Tatsuji Munaka
(撫中 達司)
Modified on: 04/03
Papers
47
Entries per page
-
Asian Journal of Atmospheric Environment, 17(1), Sep 5, 2023 Peer-reviewed
-
IEEE ICCE-Berlin 2023, Sep 5, 2023 Peer-reviewedLast authorCorresponding author
-
IEEE SWC2023, Aug 28, 2023 Peer-reviewedLast authorCorresponding author
-
IEICE Transactions on Information and Systems, E106.D(4) 450-458, Apr 1, 2023 Peer-reviewedLast author
-
Asian Journal of Atmospheric Environment, 15(4) 33-43, Dec 31, 2021 Peer-reviewed
-
東海大学紀要 情報通信学部(Web), 13(2), Mar, 2021 Peer-reviewedLead authorCorresponding author
-
東海大学紀要情報通信学部, 13(1), Sep, 2020 Peer-reviewedLast authorCorresponding author
-
IPSJ Journal of Information Processing, vol.61(No. 9) 343-353, Sep, 2020 Peer-reviewedLead author
-
情報処理学会 論文誌ジャーナル, Vol.57, No.8(8) 1850-1860, Aug, 2016 Peer-reviewed
-
情報処理学会論文誌, 57(4) 1303-1318, Apr 15, 2016 Peer-reviewed
-
情報処理学会論文誌, Mar-57(3) 1069-1079, Mar, 2016 Peer-reviewed
-
2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 347-352, 2016 Peer-reviewed
-
PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 315-319, 2016 Peer-reviewed
-
ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 9836 91-110, 2016 Peer-reviewed
-
Scientific & Academic PublishingInternational Journal of Energy Engineering, Volume 5, Number 4, July 2015, Jul, 2015 Peer-reviewed
-
IPSJ SIG Notes, 2015(5) 1-8, Jan 12, 2015 Peer-reviewed
-
2015 INTERNATIONAL CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 1025-1028, 2015 Peer-reviewed
-
CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 9476 75-91, 2015 Peer-reviewed
-
IEEJ Transactions on Electronics, Information and Systems, 134(1) 156-167, 2014 Peer-reviewed
-
ACL2013, Aug, 2013 Peer-reviewed