Top page > �w��ɂ��� > ��ҁE�̍������ > �V���_���A�e��� > 2013�N�x |
�V���_���A2013�N�x�e��� |
�h�̗�
�́@���@�@���@�v�iNEL�j | ����Click | |
���@�ā@�@���@���i�k��j | ����Click | |
���@�с@�@�Ӂ@��i�d�ʑ�j | ����Click | |
���@��@�@�ā@���i�O�H�d�@�j | ����Click | |
�@�c�@�@�@�@�i�i����j | ����Click |
���@���@�@�@�@�^�i���H��j | ����Click | |
ꎁ@���@�@���@�v�i�g���^IT�J���Z���^�[�j | ����Click | |
�y�@��@�@���a�q�i���Łj | ����Click | |
���@���@�@�͎��Y�i���j | ����Click | |
���@�c�@�@�@�@�_�i�����d�@��j | ����Click |
�A�h�z�b�N�l�b�g���[�N�E�������b�V���l�b�g���[�N�Z�p�̐擱�I�����J���@����Click
�ԁ@���@�@���@��i�V����j |
�Í���ǂ̐��E�L�^��B�����A������Í��̈��S�����m��������I�����@����Click
���@�@�@�@�@���i���j | |
���@�R�@�@���@�i�i�x�m�ʌ��j | |
�@���@�@���@�s�iNICT�j |
�ړ��ʐM�ɂ�����M�������A���e�i�̐��I�����@����Click
���@��@�@���@�F�i�k��j |
100G�f�W�^���R�q�[�����g���`�������̎��p���@����Click
�x�@�V�@�@���@�l�iNTT�j | |
���@���@�@�@�@���i�x�m�ʁj | |
�e�@�r�@�@�a�@�N�i����j |
�X�[�p�[�R���s���[�^�u���v�̌����J���@����Click
���@�i�@�@���@�R�i�����j | |
���@��@�@�`�@���i�x�m�ʁj | |
���@��@�@�O�Õv�i�_�ˑ�j |
�}���`�|�[�g�A���v�̔����ƃ}���`�r�[���ړ��̉q���ʐM���p���ւ̍v���@����Click
�]�@��@�@�r��Y�i������j | |
��@���@�@�@�@���i�����ّ�j |
Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight�@����Click
�I�@���@�@�@�@�~�iKDDI���j | |
�A�@���@�@�F�@�F�i���H��j | |
���@�{�@�@�����Y�i���H��j | |
����24�N11�����i�p���_����A�j |
A 128-bit Chip Identification Generating Scheme Exploiting Load Transistors' Variation in SRAM Bitcells�@����Click
���@���@�@�r�@��i�_�ˑ�j | |
�g�@�{�@�@�G�@��i�_�ˑ�j | |
��@���@�@�@�@���i�_�ˑ�j | |
�g�@�{�@�@��@�F�i�_�ˑ�j | |
����24�N12�����i�p���_����A�j |
Image Recovery by Decomposition with Component-Wise Regularization�@����Click
���@��@�@�s�@�C�i���H��j | |
�R�@�c�@�@�@�@���i���H��j | |
�R�@���@�@���@���i���H��j | |
�{�@�c�@�@���@���i��t�H��j | |
����24�N12�����i�p���_����A�j |
�E�F�[�u���b�g��͂Ɋ�Â��`�������胂�f���̐��x�]���@�@����Click
���@��@�@�N�@�N�iNTT�h�R���j | |
����24�N10�����i�a���_����B�j |
Bitwise Operation-Based In-Network Processing for Loss Tomography�@����Click
���@�c�@�@���@�O�i���j | |
��@���@�@�N�@�Ɓi���j | |
����25�N2�����i�p���_����B�j |
Path Loss Model with Low Antenna Height for Microwave Bands in Residential Areas
����Click
���X�@�@���@���iNTT�j | |
�R�@�c�@�@�@�@�iNTT�j | |
�k�@�@�@�@���@���iNTT�j | |
���@�R�@�@���@���iNTT�j | |
