1159 | -- | 0 | Satoshi Fujita. Special Section on Discrete Mathematics and Its Applications |
1160 | -- | 1165 | Kazuo Murota, Kenichiro Tanaka. A Steepest Descent Algorithm for M-Convex Functions on Jump Systems |
1166 | -- | 1172 | Pino Caballero-Gil, Amparo Fúster-Sabater. Using Linear Hybrid Cellular Automata to Attack the Shrinking Generator |
1173 | -- | 1180 | Kazuhiko Ushio, Hideaki Fujimoto. Balanced ::::C::::::4::-Trefoil Decomposition of Complete Multi-Graphs |
1181 | -- | 1185 | Katsuhisa Yamanaka, Shin-Ichi Nakano. Coding Floorplans with Fewer Bits |
1186 | -- | 1197 | Toshiya Itoh, Noriyuki Takahashi. Competitive Analysis of Multi-Queue Preemptive QoS Algorithms for General Priorities |
1198 | -- | 1206 | Cho-chin Lin, Da-Wei Wang, Tsan-sheng Hsu. Bounds on the Client-Server Incremental Computing |
1207 | -- | 1214 | Yoshiyuki Kusakari. On Reconfiguring Radial Trees |
1215 | -- | 1222 | Tatsuya Akutsu, Morihiro Hayashida, Dukka Bahadur, Etsuji Tomita, Jun ichi Suzuki, Katsuhisa Horimoto. Dynamic Programming and Clique Based Approaches for Protein Threading with Profiles and Constraints |
1223 | -- | 1226 | Miki Miyauchi. Topological Book Embedding of Bipartite Graphs |
1227 | -- | 1232 | Hiroo Saito. The Symmetric Quadratic Semi-Assignment Polytope |
1233 | -- | 1245 | Yuichi Komano, Kazuo Ohta. Taxonomical Security Consideration of OAEP Variants |
1246 | -- | 1254 | Seigo Arita, Kazuto Matsuo, Koh-ichi Nagao, Mahoro Shimura. A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields |
1255 | -- | 1262 | Katsuyuki Takashima. Practical Application of Lattice Basis Reduction Algorithm to Side-Channel Analysis on (EC)DSA |
1263 | -- | 1268 | Hiroshi Nagamochi. A Fast Edge-Splitting Algorithm in Edge-Weighted Graphs |
1269 | -- | 1274 | Yuuki Tanaka, Yukio Shibata. A Minimum Feedback Vertex Set in the Trivalent Cayley Graph |
1275 | -- | 1283 | Toru Nakanishi, Nobuo Funabiki. Group Signature Schemes with Membership Revocation for Large Groups |
1284 | -- | 1291 | Kazuya Haraguchi, Toshihide Ibaraki. Construction of Classifiers by Iterative Compositions of Features with Partial Knowledge |
1292 | -- | 1298 | Hiro Ito, Kazuo Iwama, Takeyuki Tamura. Efficient Methods for Determining DNA Probe Orders |
1299 | -- | 1306 | Naoto Kobayashi, Toshiyasu Matsushima, Shigeichi Hirasawa. Transformation of a Parity-Check Matrix for a Message-Passing Algorithm over the BEC |
1307 | -- | 1315 | Tomohiko Saito, Toshiyasu Matsushima, Shigeichi Hirasawa. A Note on Construction of Orthogonal Arrays with Unequal Strength from Error-Correcting Codes |
1316 | -- | 1327 | Dong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Beomin Kim, Young-Ho Park. Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure |
1328 | -- | 1338 | Jun Furukawa, Hideki Imai. An Efficient Group Signature Scheme from Bilinear Maps |
1339 | -- | 1345 | Chik-How Tan. Signature Scheme in Multi-User Setting |
1346 | -- | 1354 | Koji Nakano. An Energy Efficient Ranking Protocol for Radio Networks |
