Reliability Change in Legal Case | Jirakunkanok, Pimolluck; Sano, Katsuhiko; Tojo, Satoshi |
19-May-2014 | Analyzing the Impact of Mitigation Strategies on the Spread of a Virus | Nguyen, Thanh Dang; Bonnet, Francois; Defago, Xavier |
Sep-2007 | Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption | Miyaji, Atsuko |
29-Jan-2014 | Anomalous nonadditive dispersion interactions in systems of three one-dimensional wires | Misquitta, Alston J.; Maezono, Ryo; Drummond, Neil D.; Stone, Anthony J.; Needs, Richard J. |
2003 | Anonymity-enhanced Pseudonym System | Tamura, Yuko; Miyaji, Atsuko |
1-Feb-2020 | Anonymization Technique based on SGD Matrix Factrization | Mimoto, Tomoaki; Hidano, Seira; Kiyomoto, Shinsaku; Miyaji, Atsuko |
2000 | An anonymous auction protocol with a single non-trusted center using binary trees | Omote, Kazumasa; Miyaji, Atsuko |
2010 | An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation | Emura, Keita; Miyaji, Atsuko ; Omote, Kazumasa |
Aug-2001 | An Anonymous Sealed-bid Auction with a Feature of Entertainment | Omote, Kazumasa; Miyaji, Atsuko |
28-Nov-2006 | Anonymous stabilizing leader election using a network sequencer | Wiesmann, Matthias; Defago, Xavier |
May-2007 | Anonymous Stabilizing Leader Election using a Network Sequencer | Wiesmann, Matthias; Defago, Xavier |
Nov-1997 | Another Countermeasure to Forgeries over Message Recovery Signature | MIYAJI, Atsuko |
Apr-2007 | Antenna Doping: A Countermeasure Against MIMO Spatial Correlation | Kai, Yen; Karjalainen, J.; Matsumoto, T. |
2005 | Antenna-by-Antenna and Joint-over-Antenna MIMO Signal Detection Techniques for Turbo-Coded SC/MMSE Frequency Domain Equalization | Karjalainen, J.; Kansanea, K.; Veselinovic, N.; Matsumoto, T. |
19-Mar-2012 | Any Monotone Function is Realized by Interlocked Polygons | Demaine, Erik D.; Demaine, Martin L.; Uehara, Ryuhei |
29-Oct-2015 | Application of Data Compression Technique in Congested Networks | Kho, Lee Chin; Ngu, Sze Song; Tan, Yasuo; Lim, Azman Osman |
1-Feb-2009 | Application of DES Theory to Verification of Software Components | HIRAISHI, Kunihiko; KUČERA, Petr |
22-Mar-2015 | Application of Loose Symmetry Bias to Multiple Meaning Environment | Matoba, Ryuichi; Sudo, Hiroki; Nakamura, Makoto; Tojo, Satoshi |
Aug-1998 | Applications of Shimura's methods of canonical model to intermediate infinitary logics | Tanaka, Yoshihito |
2015 | An Approach to Quantifying Pokemon's Entertainment Impact with focus on Battle | Panumate, Chetprayoon; Xiong, Shuo; Iida, Hiroyuki |