Search concepts
|
Selected filters
|
- 61,600 - 61,650 out of 76,552 results
Search results
-
Second-order properties of locally stationary processes
Tamaki, K., 2009 Jan 1, In: Journal of Time Series Analysis. 30, 1, p. 145-166 22 p.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
Second-order Raman spectra and lattice dynamics in AlAs
Azuhata, T., Sota, T. & Suzuki, K., 1995 Dec 1, In: Journal of Physics: Condensed Matter. 7, 9, p. 1949-1957 9 p., 018.Research output: Contribution to journal › Article › peer-review
23 Citations (Scopus) -
Second-order Raman study of double-wall carbon nanotubes under high pressure
Papagelis, K., Arvanitidis, J., Christofilos, D., Andrikopoulos, K. S., Takenobu, T., Iwasa, Y., Kataura, H., Ves, S. & Kourouklis, G. A., 2007 Jan, In: Physica Status Solidi (B) Basic Research. 244, 1, p. 116-120 5 p.Research output: Contribution to journal › Article › peer-review
7 Citations (Scopus) -
Second-order resolvability, intrinsic randomness, and fixed-length source coding for mixed sources: Information spectrum approach
Nomura, R. & Han, T. S., 2013, In: IEEE Transactions on Information Theory. 59, 1, p. 1-16 16 p., 6289366.Research output: Contribution to journal › Article › peer-review
32 Citations (Scopus) -
Second-order slepian-wolf coding theorems for non-mixed and mixed sources
Nomura, R. & Han, T. S., 2014 Sep, In: IEEE Transactions on Information Theory. 60, 9, p. 5553-5572 20 p., 6856169.Research output: Contribution to journal › Article › peer-review
26 Citations (Scopus) -
Second-order Slepian-Wolf coding theorems for non-mixed and mixed sources
Nomura, R. & Han, T. S., 2013 Dec 19, 2013 IEEE International Symposium on Information Theory, ISIT 2013. p. 1974-1978 5 p. 6620571. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Second round responses
Smith, P., Pigozzi, M. J., Bhola, H. S., Kuroda, K. & Mundy, K., 2007 May, In: Comparative Education Review. 51, 2, p. 239-245 7 p.Research output: Contribution to journal › Comment/debate › peer-review
-
Secrecy capacity and outage performance of correlated fading wire-tap channel
Zhu, J., Shen, Y., Jiang, X., Takahashi, O. & Shiratori, N., 2014, In: IEICE Transactions on Communications. E97-B, 2, p. 396-407 12 p.Research output: Contribution to journal › Article › peer-review
5 Citations (Scopus) -
Secrecy capacity of correlated rayleigh fading channels
Zhu, J., Jiang, X., Takahashi, O. & Shiratori, N., 2012, APCC 2012 - 18th Asia-Pacific Conference on Communications: "Green and Smart Communications for IT Innovation". p. 333-337 5 p. 6388157Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Secrecy performance analysis for an-aided linear ZFBF in MU-MIMO systems with limited feedback
Cao, L., Tang, Z., Sun, L., Pan, Z., Shimamoto, S. & Feng, Y., 2019 Dec, 2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 9014215. (2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secrecy transmission capacity in noisy wireless ad hoc networks
Zhu, J., Chen, Y., Shen, Y., Takahashi, O., Jiang, X. & Shiratori, N., 2014, In: Ad Hoc Networks. 21, p. 123-133 11 p.Research output: Contribution to journal › Article › peer-review
11 Citations (Scopus) -
Secret ballot systems using cryptography
Akiyama, M., Tanaka, Y., Kikuchi, T. & Uji, H., 1985, In: Electronics and Communications in Japan, Part I: Communications (English translation of Denshi Tsushin Gakkai Ronbunshi). 68, 12, p. 7-16 10 p.Research output: Contribution to journal › Article › peer-review
-
Secret images sharing scheme using two-variable one-way functions
Alexandrova, T., Suzuki, Y., Okubo, K. & Tagawa, N., 2010, Proceedings - 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010. p. 553-557 5 p. 5541840Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Secret information distribution
Okamoto, M. & Tanaka, Y., 2007 Aug 1, In: Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi). 90, 8, p. 9-17 9 p.Research output: Contribution to journal › Article › peer-review
