Information and Systems-Theoretical Foundations of Computing(Date:2002/01/23)

Presentation
表紙

,  

[Date]2002/1/23
[Paper #]
目次

,  

[Date]2002/1/23
[Paper #]
On the Security of Secret Key Cryptosystems against Quantum Algorithms

Kazuo OHTA,  Tetsuro NISHINO,  Kazumaro AOKI,  

[Date]2002/1/23
[Paper #]COMP2001-74
Test Sequence Generation in Communication Protocols using SAT Algorithm

Hirotaka OTSUKA,  Akio NAKATA,  Nobuo FUNABIKI,  Teruo HIGASHINO,  

[Date]2002/1/23
[Paper #]COMP2001-75
A Subexponential-Time Algorithm for CNF Formulas That Have A Number of Satisfying Assignments

Akihiro Matsuura,  

[Date]2002/1/23
[Paper #]COMP2001-76
A Proposal of Hierarchical Approximation Algorithm for Node Assignment in Bidirectional Manhattan Street Network

Masataka YONEDU,  Nobuo FUNABIKI,  Tokumi YOKOHIRA,  Toru NAKANISHI,  Shigeto TAJIMA,  Akio NAKATA,  Teruo HIGASHINO,  

[Date]2002/1/23
[Paper #]COMP2001-77
Scheduling for Efficient Gather Operation in Heterogeneous Cluster Systems

Fukuhito OOSHITA,  Susumu MATSUMAE,  Toshimitsu MASUZAWA,  

[Date]2002/1/23
[Paper #]COMP2001-78
Proving Behavioral Equivalence for Weakly Complete Behavioral Specifications by Implicit Induction

Yasushi KANO,  Masahiko SAKAI,  Toshiki SAKABE,  

[Date]2002/1/23
[Paper #]COMP2001-79
Decidability of root-needed strategy in priority term rewriting system

Tsuyoshi SUZUKI,  Masahiko SAKAI,  Toshiki SAKABE,  

[Date]2002/1/23
[Paper #]COMP2001-80
On Decidable Classes of Inductive Theorems

Shin-ichi FUKUI,  Yoshihito TOYAMA,  

[Date]2002/1/23
[Paper #]COMP2001-81
Descendants and Head Normalization of Higher-Order Rewrite Systems

Hideto KASUYA,  Masahiko SAKAI,  Kiyoshi AGUSA,  

[Date]2002/1/23
[Paper #]COMP2001-82
[OTHERS]

,  

[Date]2002/1/23
[Paper #]