| Issue | Title | |
| Vol 12, No 2 (2022) | Group Signatures with Designated Traceability over Openers’ Attributes | Abstract PDF |
| Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa | ||
| Vol 8, No 2 (2018) | GUNREAL: GPU-accelerated UNsupervised REinforcement and Auxiliary Learning | Abstract PDF |
| Koichi Shirahata, Youri Coppens, Takuya Fukagai, Yasumoto Tomita, Atsushi Ike | ||
| Vol 12, No 2 (2022) | Handling class Imbalance problem in Intrusion Detection System based on deep learning | Abstract PDF |
| Mariama Mbow, Hiroshi Koide, Kouichi Sakurai | ||
| Vol 5, No 1 (2015) | Handling Non-determinism with Description Logics using a Fork/Join Approach | Abstract PDF |
| Jocelyne Faddoul, Wendy MacCaull | ||
| Vol 10, No 1 (2020) | Handover Algorithm for Video Communications by Sharing Communication Quality Information of Access Points between Terminals | Abstract PDF |
| Atsushi Takei, Shigetomo Kimura | ||
| Vol 8, No 2 (2018) | HDR Image Processing from Embedded Cell Phone Camera | Abstract PDF |
| , , Roman Durikovic | ||
| Vol 2, No 2 (2012) | Hierarchical Dual-Net: A Flexible Interconnection Network and its Routing Algorithm | Abstract PDF |
| Yamin Li, Shietung Peng, Wanming Chu | ||
| Vol 2, No 2 (2012) | High-Performance Symmetric Block Ciphers on Multicore CPU and GPUs | Abstract PDF |
| Naoki Nishikawa, Keisuke Iwai, Takakazu Kurokawa | ||
| Vol 5, No 2 (2015) | Hypercube Fault Tolerant Routing with Bit Constraint | Abstract PDF |
| Antoine Bossard, Keiichi Kaneko | ||
| Vol 5, No 1 (2015) | Identification and Elimination of Platform-Specific Code Smells in High Performance Computing Applications | Abstract PDF |
| Chunyan Wang, Shoichi Hirasawa, Hiroyuki Takizawa, Hiroaki Kobayashi | ||
| Vol 1, No 1 (2011) | Impact of Reconfigurable Function on Meshes with Row/Column Buses | Abstract PDF |
| Susumu Matsumae | ||
| Vol 15, No 2 (2025) | Implementation and Evaluation of a System Call Moving Target Defense Applied Multiple Times at Runtime for Binary Injections | Abstract PDF |
| Yuta Minato, Takeshi Masumoto, Hiroshi Koide | ||
| Vol 9, No 2 (2019) | Implementation and Evaluation of Communication-Hiding Method by System Call Proxy | Abstract PDF |
| Yuuki Okuda, Masaya Sato, Hideo Taniguchi | ||
| Vol 7, No 2 (2017) | Implementation and Evaluation of FPGA-based Annealing Processor for Ising Model by use of Resource Sharing | Abstract PDF |
| Chihiro Yoshimura, Masato Hayashi, Takuya Okuyama, Masanao Yamaoka | ||
| Vol 12, No 2 (2022) | Implementation and Evaluation of Ring Oscillator-based True Random Number Generator | Abstract PDF |
| Naoya Torii, Ryuichi Minagawa, Hideaki Kevin Omae, Kotaro Hayashi | ||
| Vol 10, No 2 (2020) | Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings | Abstract PDF |
| Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki | ||
| Vol 9, No 2 (2019) | Implementation of high speed hash function Keccak on GPU | Abstract PDF |
| Thuong Nguyen Dat, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa | ||
| Vol 1, No 2 (2011) | Implementations of a Parallel Algorithm for Computing Euclidean Distance Map in Multicore Processors and GPUs | Abstract PDF |
| Duhu Man, Kenji Uda, Hironobu Ueyama, Yasuaki Ito, Koji Nakano | ||
| Vol 4, No 1 (2014) | Implementations of the Hough Transform on the Embedded Multicore Processors | Abstract PDF |
| Xin Zhou, Norihiro Tomagou, Yasuaki Ito, Koji Nakano | ||
| Vol 13, No 2 (2023) | Improvement of Miller Loop for a Pairing on FK12 Curve and Evaluation with other STNFS Curves | Abstract PDF |
| Kazuma Ikesaka, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami | ||
| Vol 12, No 2 (2022) | Improvement of Sound Classification Method on Smartphone for Hammering Test Using 5G Network | Abstract PDF |
| Tsubasa Fukumura, Hayato Aratame, Atsushi Ito, Masafumi Koike, Katsuhiko Hibino | ||
| Vol 4, No 2 (2014) | Improving RTT Fairness on CUBIC TCP | Abstract PDF |
| Tomoki Kozu, Yuria Akiyama, Saneyasu Yamaguchi | ||
| Vol 11, No 2 (2021) | Information Security Fatigue Countermeasures Using Cognitive Strategy Scale Based on Web Questionnaires | Abstract PDF |
| Misato Ogawa, Shigeaki Tanimoto, Takashi Hatashima, Atsushi Kanai | ||
| Vol 15, No 2 (2025) | Information Sharing Scheme Using AoI for DTN-based Evacuation System | Abstract PDF |
| Shoya Obayashi, Tomoyuki Ohta | ||
| Vol 3, No 1 (2013) | Injection Based Dynamic Power Management and a Policy for Multiprocessor Systems | Abstract PDF |
| Wei Sun | ||
| 176 - 200 of 322 Items | << < 3 4 5 6 7 8 9 10 11 12 > >> | |
