Search Results1-20 of  52

  • 1 / 3
  • 猪俣 敦夫 ID: 9000006116004

    独立行政法人科学技術振興機構 社会技術研究開発センター (2006 from CiNii)

    Articles in CiNii:1

    • 感性のテクノロジー入門 : 暗闇から生まれる映像表現, 宮原 誠(著), アスキー, 2005-05, B5判, 定価(本体1,900円+税) (2006)
  • 猪俣 敦夫 ID: 9000025025717

    Articles in CiNii:1

    • MetaFa : Metadata Management System for Fiexible Data Access in the Wide Area Network Environments (2011)
  • 猪俣 敦夫 ID: 9000242138889

    Articles in CiNii:1

    • Context estimation based on an action speed by using Accelerometers (2011)
  • 猪俣 敦夫 ID: 9000242139748

    Articles in CiNii:1

    • Proposal of dynamic resource allocation system based on load of server in the cloud computing (2011)
  • 猪俣 敦夫 ID: 9000255006587

    奈良先端科学技術大学院大学 (2013 from CiNii)

    Articles in CiNii:1

    • RA-006 Normal Basisを用いた多項式基底間の基底変換(A分野:モデル・アルゴリズム・プログラミング,査読付き論文) (2013)
  • 猪俣 敦夫 ID: 9000287145435

    Articles in CiNii:1

    • Does The Old Zaurus Dream of The ε-ARK Device? (2008)
  • 猪俣 敦夫 ID: 9000287150225

    Articles in CiNii:1

    • A study to understand and elucidate model for informationsecurity risk based on Protection Motivation Theory (2011)
  • 猪俣 敦夫 ID: 9000287150499

    Articles in CiNii:1

    • Proposal of a Security Framework for Virtual MachineResource Management on Cloud Computing (2011)
  • 猪俣 敦夫 ID: 9000287154050

    Articles in CiNii:1

    • Consideration on Malware Classification by the Function based on the Malware's Code (2011)
  • 猪俣 敦夫 ID: 9000287155594

    Articles in CiNii:1

    • Proposal of Electric Power Saving on Mandara System for Universiy Continuity (2011)
  • 猪俣 敦夫 ID: 9000287168288

    Articles in CiNii:1

    • A study of parallel computation of pairings on hyperelliptic curves with pairing-friendly fields (2012)
  • 猪俣 敦夫 ID: 9000287189142

    Articles in CiNii:1

    • An Efficient Implementation of <i><sub>nT</sub></i> Pairing on Genus 2 Hyperelliptic Curve and Discrete Logarithms in Finite Fields of Characteristic 2 (2013)
  • 猪俣 敦夫 ID: 9000287208100

    Articles in CiNii:1

    • Study of Malware's Function is Organized Using Goal-Oriented Requirements Analysis Method (2014)
  • 猪俣 敦夫 ID: 9000287209855

    Articles in CiNii:1

    • State Notification System of an Infant on Android Device (2014)
  • 猪俣 敦夫 ID: 9000304613089

    Articles in CiNii:1

    • Introduction of a special human resource development program (SecCap) for information security (2013)
  • 猪俣 敦夫 ID: 9000356598184

    Articles in CiNii:1

    • Network based detection of Remote Access Trojan communication by using packet entropy on early instruction stage (2017)
  • 猪俣 敦夫 ID: 9000356602542

    Articles in CiNii:1

    • Network based detection of Remote Access Trojan communication by using packet entropy on early instruction stage (2017)
  • 猪俣 敦夫 ID: 9000368931464

    Articles in CiNii:1

    • Future Map of Information Processing Technology : Flooded Displays and High Definition Transmission (2010)
  • 猪俣 敦夫 ID: 9000378076942

    Articles in CiNii:1

    • Estimation of Illegal Remittance Amount of Damage in the Internet Banking (2017)
  • 猪俣 敦夫 ID: 9000384267641

    Articles in CiNii:1

    • A RAT Detection Method by Using Packet Entropy on Early Intrusion Stage (2018)
  • 1 / 3
Page Top