Citation: K. Nakashima et al., CHARACTERIZATION OF MONOTONIC MULTIPLE-VALUED FUNCTIONS AND THEIR LOGIC EXPRESSIONS, IEICE transactions on information and systems, E81D(6), 1998, pp. 496-503
Citation: K. Joe et A. Fukuda, ANALYTIC MODELING OF UPDATING BASED CACHE COHERENT PARALLEL COMPUTERS, IEICE transactions on information and systems, E81D(6), 1998, pp. 504-512
Citation: Jh. Wang et al., DISTRIBUTED CONCURRENCY-CONTROL WITH LOCAL WAIT-DEPTH CONTROL POLICY, IEICE transactions on information and systems, E81D(6), 1998, pp. 513-520
Citation: T. Morita et al., AN AUTHORIZATION MODEL FOR OBJECT-ORIENTED DATABASES AND ITS EFFICIENT ACCESS-CONTROL, IEICE transactions on information and systems, E81D(6), 1998, pp. 521-531
Citation: J. Kim et al., A FAULT-TOLERANT WORMHOLE ROUTING ALGORITHMS IN 2-DIMENSIONAL MESH NETWORKS, IEICE transactions on information and systems, E81D(6), 1998, pp. 532-544
Citation: Yj. Lin et Ms. Yu, AN EFFICIENT MANDARIN TEXT-TO-SPEECH SYSTEM ON TIME-DOMAIN, IEICE transactions on information and systems, E81D(6), 1998, pp. 545-555
Citation: Y. Ono et M. Ichino, A NEW FEATURE-SELECTION METHOD TO EXTRACT FUNCTIONAL STRUCTURES FROM MULTIDIMENSIONAL SYMBOLIC DATA, IEICE transactions on information and systems, E81D(6), 1998, pp. 556-564
Citation: Tp. Hong et al., TRADE-OFF BETWEEN REQUIREMENT OF LEARNING AND COMPUTATIONAL COST, IEICE transactions on information and systems, E81D(6), 1998, pp. 565-571
Citation: Q. Ma et H. Isahara, ASSOCIATIVE SEMANTIC MEMORY CAPABLE OF FAST INFERENCE ON CONCEPTUAL HIERARCHIES, IEICE transactions on information and systems, E81D(6), 1998, pp. 572-583
Authors:
NAKAJIMA T
TAKIZAWA H
KOBAYASHI H
NAKAMURA T
Citation: T. Nakajima et al., KOHONEN LEARNING WITH A MECHANISM, THE LAW OF THE JUNGLE, CAPABLE OF DEALING WITH NONSTATIONARY PROBABILITY-DISTRIBUTION FUNCTIONS, IEICE transactions on information and systems, E81D(6), 1998, pp. 584-591
Citation: C. Jeon et al., A NEW METHOD OF ESTIMATING CORONARY-ARTERY DIAMETER USING DIRECTION CODES IN ANGIOGRAPHIC IMAGES, IEICE transactions on information and systems, E81D(6), 1998, pp. 592-601
Citation: A. Calderon et al., A CORRELATION-BASED MOTION CORRECTION METHOD FOR FUNCTIONAL MRI, IEICE transactions on information and systems, E81D(6), 1998, pp. 602-608
Citation: Yk. Lee et al., EFFICIENT ENCODING OF EXCITATION CODES USING TRAINED PARTIAL ALGEBRAIC CODEBOOK, IEICE transactions on information and systems, E81D(6), 1998, pp. 612-615
Citation: Wj. Hwang et Sl. Hong, VARIABLE-RATE VECTOR QUANTIZER DESIGN USING GENETIC ALGORITHM, IEICE transactions on information and systems, E81D(6), 1998, pp. 616-620
Citation: T. Nagaya et al., INDEX REDUCTION OF OVERLAPPING STRONGLY SEQUENTIAL SYSTEMS, IEICE transactions on information and systems, E81D(5), 1998, pp. 419-426
Citation: T. Murase et al., ACTIVE MOBILE DATABASE-SYSTEMS FOR MOBILE COMPUTING ENVIRONMENTS, IEICE transactions on information and systems, E81D(5), 1998, pp. 427-433
Citation: Hk. Kim et al., DYNAMIC CEPSTRAL REPRESENTATIONS BASED ON ORDER-DEPENDENT WINDOWING METHODS, IEICE transactions on information and systems, E81D(5), 1998, pp. 434-440
Citation: Ks. Roh et Is. Kweon, 2-D CURVED SHAPE-RECOGNITION USING A LOCAL CURVE DESCRIPTOR AND PROJECTIVE REFINEMENT, IEICE transactions on information and systems, E81D(5), 1998, pp. 441-447
Citation: Tch. Heng et al., ACTIVE SENSOR FUSION FOR COLLISION-AVOIDANCE IN BEHAVIOR-BASED MOBILEROBOTS, IEICE transactions on information and systems, E81D(5), 1998, pp. 448-456
Citation: Xz. Li et al., KNOWLEDGE-BASED ENHANCEMENT OF LOW SPATIAL-RESOLUTION IMAGES, IEICE transactions on information and systems, E81D(5), 1998, pp. 457-463
Citation: K. Iwanuma et K. Oota, STRONG CONTRACTION IN MODEL ELIMINATION CALCULUS - IMPLEMENTATION IN A PTTP-BASED THEOREM PROVER, IEICE transactions on information and systems, E81D(5), 1998, pp. 464-471
Citation: K. Matsui et Y. Kosugi, THE EFFECT OF REGULARIZATION WITH MACROSCOPIC FITNESS IN A GENETIC APPROACH TO ELASTIC IMAGE MAPPING, IEICE transactions on information and systems, E81D(5), 1998, pp. 472-478
Citation: Xs. Dong et al., WAVELENGTH-DIVISION MULTIPLE-ACCESS RING - VIRTUAL TOPOLOGY ON A SIMPLE RING NETWORK, IEICE transactions on information and systems, E81D(4), 1998, pp. 345-354
Authors:
TANAKA T
KAJI Y
WATANABE H
TAKATA T
KASAMI T
Citation: T. Tanaka et al., SECURITY VERIFICATION OF REAL-TIME CRYPTOGRAPHIC PROTOCOLS USING A REWRITING APPROACH, IEICE transactions on information and systems, E81D(4), 1998, pp. 355-363