Section on Formal Approach (Englisch)
- Neue Suche nach: Seki, H.
- Neue Suche nach: Seki, H.
In:
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D
;
93
, 5
;
941
;
2010
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Section on Formal Approach
-
Beteiligte:Seki, H. ( Autor:in )
-
Erschienen in:IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D ; 93, 5 ; 941
-
Verlag:
- Neue Suche nach: Institute of Electronics, Information and Communication Engineers
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:941 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 621.3822
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 621.3822 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 93, Ausgabe 5
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 941
-
Section on Formal ApproachSeki, H. et al. | 2010
- 942
-
Multi-Context Rewriting Induction with Termination CheckersSato, H. / Kurihara, M. et al. | 2010
- 953
-
Decidability of Termination and Innermost Termination for Term Rewriting Systems with Right-Shallow Dependency PairsUchiyama, K. / Sakai, M. / Sakabe, T. et al. | 2010
- 963
-
Program Transformation Templates for Tupling Based on Term RewritingChiba, Y. / Aoto, T. / Toyama, Y. et al. | 2010
- 974
-
Towards Reliable E-Government Systems with the OTS/CafeOBJ MethodKong, W. / Ogata, K. / Futatsugi, K. et al. | 2010
- 985
-
Over-Approximated Control Flow Graph Construction on Pure EsterelKim, C.-J. / Yun, J.-H. / Kim, S. / Choe, K.-M. / Han, T. et al. | 2010
- 994
-
An Abstraction Refinement Technique for Timed Automata Based on Counterexample-Guided Abstraction Refinement LoopNagaoka, T. / Okano, K. / Kusumoto, S. et al. | 2010
- 1006
-
Computer Algebra System as Test Generation SystemHattori, S. et al. | 2010
- 1018
-
Information and Communication System SecurityKikuchi, H. et al. | 2010
- 1020
-
A Survey on Image Hashing for Image Authentication (INVITED)Ou, Y. / Rhee, K.H. et al. | 2010
- 1031
-
Analysis of Existing Privacy-Preserving Protocols in Domain Name System (INVITED)Zhao, F. / Hori, Y. / Sakurai, K. et al. | 2010
- 1044
-
Time-Bound Hierarchical Key Assignment: An Overview (INVITED)Zhu, W.T. / Deng, R.H. / Zhou, J. / Bao, F. et al. | 2010
- 1053
-
Abnormal Policy Detection and Correction Using Overlapping TransitionKim, S. / Lee, H. et al. | 2010
- 1062
-
Eliminating Cell Broadband Engine™ DMA Buffer OverflowsMurase, M. et al. | 2010
- 1070
-
Inconsistency Resolution Method for RBAC Based InteroperationHuang, C. / Sun, J. / Wang, X. / Wu, D. et al. | 2010
- 1080
-
Practical and Secure Recovery of Disk Encryption Key Using Smart CardsOmote, K. / Kato, K. et al. | 2010
- 1087
-
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMACWang, L. / Ohta, K. / Sasaki, Y. / Sakiyama, K. / Kunihiro, N. et al. | 2010
- 1096
-
ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6You, I. / Lee, J.-H. / Sakurai, K. / Hori, Y. et al. | 2010
- 1106
-
Fine-Grain Feature Extraction from Malware's Scan Behavior Based on Spectrum AnalysisEto, M. / Sonoda, K. / Inoue, D. / Yoshioka, K. / Nakao, K. et al. | 2010
- 1117
-
Packet Classification with Hierarchical Cross-ProductingLee, C.-L. / Chan, C.-T. / Wang, P.-C. et al. | 2010
- 1127
-
A New Local Search Based Ant Colony Optimization Algorithm for Solving Combinatorial Optimization ProblemsHassan, M.R. / Islam, M.M. / Murase, K. et al. | 2010
- 1137
-
