|
JAIST Repository >
検索結果
検索結果表示: 1551-1560 / 1908.
該当アイテム:
発行日 | タイトル |
著者 |
Mar-2009 | A Secure RFID Authentication Protocol with Low Communication Cost | Rahman, Mohammad Shahriar; Soshi, Masakazu; Miyaji, Atsuko |
30-Mar-2009 | アウェア技術を駆使した見守り中心の介護支援システムの研究 | 國藤, 進; 三浦, 元喜; 伊藤, 禎宣; 金井, 秀明; 藤波, 努; 劉, 義; 杉原, 太郎; 高塚, 亮三; 中田, 豊久; 加藤, 直孝; 山口, 聖哉; 小柴, 等; Kunifuji, Susumu; Miura, Motoki; Ito, Sadanori; Kanai, Hideaki; Fujinami, Tsutomu; Liu, Xi; Sugihara, Taro; Takatsuka, Ryozo; Nakada, Toyohisa; Kato, Naotaka; Yamaguchi, Masaya; Koshiba, Hitoshi |
2012 | Are Services Functions? | Sumita, Kouhei; Kitamura, Yoshinobu; Sasajima, Munehiko; Mizoguchi, Riichiro |
2012 | Dynamic Is−a Hierarchy Generation System Based on User’s Viewpoint | Kozaki, Kouji; Hihara, Keisuke; Mizoguchi, Riichiro |
16-Dec-2016 | Guidelines for Developing and Reporting Machine Learning Predictive Models in Biomedical Research: A Multidisciplinary View | Luo, Wei; Phung, Dinh; Tran, Truyen; Gupta, Sunil; Rana, Santu; Karmakar, Chandan; Shilton, Alistair; Yearwood, John; Dimitrova, Nevenka; Tu Bao Ho, Svetha Venkatesh, Michael Berk |
26-Feb-2015 | Brain Transcending: 盲点の発見と活用を可能とする発散的思考技法の提案 | 長谷部, 礼; 西本, 一志; Hasebe, Aya; Nishimoto, Kazushi |
6-Oct-2003 | Implementaion and Performance Analysis of the φ-Failure Detector | Hayashibara, Naohiro; Defago, Xavier; Katayama, Takuya |
14-May-2014 | Detection of Unusual Human Activities Based on Behavior Modeling | Hiraishi, Kunihiko; Kobayashi, Koichi |
22-Aug-2017 | Learning Human-like Behaviors using NeuroEvolution with Statistical Penalties | Phuc, Luong Huu; Kanazawa, Naoto; Ikeda, Kokolo |
2017 | CyTrONE: An Integrated Cybersecurity Training Framework | Beuran, Razvan; Pham, Cuong; Tang, Dat; Chinen, Ken-ichi; Tan, Yasuo; Shinoda, Yoichi |
前へ
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
次へ
|