Search

Your search keyword '"Koji Azuma"' showing total 25 results

Search Constraints

Start Over You searched for: Author "Koji Azuma" Remove constraint Author: "Koji Azuma" Language english Remove constraint Language: english
25 results on '"Koji Azuma"'

Search Results

1. Disseminated non-tuberculous mycobacterial infection caused by Mycobacterium obuense in an immunocompromised patient: a case report

2. Retrospective analysis of long‐term survival factors in patients with advanced non‐small cell lung cancer treated with nivolumab

3. Study on Establish a Brittle Fracture Prediction Considering Different Crack Opening Modes Using Mixed-Mode Ratio

4. Tight finite-key security for twin-field quantum key distribution

5. Experimental time-reversed adaptive Bell measurement towards all-photonic quantum repeaters

6. Calculation of Shear Strength of Reinforced Concrete Members with Circular Section using the Extended Modified Compression Field Theory

7. Fundamental rate-loss trade-off for the quantum internet

8. Beating the repeaterless bound with adaptive measurement-device-independent quantum key distribution

9. Versatile relative entropy bounds for quantum networks

10. Developing a Theory for a Quantum Internet for Global Quantum Communication.

11. Toward a Quantum Internet.

12. Tight finite-key security for twin-field quantum key distribution

13. Optimal supplier of single-error-type entanglement via coherent-state transmission

14. Tools for quantum network design

15. Quantum key distribution with setting-choice-independently correlated light sources

16. Experimental time-reversed adaptive Bell measurement towards all-photonic quantum repeaters

17. Limitations of End-Tidal CO2 Measured with a Portable Capnometer to Estimate PaCO2 for Patients with Respiratory Disease.

18. Tools for quantum network design.

19. All-photonic quantum repeaters

20. Prediction of brittle fracture initiating at defects in the end of complete joint penetration groove welds.

21. Quantum Benchmark via an Uncertainty Product of Canonical Variables.

23. Security of quantum key distribution with iterative sifting

25. Loss-tolerant quantum cryptography with imperfect sources.

Catalog

Books, media, physical & digital resources