Hiroshi Maruyama

According to our database1, Hiroshi Maruyama authored at least 52 papers between 1984 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Virtual Human Generative Model: Masked Modeling Approach for Learning Human Characteristics.
CoRR, 2023

Quality Assurance for ML Devices A Risk-Based Approach.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
Teaching support cockpit: Real-time avatarization for learning-activity logs with communication function.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022

2021
FAILS: a tool for assessing risk in ML systems.
Proceedings of the 28th Asia-Pacific Software Engineering Conference Workshops, 2021

2020
Global Data Science Project for COVID-19 Summary Report.
CoRR, 2020

Towards Multimodal Office Task Performance Estimation.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

2019
Software Engineering for Machine Learning Systems (SEMLS) (NII Shonan Meeting 156).
NII Shonan Meet. Rep., 2019

2018
Guaranteeing Deep Neural Network Outputs in a Feasible Region (short paper).
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018

2016
FPGA-based Volleyball Player Tracker.
SIGARCH Comput. Archit. News, 2016

Formalization of resilience for constraint-based dynamic systems.
J. Reliab. Intell. Environ., 2016

2015
Systems Resilience – Bridging the Gap Between Social and Mathematical (NII Shonan Meeting 2015-3).
NII Shonan Meet. Rep., 2015

A Novel Mental State Model of Social Perception of Brand Crisis from an Entertainment Perspective.
Proceedings of the Social Computing, Behavioral-Cultural Modeling, and Prediction, 2015

2014
Evaluating data utility of privacy-preserving pseudonymized location datasets.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems.
Proceedings of the Information and Communication Technology, 2014

Pseudonym exchange for privacy-preserving publishing of trajectory data set.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

Perception-Based Resilience: Accounting for the Impact of Human Perception on Resilience Thinking.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

2013
Protecting location privacy with k-confusing paths based on dynamic pseudonyms.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Data Marketplace for Efficient Data Placement.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

An analysis of conversations in role-play training for project management education.
Proceedings of the IEEE Global Engineering Education Conference, 2013

A method for evaluating project management competency acquired from role-play training.
Proceedings of the IEEE Global Engineering Education Conference, 2013

Cyber security problem based on Multi-Objective Distributed Constraint Optimization technique.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

Towards Systems Resilience.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

Systems resilience: a challenge problem for dynamic constraint-based agent systems.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data Set.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Integrated Environment for Scenario Development, Exercise Implements and Evaluation for Role-Play Training.
Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, 2012

2011
Direct metallographic analysis of an iron meteorite using hard x-ray photoelectron emission microscopy.
IBM J. Res. Dev., 2011

2009
Analysis of Learners' Behavior in Role-Play Training for Project Management Education.
Proceedings of the 9th IEEE International Conference on Advanced Learning Technologies, 2009

2008
Method for Building Dictionaries to Extract Reputation Information.
Proceedings of the Knowledge-Based Software Engineering, 2008

Challenges and Opportunities for Computer Science in Services Science.
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008

2007
ws-Attestation: Enabling Trusted Computing on Web Services.
Proceedings of the Test and Analysis of Web Services, 2007

2006
Special issue: Web service security.
Comput. Syst. Sci. Eng., 2006

Extracting Opinions Relating to Consumer Electronic Goods from Web Pages.
Proceedings of the Knowledge-Based Software Engineering, 2006

Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
Proceedings of the Computer Security, 2006

2005
WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

2003
Optimistic fair contract signing for Web services.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

2002
A stream-based implementation of XML encryption.
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002

Web services engineering: promises and challenges.
Proceedings of the 24th International Conference on Software Engineering, 2002

2001
Mapping between ASN.1 and XML.
Proceedings of the 2001 Symposium on Applications and the Internet (SAINT 2001), 2001

2000
Digest Values for DOM (DOMHASH).
RFC, April, 2000

A quadratic discriminant function based on bias rectification of eigenvalues.
Syst. Comput. Jpn., 2000

1999
InfoBus Repeater: A Secure and Distributed Publish/Subscribe Middleware.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

Character String Extraction from a Color Document.
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999

VRML Program Slicing.
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999

1997
Character String Extraction by Multi-stage Relaxation.
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997

1995
Real-time on-line unconstrained handwriting recognition using statistical methods.
Proceedings of the 1995 International Conference on Acoustics, 1995

1994
Backtracking-Free Dictionary Access Method for Japanese Morphological Analysis.
Proceedings of the 15th International Conference on Computational Linguistics, 1994

1992
Support tool and strategy for type error correction with polymorphic types.
Proceedings of the Sixteenth Annual International Computer Software and Applications Conference, 1992

JAUNT: A Constraint Solver for Disjunctive Feature Structures.
Proceedings of the 14th International Conference on Computational Linguistics, 1992

1990
An Interactive Japanese Parser for Machine Translation.
Proceedings of the 13th International Conference on Computational Linguistics, 1990

Structural Disambiguation with Constraint Propagation.
Proceedings of the 28th Annual Meeting of the Association for Computational Linguistics, 1990

1984
A Prolog-Based Natural Language Front-End System.
New Gener. Comput., 1984


  Loading...