1355 | -- | 1361 | Jacir Luiz Bordim, Yasuaki Ito, Koji Nakano. An Energy Efficient Leader Election Protocol for Radio Network with a Single Transceiver |
1362 | -- | 1369 | Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi. Defeating Simple Power Analysis on Koblitz Curves |
1370 | -- | 1377 | Kenya Sugihara, Hiro Ito. Maximum-Cover Source-Location Problems |
1378 | -- | 1381 | David Avis, Jun Hasegawa, Yosuke Kikuchi, Yuuya Sasaki. A Quantum Protocol to Win the Graph Colouring Game on All Hadamard Graphs |
1382 | -- | 1395 | Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta. Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares |
1396 | -- | 1406 | Rie Shigetomi, Akira Otsuka, Jun Furukawa, Keith Martin, Hideki Imai. A Provably Secure Refreshable Partially Anonymous Token and Its Applications |
1407 | -- | 1416 | Ayami Suzuka, Ryuhei Miyashiro, Akiko Yoshise, Tomomi Matsui. Dependent Randomized Rounding to the Home-Away Assignment Problem in Sports Scheduling |
1417 | -- | 1420 | Tsunehiro Yoshinaga, Jianliang Xu, Katsushi Inoue. Sublogarithmic Space-Bounded Multi-Inkdot Alternating Turing Machines with Only Existential (Universal) States |
1421 | -- | 1424 | Noboru Kunihiro, Wataru Abe, Kazuo Ohta. Maurer-Yacobi ID-Based Key Distribution Revisited |
1425 | -- | 1427 | Hideaki Otsuki, Tomio Hirata. Inapproximability of the Edge-Contraction Problem |
1428 | -- | 1436 | Shinpei Okawa, Satoshi Honda. MEG Analysis with Spatial Filtered Reconstruction |
1437 | -- | 1445 | Feng Li, Jianming Lu, Xueqin Zhao, Takashi Yahagi. Perfect Tracking Control of Nonminimum Phase Systems in Magnetic Levitation System |
1446 | -- | 1453 | Chien-Hsing Su, Cheng-Sea Huang, Kuang-Yow Lian. Control Performance of Discrete-Time Fuzzy Systems Improved by Neural Networks |
1454 | -- | 1472 | Eduard A. Jorswieck, Holger Boche. Performance Analysis of MIMO Systems in Spatially Correlated Fading Using Matrix-Monotone Functions |
1473 | -- | 1483 | K. Robert Lai, Yuan-Lung Chang. A Software Definable Architecture for Adaptive Space Diversity at Handsets in MC-CDMA Systems |
1484 | -- | 1494 | Rusen Meylani, Cenker Öden, Aysin Ertüzün, Aytül Erçil. 2-D Iteratively Reweighted Least Squares Lattice Algorithm and Its Application to Defect Detection in Textured Images |
1495 | -- | 1499 | Kiyotaka Kohno, Mitsuru Kawamoto, Asoke K. Nandi, Yujiro Inouye. Robust Blind Equalization Algorithms Based on the Constrained Maximization of a Fourth-Order Cumulant Function |
1500 | -- | 1504 | Yang Xiao, Moon Ho Lee. 2-D Laplace-Z Transformation |
1505 | -- | 1506 | Hidemasa Kubota, Yuichi Tanji, Takayuki Watanabe, Hideki Asai. An Enhanced Time-Domain Circuit Simulation Technique Based on LIM |
1507 | -- | 1512 | Rong Long Wang, Kozo Okazaki. Solving the Graph Planarization Problem Using an Improved Genetic Algorithm |
1513 | -- | 1517 | Haibin Kan, Xuefei Li, Hong Shen. The Characteristic Generators for a Group Code |
1518 | -- | 1521 | Byungjun Bae, Joungil Yun, Chunghyun Ahn, Sooin Lee, Kyu-Ik Sohng. Evaluation of the T-DMB Standard and the Transmission System by Using Ensemble Remultiplexer |