-
Secretion of biologically-active human interferon-β by Bacillus subtilis
Kakeshita, H., Kageyama, Y., Endo, K., Tohata, M., Ara, K., Ozaki, K. & Nakamura, K., 2011 Sep, In: Biotechnology Letters. 33, 9, p. 1847-1852 6 p.Research output: Contribution to journal › Article › peer-review
19 Citations (Scopus) -
Secret-Key Distribution Based on Bounded Observability
Muramatsu, J., Yoshimura, K., Davis, P., Uchida, A. & Harayama, T., 2015 Oct, In: Proceedings of the IEEE. 103, 10, p. 1762-1780 19 p., 7264973.Research output: Contribution to journal › Article › peer-review
12 Citations (Scopus) -
Secret recovery from electromagnetic emissions
Liu, H., Fan, Y. & Goto, S., 2012, In: Advanced Science Letters. 7, p. 182-186 5 p.Research output: Contribution to journal › Article › peer-review
-
Section 4.6: Textbooks and teaching guides
Miyakawa, T., 2007 Jan 1, Japanese Lesson Study in Mathematics: Its Impact, Diversity and Potential for Educational Improvement. World Scientific Publishing Co., p. 48-51 4 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
1 Citation (Scopus) -
Sectoral approaches establishment for climate change mitigation in Thailand upstream oil and gas industry
Chaiyapa, W., Esteban, M. & Kameyama, Y., 2016 Jul 1, In: Energy Policy. 94, p. 204-213 10 p.Research output: Contribution to journal › Article › peer-review
3 Citations (Scopus) -
Sectoral planar 6-way hybrid power divider with a resistive slot
Miyazaki, M., Ishida, O. & Hashimoto, T., 1989, Conference Proceedings - European Microwave Conference. 19 ed. Publ by Microwave Exhibitions & Publ Ltd, p. 307-310 4 p. (Conference Proceedings - European Microwave Conference; no. 19).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
5 Citations (Scopus) -
Sector dominance ratio analysis of financial markets
Uechi, L., Akutsu, T., Stanley, H. E., Marcus, A. J. & Kenett, D. Y., 2015 Mar 1, In: Physica A: Statistical Mechanics and its Applications. 421, p. 488-509 22 p.Research output: Contribution to journal › Article › peer-review
24 Citations (Scopus) -
Sectorial Hamiltonians without zero resonance in one dimension
Georgiev, V. & Giammetta, A. R., 2016, Contemporary Mathematics. American Mathematical Society, p. 225-237 13 p. (Contemporary Mathematics; vol. 666).Research output: Chapter in Book/Report/Conference proceeding › Chapter
3 Citations (Scopus) -
Secular bar mode instabilities in rotating relativistic stars
Saijo, M. & Gourgoulhon, E., 2006, Proceedings of the 16th Workshop on General Relativity and Gravitation in Japan, JGRG 2006. p. 86-89 4 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Secular Stagnation and Low Interest Rates under the Fear of a Government Debt Crisis
Kobayashi, K. & Ueda, K., 2022, (Accepted/In press) In: Journal of Money, Credit and Banking.Research output: Contribution to journal › Article › peer-review
Open Access -
Secure Agents for Supporting Best-Balanced Multilingual Communication
Pituxcoosuvarn, M., Nakaguchi, T., Lin, D. & Ishida, T., 2020, Cross-Cultural Design. Applications in Health, Learning, Communication, and Creativity - 12th International Conference, CCD 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Proceedings. Patrick Rau, P-L. (ed.). Springer, p. 376-388 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12193 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure and efficient mobile agent application reuse using patterns
Tahara, Y., Yoshioka, N., Ohsuga, A. & Honiden, S., 2001, Proceedings of SSR'01 2001 Symposium on Software Reusability. Association for Computing Machinery (ACM), p. 78-85 8 p. (Proceedings of SSR'01 2001 Symposium on Software Reusability).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Secure and efficient tag searching in RFID systems using serverless search protocol
Ahamed, S. I., Rahman, F., Hoque, E., Kawsar, F. & Nakajima, T., 2008 Dec 1, In: International Journal of Security and its Applications. 2, 4, p. 57-66 10 p.Research output: Contribution to journal › Article › peer-review