����25�N7�����i�p���_����B�j |
MgO:LiNbO3�������ɔ��]�\���d�C���w�u���b�O�Ό��^�ꎟ����Ԍ��ϒ����@����Click
��@��@�@�q�@�V�i���j | |
���@���@�@�q�@���i���j | |
����25�N4�����i�a���_����C�j |
���C���^�����d�͓`���ɑ��鍂���l�̐��l�h�V���g������@����Click
�y�@�c�@�@���@��i���H��j | |
���[�N �\�C���b�J�i���H��j | |
���@�c�@�@�W�@���i���H��j | |
����25�N6�����i�a���_����C�j |
�Ε\�ʏƎˌ^�䊴�x12.7�{1670����/�b 31����f���ʏƎˌ^�������xCCD�B���f�q �@����Click
�V�@��@�@�r�@��iNHK�j | |
�ā@���@�@�@�@�~�iNHK�j | |
�с@�c�@�@�N�@�ƁiNHK�j | |
��@�|�@�@�@�@�_�iNHK�j | |
�o�� �N�C�N �n���[�i�e���_�C���E�_���T�j | |
�]�@���@�@���@���i�����ّ�j | |
����25�N7�����i�a���_����C�j |
Machine Learning in Computer-Aided Diagnosis of the Thorax and Colon in CT: A Survey
�@
����Click
��@�@�@���@���iThe University of Chicago�j | |
����25�N4�����i�p���_����D�j |
�}���`�R�ACPU���ɂ������C�e���V�f�[�^�X�g���[�������@����Click
��@�c�@�@���@���i����j | |
�H�@���@�@���@���i����j | |
�R�@���@�@���@�l�i����j | |
����25�N5�����i�a���_����D�j |
�X�y�N�g�����_�̃p�^�[���}�b�`���O�ւ̉��p�Ƃ��̐��\�]�� �@����Click
��@��@�@�@�@���i�F�{��j | |
���@���@�@�\�@��i�F�{��j | |
����25�N8�����i�a���_����D�j |
Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight�@����Click
�I�@���@�@�@�@�~�iKDDI���j | |
�A�@���@�@�F�@�F�i���H��j | |
���@�{�@�@�����Y�i���H��j | |
����24�N11�����i�p���_����A�j |
���J���[�L������ |
||
�u�X�e�[�W�ɂ́A���̏��������K�v�������B�v | ||
�A�����c������� | ||
�@ | ||
����F����L������ |
||
�u�������A������x�B�v | ||
�x�m�ʊ������ | ||
��b�E���E�\�T�C�G�e�B�F8��
��� |
���� �i���\���j |
�ڍ� |
���@�{�@�@��@�� |
�R���� |
|
�I�@���@�@��@�� |
���{�H�� |
|
���@�с@�@�h�@�� |
NEC |
|
�V�@�c�@�@�߂��� |
�O�H�d�@ |
|
�ā@�c�@�@���@�� |
NEC |
|
���@�R�@�@�@�@�� |
���� |
|
���@���@�@�@�@�� |
��� |
|
���@���@�@�r�@�� |
���k�� |
�ʐM�\�T�C�G�e�B�F38��
��� |
���� �i���\���j |
�ڍ� |
Filippos�@Balasis |
���� |
|
Guoxiu�@�@Huang |
��� |
|
Yanyan�@�@�@Ma |
NTT�h�R�� |
|
�@��@�@���@�� |
�O�H�d�@ |
|
��@�@�@���@�V | KDDI�� |
|
���@�c�@�@�^�@�� |
�d�ʑ� |
|
���@�q�@�@��@�� |
NEC |
|
���@���@�@�ǁ@�m |
�V���� |
|
��@���@�@����q |
NTT |
|
��@�{�@�@�Y�@�� |
���k�� |
|
�݁@��@�@���@�I |
NTT |
|
�k�@���@�@���@�F |
NTT |
|
�@���@�@�s�@�� |
���k�� |
|
�I�@�R�@�@�@�@�� |
�O�H�d�@ |
|
���@�@�@�\�@�� |
KDDI�� |
|
��@���@�@���@�s |
KDDI�� |
|
ꎁ@���@�@�_���Y |
NTT |
|
��@�{�@�@�ׁ@�u |
NTT |
|
���@��@�@�m�@�� |
NTT�h�R�� |
|
�{�@ |