Name
Papers
Collaborators
TADAO KASAMI
63
67
Citations 
PageRank 
Referers 
751
131.11
1065
Referees 
References 
335
245
Search Limit
1001000
Title
Citations
PageRank
Year
A Soft-Input And Output Iterative Bounded-Distance And Encoding-Based Decoding Algorithm For Product Codes00.342009
Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code00.342007
Selection of Test Patterns in an Iterative Erasure and Error Decoding Algorithm for Non-binary Block Codes10.352006
Stochastic multiple context-free grammar for RNA pseudoknot modeling90.682006
On the Generative Power of Grammars for RNA Secondary Structure.00.342005
On The Generative Power Of Grammars For Rna Secondary Structure40.562005
Subclasses of Tree Adjoining Grammar for RNA Secondary Structure00.342004
On binary images of shortened cyclic (8, 5) codes over GF(28).00.342004
Selection Method Of Test Patterns In Soft-Decision Iterative Bounded Distance Decoding Algorithms00.342003
A Soft-Decision Iterative Decoding Algorithm Using A Top-Down And Recursive Minimum Distance Search00.342002
On the binary images of (8, 5) shortened cyclic codes over GF(28).00.342001
Sufficient Conditions on Most Likely Local Sub-codewords in Recursive Maximum Likelihood Decoding Algorithms00.342001
On Integer Programming Problems Related to Soft-Decision Iterative Decoding Algorithms40.571999
An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and Its Computational Complexity20.481999
Solving a unification problem under constrained substitutions using tree automata90.951997
The Split Weight (wL, wR) Enumeration of Reed-Muller Codes for wL + wR < 2dmin00.341997
A secure code for recipient watermarking against conspiracy attacks by all users40.501997
A phase connection method for communication protocols00.341996
On the Maximum Value of Aliasing Probabilities for Single Input Signature Registers00.341995
The Computational Complexity of the Universal Recognition Problem for Parallel Multiple Context-Free Grammars40.441994
On the maximum value of aliasing probabilities for single input signature registers10.361993
A translation method from natural language specifications into formal specifications using contextual dependencies133.841993
Parallel multiple context-free grammars, finite-state translation systems, and polynomial-time recognizable subclasses of lexical-functional grammars40.621993
A method for translating natural language program specifications into algebraic specifications00.341992
A Verification Procedure via Invariant for Extended Communicating Finite-State Machines20.401992
A defect-tolerant design for mask ROMs50.581992
The generative power of multiple context-free grammars and head grammars00.341991
Optimizing universal queries in relational databases00.341991
On multiple context-free grammars1487.821991
Membership problem for head languages and multiple context-free languages.41.661989
Generalized context-free grammars and multiple context-free grammars.61.391989
Verification of safeness and mutual exclusion properties of algebraically specified token ring LAN protocol.00.341989
Logical programming for the telegram analysis problem10.351987
Principles of algebraic language ASL.30.961987
Verification of progress property of algebraically specified communication protocols.00.341987
Decision problem concerning security for cryptographic protocols.10.421987
An Approximation To The Weight Distribution Of Binary Primitive Bch Codes With Designed Distance-9 And Distance-1120.481986
Compiling and optimizing methods for the functional language ASL/F71.861986
Some Results On The Representative Instance In Relational Databases234.861985
A distributed mutual exclusion algorithm18823.951985
Optimization of functional language ASL/F programs.10.871985
An approximation to the weight distribution of binary linear codes242.961985
Membership Problems For Data Dependencies In Relational Expressions50.391984
Functional programming and logical programming for the telegram analysis problem40.721984
An Algebraic Specification of HDLC Procedures and Its Verification112.121984
Three Measures for Synchronic Dependence in Petri Nets155.681983
Membership Problem For Embedded Multivalued Dependencies Under Some Restricted Conditions10.851983
Linear block codes for error detection111.591983
Existence of Good δ-Decodable Codes for the Two-User Multiple-Access Adder Channel10.541980
Decision Problems For Multivalued Dependencies In Relational Databases276.161979
  • 1
  • 2