12 Citations (Scopus) -
Secure and manageable virtual private networks for end-users
Kourai, K., Hirotsu, T., Sato, K., Akashi, O., Fukuda, K., Sugawara, T. & Chiba, S., 2003, Proceedings - 28th Annual IEEE International Conference on Local Computer Networks, LCN 2003, Held in conjunction with the Workshop on High-Speed Local Networks, HSLN 2003 and Workshop on Wireless Local Networks, WLN 2003. IEEE Computer Society, p. 385-394 10 p. 1243164. (Proceedings - Conference on Local Computer Networks, LCN; vol. 2003-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
10 Citations (Scopus) -
Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness
Tan, L., Yu, K., Ming, F., Cheng, X. & Srivastava, G., 2022 May 1, IEEE Consumer Electronics Magazine, 11, 3, p. 69-78 10 p.Research output: Contribution to specialist publication › Article
55 Citations (Scopus) -
Secure Artificial Intelligence of Things for Implicit Group Recommendations
Yu, K., Guo, Z., Shen, Y., Wang, W., Lin, J. C. W. & Sato, T., 2022 Feb 15, In: IEEE Internet of Things Journal. 9, 4, p. 2698-2707 10 p.Research output: Contribution to journal › Article › peer-review
101 Citations (Scopus) -
Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption
Yasuda, M., Koshiba, T., Shimoyama, T., Kogure, J. & Yokoyama, K., 2015 Apr 14, SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015. Association for Computing Machinery, Inc, p. 53-61 9 p. (SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure deduplication in a multiple group signature setting
Cho, E. M. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 811-818 8 p. 7920991Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure Digital Twin Migration in Edge-based Autonomous Driving System
Zhou, Y., Bashir, A. K., Wu, J., Al-Otaibi, Y. D., Lin, X. & Xu, H., 2022, (Accepted/In press) IEEE Consumer Electronics Magazine, p. 1-9 9 p.Research output: Contribution to specialist publication › Article
-
Secured information service platforms effective in case of disasters-Using multilayered communications network
Adachi, F., Tokuda, K. & Ohmori, S., 2012, 2012 15th International Symposium on Wireless Personal Multimedia Communications, WPMC 2012. IEEE Computer Society, p. 348-349 2 p. 6398813. (International Symposium on Wireless Personal Multimedia Communications, WPMC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests
Morita, H., Attrapadung, N., Ohata, S., Nuida, K., Yamada, S., Shimizu, K., Hanaoka, G. & Asai, K., 2019 Mar 8, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 530-534 5 p. 8664337. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Secure frequent pattern mining by fully homomorphic encryption with ciphertext packing
Imabayashi, H., Ishimaki, Y., Umayabara, A., Sato, H. & Yamana, H., 2016, Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Proceedings. Springer Verlag, Vol. 9963 LNCS. p. 181-195 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9963 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Secure Image Inference Using Pairwise Activation Functions
Agyepong, J. T., Soliman, M., Wada, Y., Kimura, K. & El-Mahdy, A., 2021, In: IEEE Access. 9, p. 118271-118290 20 p., 9521226.Research output: Contribution to journal › Article › peer-review
Open Access1 Citation (Scopus) -
Secure information flow as a safety problem
Terauchi, T. & Aiken, A., 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 352-367 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3672 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
177 Citations (Scopus) -
Secure interoperability between cooperating XML systems by dynamic role translation
Chatvichienchai, S., Iwaihara, M. & Kambayashi, Y., 2003, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2736, p. 866-875 10 p.Research output: Contribution to journal › Article › peer-review
2 Citations (Scopus) -
Secure Interoperation of Blockchain and IPFS Through Client Application Enabled by CP-ABE
