Research Output 1981 2020

Filter
Conference article
2018
1 Citation (Scopus)

Class dependency of fuzzy relational database using relational calculus and conditional probability

Akbar, M. D., Mizoguchi, Y. & Adiwijaya, Apr 5 2018, In : Journal of Physics: Conference Series. 971, 1, 012001.

Research output: Contribution to journalConference article

calculus
equivalence
projection
injection
formulations

Decay of false vacua via impurities in string theories

Ookouchi, Y., Nakai, Y. & Tanahashi, N., Jan 1 2018, In : Proceedings of Science. 347

Research output: Contribution to journalConference article

string theory
impurities
vacuum
decay
catalysis
2017

Large deviations for increasing subsequences of permutations and a concurrency application

Baryshnikov, Y. & Magner, A., Sep 1 2017, In : Performance Evaluation Review. 45, 2, p. 39-41 3 p.

Research output: Contribution to journalConference article

Sampling
Geometry
2015

A fault detection technique for the steel manufacturing process based on a normal pattern library

Hirata, T., Kawahara, Y., Sugiyama, M. & Asano, K., Sep 1 2015, In : IFAC-PapersOnLine. 28, 21, p. 871-876 6 p.

Research output: Contribution to journalConference article

Fault detection
Steel
Accidents
Environmental impact
Time series
2 Citations (Scopus)

Application of facial reduction to H state feedback control problem

Waki, H. & Sebe, N., Jul 1 2015, In : IFAC-PapersOnLine. 28, 14, p. 113-119 7 p.

Research output: Contribution to journalConference article

Linear matrix inequalities
State feedback
Feedback control
Convergence of numerical methods
Control systems
6 Citations (Scopus)

A probabilistic model for martensitic avalanches

Ball, J. M., Cesana, P. & Hambly, B., Dec 7 2015, In : MATEC Web of Conferences. 33, 02008.

Research output: Contribution to journalConference article

Random processes
Statistical Models
2014
6 Citations (Scopus)

Cheater identifiable secret sharing schemes via multi-receiver authentication

Xu, R., Morozov, K. & Takagi, T., Jan 1 2014, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8639 LNCS, p. 72-87 16 p.

Research output: Contribution to journalConference article

Secret Sharing Scheme
Authentication
Receiver
Authentication Codes
Secret Sharing
2013
2 Citations (Scopus)
Flow of gases
Fluids
Dimensional stability
Stability criteria
Vorticity
2010
5 Citations (Scopus)

Lagrangian approach to weakly nonlinear stability of elliptical flow

Fukumoto, Y., Hirota, M. & Mie, Y., Dec 1 2010, In : Physica Scripta T. T142, 014049.

Research output: Contribution to journalConference article

Nonlinear Stability
Kelvin waves
Kelvin
Perturbation
Rotating Flow
2009

Numerical computations of energy balances in thermal convection problems

Tagami, D., Jan 1 2009, In : International Conference on Computational Methods for Thermal Problems. 223599, p. 199-202 4 p.

Research output: Contribution to journalConference article

Melting furnaces
Thermal Convection
Energy Balance
Furnace
Energy balance
2008
8 Citations (Scopus)

Elliptical instability of a vortex tube and drift current induced by it

Fukumoto, Y. & Hirota, M., Dec 1 2008, In : Physica Scripta T. T132, 014041.

Research output: Contribution to journalConference article

vortex tubes
Kelvin waves
Kelvin wave
vortex
Vortex
2005
13 Citations (Scopus)

A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two

Kitamura, I., Katagi, M. & Takagi, T., Oct 18 2005, In : Lecture Notes in Computer Science. 3574, p. 146-157 12 p.

Research output: Contribution to journalConference article

Hyperelliptic Curves
Cryptosystem
Divisor
Cryptography
Genus
10 Citations (Scopus)

Efficient representations on Koblitz curves with resistance to side channel attacks

Okeya, K., Takagi, T. & Vuillaume, C., Oct 18 2005, In : Lecture Notes in Computer Science. 3574, p. 218-229 12 p.

