JAIST Repository >

検索結果

 
全て 教員登録文献  

検索結果表示: 2281-2290 / 6856.


該当アイテム:

発行日タイトル 著者
4-Jun-2012 法令実働化情報システムのアカウンタビリティ機能と進化モデルの定義と実現落水, 浩一郎; Ochimizu, Koichiro
2012 A Secure and private RFID authentication protocol under SLPN problemMamun, Mohammad S. I.; Miyaji, Atsuko; Rahman, Mohammad S.
25-Jul-2013 Development of a novel vitrification method for chondrocyte sheetsMaehara, Miki; Sato, Masato; Watanabe, Masahito; Matsunari, Hitomi; Kokubo, Mami; Kanai, Takahiro; Sato, Michio; Matsumura, Kazuaki; Hyon, Suong-Hyu; Yokoyama, Munetaka; Mochida, Joji; Nagashima, Hiroshi
Nov-2005 COMMON SENSE OF THE UNCOMMON SENSE CALLED SYSTEMS THINKING AND SYSTEMS THEORY: HOLISMMatjaz, MULEJ; Stefan, KAJZER; Vojko, POTOCAN; Jifa, Gu; Gerhard, Chroust
12-Aug-2014 The impacts of electronic state hybridization on the binding energy of single phosphorus donor electrons in extremely downscaled silicon nanostructuresAnh, Le The; Moraru, Daniel; Manoharan, Muruganathan; Tabe, Michiharu; Mizuta, Hiroshi
1-Dec-2015 Evolutionary Changes of Pokemon Game: A Case Study with Focus On Catching PokemonPanumate, Chetprayoon; Xiong, Shuo; Iida, Hiroyuki; Kondo, Toshiaki
25-Jul-2016 A framework for scheduling real-time systemsCheng, Zhuo; Zhang, Haitao; Tan, Yasuo; Lim, Yuto
11-Aug-1994 Uniqueness of normal proofs in {→,∧}-fragment of NJAoto, Takahito; Ono, Hiroakira
29-Sep-2015 Evolutionary Changes of Pokemon Game: A Case Study with Focus On Catching PokemonPanumate, Chetprayoon; Xiong, Shuo; Iida, Hiroyuki; Kondo, Toshiaki
14-Oct-2016 Towards Effective Cybersecurity Education and TrainingBeuran, Razvan; Chinen, Ken-ichi; Tan, Yasuo; Shinoda, Yoichi

前へ 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 次へ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)