Cong, R., Liu, Y., Wang, Y., Tago, K., Li, R., Asaeda, H. & Jin, Q., 2022, HCI for Cybersecurity, Privacy and Trust - 4th International Conference, HCI-CPT 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Proceedings. Moallem, A. (ed.). Springer Science and Business Media Deutschland GmbH, p. 30-41 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13333 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure key distribution using correlated randomness in lasers driven by common random light
Yoshimura, K., Muramatsu, J., Davis, P., Harayama, T., Okumura, H., Morikatsu, S., Aida, H. & Uchida, A., 2012 Feb 14, In: Physical Review Letters. 108, 7, 070602.Research output: Contribution to journal › Article › peer-review
107 Citations (Scopus) -
Secure naïve bayes classification protocol over encrypted data using fully homomorphic encryption
Yasumura, Y., Ishimaki, Y. & Yamana, H., 2019 Dec 2, 21st International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2019 - Proceedings. Indrawan-Santiago, M., Pardede, E., Salvadori, I. L., Steinbauer, M., Khalil, I. & Anderst-Kotsis, G. (eds.). Association for Computing Machinery, (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Secure non-transferable proxy re-encryption for group membership and non-membership
Cho, E. M., San, L. & Koshiba, T., 2018, Lecture Notes on Data Engineering and Communications Technologies. Springer Science and Business Media Deutschland GmbH, p. 876-887 12 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 7).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Secure pattern matching using somewhat homomorphic encryption
Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013, CCSW 2013 - Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013. p. 65-76 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
81 Citations (Scopus) -
Secure scan design using improved random order and its evaluations
Oya, M., Atobe, Y., Shi, Y., Yanagisawa, M. & Togawa, N., 2015 Feb 5, 2014 IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2014. February ed. Institute of Electrical and Electronics Engineers Inc., p. 555-558 4 p. 7032842. (IEEE Asia-Pacific Conference on Circuits and Systems, Proceedings, APCCAS; vol. 2015-February, no. February).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Citations (Scopus) -
Secure scan design with dynamically configurable connection
Atobe, Y., Shi, Y., Yanagisawa, M. & Togawa, N., 2013 Jan 1, Proceedings - 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing, PRDC 2013. IEEE Computer Society, p. 256-262 7 p. 6820873. (Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
25 Citations (Scopus) -
Secure SMS transmission based on verifiable hash convergent group signcryption
Cho, E. M. & Koshiba, T., 2017 Jun 29, Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017. Institute of Electrical and Electronics Engineers Inc., p. 332-335 4 p. 7962472. (Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Secure statistical analysis using RLWE-based homomorphic encryption
Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Springer Verlag, p. 471-487 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
19 Citations (Scopus) -
Secure voting using partially compatible homomorphisms
Sako, K. & Kilian, J., 1994, Advances in Cryptology — CRYPTO 1994 - 14th Annual International Cryptology Conference, Proceedings. Desmedt, Y. G. (ed.). Springer Verlag, p. 411-424 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 839 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access94 Citations (Scopus) -
Secure wavelet matrix: Alphabet-friendly privacy-preserving string search for bioinformatics
Sudo, H., Jimbo, M., Nuida, K. & Shimizu, K., 2019 Sep, In: IEEE/ACM Transactions on Computational Biology and Bioinformatics. 16, 5, p. 1675-1684 10 p., 3370684.Research output: Contribution to journal › Article › peer-review
Open Access9 Citations (Scopus)