Research output: Contribution to journalConference article

Side Channel Attacks
Curve
Countermeasures
Scalar multiplication
Power Analysis
8 Citations (Scopus)

Novel efficient implementations of hyperelliptic curve cryptosystems using degenerate divisors

Katagi, M., Kitamura, I., Akishita, T. & Takagi, T., Sep 1 2005, In : Lecture Notes in Computer Science. 3325, p. 345-359 15 p.

Research output: Contribution to journalConference article

Hyperelliptic Curves
Cryptosystem
Efficient Implementation
Divisor
Cryptography

Reconstructing phylogenetic trees of prokaryote genomes by randomly sampling oligopeptides

Maruyama, O., Matsuda, A. & Kuhara, S., Sep 30 2005, In : Lecture Notes in Computer Science. 3515, II, p. 911-918 8 p.

Research output: Contribution to journalConference article

Phylogenetic Tree
Genome
Genes
Sampling
Phylogenetics
6 Citations (Scopus)

Robust supervised image classifiers by spatial AdaBoost based on robust loss functions

Nishii, R. & Eguchi, S., Dec 1 2005, In : Proceedings of SPIE - The International Society for Optical Engineering. 5982, 59820D.

Research output: Contribution to journalConference article

Adaptive boosting
AdaBoost
Loss Function
classifiers
Classifiers
8 Citations (Scopus)

Short memory scalar multiplication on Koblitz curves

Okeya, K., Takagi, T. & Vuillaume, C., Nov 4 2005, In : Lecture Notes in Computer Science. 3659, p. 91-105 15 p.

Research output: Contribution to journalConference article

Scalar multiplication
Data storage equipment
Curve
Hardware Implementation
Computer hardware
3 Citations (Scopus)

Some improved algorithms for hyperelliptic curve cryptosystems using degenerate divisors

Katagi, M., Akishita, T., Kitamura, I. & Takagi, T., Sep 27 2005, In : Lecture Notes in Computer Science. 3506, p. 296-312 17 p.

Research output: Contribution to journalConference article

Hyperelliptic Curves
Cryptosystem
Divisor
Cryptography
Genus
9 Citations (Scopus)

Verification of deforestation in East Asia by spatial logit models due to population and relief energy

Tanaka, S. & Nishii, R., Dec 1 2005, In : Proceedings of SPIE - The International Society for Optical Engineering. 5976, 59760W.

Research output: Contribution to journalConference article

deforestation
Deforestation
Logit Model
Spatial Model
spatial dependencies
2003
13 Citations (Scopus)

Large scale finite element analysis with a balancing domain decomposition method

Shioya, R., Ogino, M., Kanayama, H. & Tagami, D., Jun 30 2003, In : Key Engineering Materials. 243-244, p. 21-26 6 p.

Research output: Contribution to journalConference article

Domain decomposition methods
Dynamic loads
Pressure vessels
Information management
Resource allocation
2000
2 Citations (Scopus)

A parallel computing for magnetostatic problems with iterative domain decomposition method

Tagami, D., Kanayama, H., Shioya, R. & Nakiri, T., Dec 1 2000, In : Theoretical and Applied Mechanics. 49, p. 321-329 9 p.

Research output: Contribution to journalConference article

parallel computing
Domain decomposition methods
Magnetostatics
Parallel processing systems
decomposition
3 Citations (Scopus)

Bilinearization of discrete soliton equations through the singularity confinement test

Kajiwara, K., Maruno, K. I. & Oikawa, M., Jan 1 2000, In : Chaos, solitons and fractals. 11, 1, p. 33-39 7 p.

Research output: Contribution to journalConference article

Soliton Equation
Discrete Equations
Singularity
Integrable Systems
Discrete Systems
1996

Design method of triplet decision tree classifier with division-wait mechanism

Yoshikawa, M., Fujimura, S., Tanaka, S. & Nishii, R., Dec 1 1996, In : Proceedings of SPIE - The International Society for Optical Engineering. 2955, p. 52-62 11 p.

Research output: Contribution to journalConference article

Decision trees
classifiers
Decision tree
division
Design Method