JAIST Repository >

検索結果

 
全て 教員登録文献  

検索結果表示: 1551-1560 / 1908.


該当アイテム:

発行日タイトル 著者
Mar-2009 A Secure RFID Authentication Protocol with Low Communication CostRahman, Mohammad Shahriar; Soshi, Masakazu; Miyaji, Atsuko
30-Mar-2009 アウェア技術を駆使した見守り中心の介護支援システムの研究國藤, 進; 三浦, 元喜; 伊藤, 禎宣; 金井, 秀明; 藤波, 努; 劉, 義; 杉原, 太郎; 高塚, 亮三; 中田, 豊久; 加藤, 直孝; 山口, 聖哉; 小柴, 等; Kunifuji, Susumu; Miura, Motoki; Ito, Sadanori; Kanai, Hideaki; Fujinami, Tsutomu; Liu, Xi; Sugihara, Taro; Takatsuka, Ryozo; Nakada, Toyohisa; Kato, Naotaka; Yamaguchi, Masaya; Koshiba, Hitoshi
2012 Are Services Functions?Sumita, Kouhei; Kitamura, Yoshinobu; Sasajima, Munehiko; Mizoguchi, Riichiro
2012 Dynamic Is−a Hierarchy Generation System Based on User’s ViewpointKozaki, Kouji; Hihara, Keisuke; Mizoguchi, Riichiro
16-Dec-2016 Guidelines for Developing and Reporting Machine Learning Predictive Models in Biomedical Research: A Multidisciplinary ViewLuo, Wei; Phung, Dinh; Tran, Truyen; Gupta, Sunil; Rana, Santu; Karmakar, Chandan; Shilton, Alistair; Yearwood, John; Dimitrova, Nevenka; Tu Bao Ho, Svetha Venkatesh, Michael Berk
26-Feb-2015 Brain Transcending: 盲点の発見と活用を可能とする発散的思考技法の提案長谷部, 礼; 西本, 一志; Hasebe, Aya; Nishimoto, Kazushi
6-Oct-2003 Implementaion and Performance Analysis of the φ-Failure DetectorHayashibara, Naohiro; Defago, Xavier; Katayama, Takuya
14-May-2014 Detection of Unusual Human Activities Based on Behavior ModelingHiraishi, Kunihiko; Kobayashi, Koichi
22-Aug-2017 Learning Human-like Behaviors using NeuroEvolution with Statistical PenaltiesPhuc, Luong Huu; Kanazawa, Naoto; Ikeda, Kokolo
2017 CyTrONE: An Integrated Cybersecurity Training FrameworkBeuran, Razvan; Pham, Cuong; Tang, Dat; Chinen, Ken-ichi; Tan, Yasuo; Shinoda, Yoichi

前へ 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 次へ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)