NVFAT: A FAT-Compatible File System with NVRAM Write Cache for Its MetadataDoh, I.H. / Lee, H.J. / Moon, Y.J. / Kim, E. / Choi, J. / Lee, D. / Noh, S.H. et al. | 2010
- 1147
-
Energy-Aware Real-Time Task Scheduling Exploiting Temporal LocalityKim, Y.-H. / Jung, M.-J. / Lee, C.-H. et al. | 2010
- 1154
-
Mining Co-location Relationships among Bug Reports to Localize Fault-Prone ModulesChen, I.-X. / Li, C.-H. / Yang, C.-Z. et al. | 2010
- 1162
-
Identifying High-Rate Flows Based on Sequential SamplingZhang, Y. / Fang, B. / Luo, H. et al. | 2010
- 1175
-
A Novel Post-Silicon Debug Mechanism Based on Suspect WindowGao, J. / Han, Y. / Li, X. et al. | 2010
- 1186
-
User-Adapted Recommendation of Content on Mobile Devices Using Bayesian NetworksIwasaki, H. / Mizuno, N. / Hara, K. / Motomura, Y. et al. | 2010
- 1197
-
Search for Minimal and Semi-Minimal Rule Sets in Incremental Learning of Context-Free and Definite Clause GrammarsImada, K. / Nakamura, K. et al. | 2010
- 1205
-
An Investigation of Adaptive Pen Pressure Discretization Method Based on Personal Pen Pressure Use ProfileXin, Y. / Ren, X. et al. | 2010
- 1214
-
ImCast: Studio-Quality Digital Media Platform Exploiting Broadband IP NetworksJo, J. / Kim, J.W. et al. | 2010
- 1225
-
MPEG-2/4 Low-Complexity Advanced Audio Coding Optimization and Implementation on DSPWu, B.-F. / Huang, H.-Y. / Chen, Y.-L. / Peng, H.-Y. / Huang, J.-H. et al. | 2010
- 1238
-
Complexity Scalability Design in the Internet Low Bit Rate Codec (iLBC) for Speech CodingChen, F.-K. / Kuo, K.-B. et al. | 2010
- 1244
-
Acoustic Feature Transformation Based on Discriminant Analysis Preserving Local Structure for Speech RecognitionSakai, M. / Kitaoka, N. / Takeda, K. et al. | 2010
- 1253
-
Video Quality Assessment Using Spatio-Velocity Contrast Sensitivity FunctionHirai, K. / Tumurtogoo, J. / Kikuchi, A. / Tsumura, N. / Nakaguchi, T. / Miyake, Y. et al. | 2010
- 1263
-
Exclusive Block Matching for Moving Object Extraction and TrackingLi, Z. / Yabuta, K. / Kitazawa, H. et al. | 2010
- 1272
-
Improved Sequential Dependency Analysis Integrating Labeling-Based Sentence Boundary DetectionOba, T. / Hori, T. / Nakamura, A. et al. | 2010
- 1282
-
Generating and Describing Affective Eye BehaviorsMao, X. / Li, Z. et al. | 2010
- 1291
-
A Simple Procedure for Classical Signal-Processing in Cluster-State Quantum ComputationOshima, K. et al. | 2010
- 1294
-
A New Model for Graph Matching and Its AlgorithmZheng, K.-J. / Peng, J.-G. / Li, K.-X. et al. | 2010
- 1297
-
A QoS-Enabled Double Auction Protocol for the Service GridGao, Z. / Luo, S. et al. | 2010
- 1301
-
Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption SchemesRasslan, M. / Youssef, A. et al. | 2010
- 1303
-
Generalized Hash Chain Traversal with Selective OutputYum, D.H. / Seo, J.W. / Cho, K. / Lee, P.J. et al. | 2010
- 1307
-
Discussion on ``A Fuzzy Method for Medical Diagnosis of Headache''Hung, K.-C. / Wou, Y.-W. / Julian, P. et al. | 2010
- 1309
-
A Robust Room Inverse Filtering Algorithm for Speech Dereverberation Based on a Kurtosis MaximizationJeong, J.-w. / Park, Y.-c. / Youn, D.-h. / Lee, S.-P. et al. | 2010
- 1313
-
Gaussian Kernel-Based Multi-Histogram EqualizationSeo, S.T. / Lee, I.K. / Jeong, H.C. / Kwon, S.H. et al. | 2010
- 1317
-
Kernel Based Image Registration Incorporating with Both Feature and Intensity MatchingMiao, Q. / Wang, G. / Lin, X. et al. | 2010
- 1321
-
Online HOG Method in Pedestrian TrackingLiu, C. / Wang, G. / Jiang, F. / Lin, X. et al. | 2010