Information and Systems-Theoretical Foundations of Computing(Date:2002/07/29)

Presentation
表紙

,  

[Date]2002/7/29
[Paper #]
目次

,  

[Date]2002/7/29
[Paper #]
An interpolation attack against block ciphers using Sudan's Reed-Solomon decoding algorithmA Polynomial-Time Algorithm for the Generalized Independent-Flow Problem

Soichi FURUYA,  Kouichi SAKURAI,  

[Date]2002/7/29
[Paper #]COMP2002-22
On the Influence of Outliers in the Support Vector Machine Framework(1)

Jin-Yi CAI,  Osamu WATANABE,  

[Date]2002/7/29
[Paper #]COMP2002-23
On the Influence of Outliers in the Support Vector Machine Framework(2)

Yang DAI,  Jun'ichi TANAKA,  Osamu WATANABE,  

[Date]2002/7/29
[Paper #]COMP2002-24
Rectangular Drawings of Planar Graphs

Md. Saidur Rahman,  Takao Nishizeki,  Shubhashis Ghosh,  

[Date]2002/7/29
[Paper #]COMP2002-25
A Polynomial-Time Algorithm for the Generalized Independent-Flow Problem

Akinobu EGUCHI,  Satoru FUJISHIGE,  Takshi TAKABATAKE,  

[Date]2002/7/29
[Paper #]COMP2002-26
Strictly Competitive Online Data Management on Uniform Networks

Daiki NAKATSUKA,  Akira MATSUBAYASHI,  

[Date]2002/7/29
[Paper #]COMP2002-27
Inclusion-Exclusion for k-CNF Formulas

Akihiro MATSUURA,  Kazuo IWAMA,  

[Date]2002/7/29
[Paper #]COMP2002-28
Inferring Minimal Functional Dependencies in Horn and q-Horn Theories

Toshihide IBARAKI,  Alexander KOGAN,  Kazuhisa MAKINO,  

[Date]2002/7/29
[Paper #]COMP2002-29
奥付

,  

[Date]2002/7/29
[Paper #]