Search Results1-20 of  52

  • 1 / 3
  • 猪俣 敦夫 ID: 9000006116004

    独立行政法人科学技術振興機構 社会技術研究開発センター (2006 from CiNii)

    Articles in CiNii:1

    • 感性のテクノロジー入門 : 暗闇から生まれる映像表現, 宮原 誠(著), アスキー, 2005-05, B5判, 定価(本体1,900円+税) (2006)
  • 猪俣 敦夫 ID: 9000025025717

    Articles in CiNii:1

    • MetaFa : Metadata Management System for Fiexible Data Access in the Wide Area Network Environments (2011)
  • 猪俣 敦夫 ID: 9000242138889

    Articles in CiNii:1

    • Context estimation based on an action speed by using Accelerometers (2011)
  • 猪俣 敦夫 ID: 9000242139748

    Articles in CiNii:1

    • Proposal of dynamic resource allocation system based on load of server in the cloud computing (2011)
  • 猪俣 敦夫 ID: 9000255006587

    奈良先端科学技術大学院大学 (2013 from CiNii)

    Articles in CiNii:1

    • RA-006 Normal Basisを用いた多項式基底間の基底変換(A分野:モデル・アルゴリズム・プログラミング,査読付き論文) (2013)
  • 猪俣 敦夫 ID: 9000287076844

    Articles in CiNii:1

    • Design and Implemntation of The ε-ARK (Electronic/Emergency Army Knife) for Ordinary and Emergency Situations. (2008)
  • 猪俣 敦夫 ID: 9000287086514

    Articles in CiNii:1

    • Design and Implemntation of The ε-ARK (Electronic/Emergency Army Knife) for Ordinary and Emergency Situations. (2008)
  • 猪俣 敦夫 ID: 9000287145435

    Articles in CiNii:1

    • Does The Old Zaurus Dream of The ε-ARK Device? (2008)
  • 猪俣 敦夫 ID: 9000287150225

    Articles in CiNii:1

    • A study to understand and elucidate model for informationsecurity risk based on Protection Motivation Theory (2011)
  • 猪俣 敦夫 ID: 9000287150499

    Articles in CiNii:1

    • Proposal of a Security Framework for Virtual MachineResource Management on Cloud Computing (2011)
  • 猪俣 敦夫 ID: 9000287154050

    Articles in CiNii:1

    • Consideration on Malware Classification by the Function based on the Malware's Code (2011)
  • 猪俣 敦夫 ID: 9000287155594

    Articles in CiNii:1

    • Proposal of Electric Power Saving on Mandara System for Universiy Continuity (2011)
  • 猪俣 敦夫 ID: 9000287160011

    Articles in CiNii:1

    • Proposal of flow digest approach on Hash-based IP traceback against actual attacks (2012)
  • 猪俣 敦夫 ID: 9000287160254

    Articles in CiNii:1

    • Proposal of flow digest approach on Hash-based IP traceback against actual attacks (2012)
  • 猪俣 敦夫 ID: 9000287161129

    Articles in CiNii:1

    • Activity recognition on a mobile device by generation method of classification model (2012)
  • 猪俣 敦夫 ID: 9000287161299

    Articles in CiNii:1

    • A Design of Distributed Data Managements for Large Scale Location Based Services Guide to the Technical Report and Template (2012)
  • 猪俣 敦夫 ID: 9000287161304

    Articles in CiNii:1

    • A divide and merge method of sensor data processing based on geographic information on large-scale publish/subscribe systems (2012)
  • 猪俣 敦夫 ID: 9000287168288

    Articles in CiNii:1

    • A study of parallel computation of pairings on hyperelliptic curves with pairing-friendly fields (2012)
  • 猪俣 敦夫 ID: 9000287189142

    Articles in CiNii:1

    • An Efficient Implementation of <i><sub>nT</sub></i> Pairing on Genus 2 Hyperelliptic Curve and Discrete Logarithms in Finite Fields of Characteristic 2 (2013)
  • 猪俣 敦夫 ID: 9000287208100

    Articles in CiNii:1

    • Study of Malware's Function is Organized Using Goal-Oriented Requirements Analysis Method (2014)
  • 1 / 3
Page Top