Hiroyuki Sato

Orcid: 0000-0002-2891-3835

According to our database1, Hiroyuki Sato authored at least 334 papers between 1985 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Dr.Hair: Reconstructing Scalp-Connected Hair Strands without Pre-training via Differentiable Rendering of Line Segments.
CoRR, 2024

BlockFusion: Expandable 3D Scene Generation using Latent Tri-plane Extrapolation.
CoRR, 2024

2023
Optimal Federation Method for Embedding Internet of Things in Software-Defined Perimeter.
IEEE Consumer Electron. Mag., September, 2023

Riemannian optimization on unit sphere with p-norm and its applications.
Comput. Optim. Appl., July, 2023

Bloccess: Enabling Fine-Grained Access Control Based on Blockchain.
J. Netw. Syst. Manag., 2023

Adaptive action-prediction cortical learning algorithm under uncertain environments.
Int. J. Hybrid Intell. Syst., 2023

Conjugate Gradient Methods for Optimization Problems on Symplectic Stiefel Manifold.
IEEE Control. Syst. Lett., 2023

Global convergence of Hager-Zhang type Riemannian conjugate gradient method.
Appl. Math. Comput., 2023

Directional Pareto Front and Its Estimation to Encourage Multi-Objective Decision-Making.
IEEE Access, 2023

Operation Management Method of Software Defined Perimeter for Promoting Zero-Trust Model.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Parallelizing quantum simulation with decision diagrams.
Proceedings of the IEEE International Conference on Quantum Software, 2023

Security Policy Matching Model between Mobile IoT and Public Fog Computing.
Proceedings of the 14th IIAI International Congress on Advanced Applied Informatics, 2023

W-Kernel: An OS Kernel Architecture Designed With Isolation and Customizability.
Proceedings of the 2023 5th International Conference on Software Engineering and Development, 2023

3D Segmenter: 3D Transformer based Semantic Segmentation via 2D Panoramic Distillation.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Digital Twin Configuration Method for Public Services by Citizens.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Decentralized Self-sovereign Identity Management System: Empowering Datacenters Through Compact Cancelable Template Generation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Exploring High-dimensional Rules Indirectly via Latent Space Through a Dimensionality Reduction for XCS.
Proceedings of the Genetic and Evolutionary Computation Conference, 2023

Pareto Front Upconvert on Multi-objective Building Facility Control Optimization.
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023

Multi-objectivization Relaxes Multi-funnel Structures in Single-objective NK-landscapes.
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2023

Pareto Front Upconvert by Iterative Estimation Modeling and Solution Sampling.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2023

Toward Unbounded Search Space Exploration by Particle Swarm Optimization in Multi-Modal Optimization Problem.
Proceedings of the IEEE Congress on Evolutionary Computation, 2023

Efficient Cryptographic Processing Using On-Chip GPUs in System-on-Chip Architectures.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

VeriAnon: an Anonymous, Verifiable, and Tamper-proof Commenting System Based on Ring Signature and Clustering Merkle Tree for Decentralized Trading.
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023

Dimension-Wise Feature Selection of Deep Learning Models for In-Air Signature Time Series Analysis Based on Shapley Values.
Proceedings of the 4th Asia Service Sciences and Software Engineering Conference, 2023

2022
Riemannian Conjugate Gradient Methods: General Framework and Specific Algorithms with Convergence Analyses.
SIAM J. Optim., December, 2022

Content-based Stock Recommendation Using Smartphone Data.
J. Inf. Process., 2022

Topic model-based recommender systems and their applications to cold-start problems.
Expert Syst. Appl., 2022

Sequential optimality conditions for nonlinear optimization on Riemannian manifolds and a globally convergent augmented Lagrangian method.
Comput. Optim. Appl., 2022

Dressi: A Hardware-Agnostic Differentiable Renderer with Reactive Shader Packing and Soft Rasterization.
Comput. Graph. Forum, 2022

Sensing In-Air Signature Motions Using Smartwatch: A High-Precision Approach of Behavioral Authentication.
IEEE Access, 2022

Leveraging Self-Sovereign Identity in Decentralized Data Aggregation.
Proceedings of the Ninth International Conference on Software Defined Systems, 2022

Solution Archive and Its Re-use in Evolutionary Many-objective Facility Control Optimization.
Proceedings of the Joint 12th International Conference on Soft Computing and Intelligent Systems and 23rd International Symposium on Advanced Intelligent Systems, 2022

Adaptive Synapse Adjustment for Multivariate Cortical Learning Algorithm.
Proceedings of the Joint 12th International Conference on Soft Computing and Intelligent Systems and 23rd International Symposium on Advanced Intelligent Systems, 2022

Synergistic Effect of Adaptive Synapse Arrangement and Column-based Decoder in Cortical Learning Algorithm.
Proceedings of the Joint 12th International Conference on Soft Computing and Intelligent Systems and 23rd International Symposium on Advanced Intelligent Systems, 2022

A Mobile Cloud-based Access Control with Efficiently Outsourced Decryption.
Proceedings of the 10th IEEE International Conference on Mobile Cloud Computing, 2022

Elastic Trust Management in Decentralized Computing Environments.
Proceedings of the Modern Management based on Big Data III, 2022

Formalism- Driven Development of Decentralized Systems.
Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, 2022

Accelerating Convolution Neural Networks in Embedded Intel GPUs.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

Can the same rule representation change its matching area?: enhancing representation in XCS for continuous space by probability distribution in multiple dimension.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022

Absumption based on overgenerality and condition-clustering based specialization for XCS with continuous-valued inputs.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022

Multilayer Defense Security Management in Consideration of TPO Conditions.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

An Extended Visualization Model for Silent Cyber Risks Considering Non-cyber Aspects.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

Inheritance vs. Expansion: Generalization Degree of Nearest Neighbor Rule in Continuous Space as Covering Operator of XCS.
Proceedings of the Applications of Evolutionary Computation - 25th European Conference, 2022

Self-Sovereign Identity as a Service: Architecture in Practice.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

XCSR with VAE using Gaussian Distribution Matching: From Point to Area Matching in Latent Space for Less-overlapped Rule Generation in Observation Space.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

Impacts of Single-objective Landscapes on Multi-objective Optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

Supervised Multi-Objective Optimization Algorithm Using Estimation.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

Beta Distribution based XCS Classifier System.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

Evolutionary Real-world Item Stock Allocation for Japanese Electric Commerce.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

Digital Twin Based Evolutionary Building Facility Control Optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

Encouraging Crowd Avoidance Behavior using Dynamic Pricing Framework Towards Preventing the Spread of COVID-19.
Proceedings of the IEEE International Conference on Big Data, 2022

Two-Tier Trust Structure Model for Dynamic Supply Chain Formulation.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Approximated logarithmic maps on Riemannian manifolds and their applications.
JSIAM Lett., 2021

Adaptive Synapse Arrangement in Cortical Learning Algorithm.
J. Adv. Comput. Intell. Intell. Informatics, 2021

Cayley-transform-based gradient and conjugate gradient algorithms on Grassmann manifolds.
Adv. Comput. Math., 2021

Alzheimer Dementia Detection based on Circadian Rhythm Disorder of Heartrate.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

High-speed High-resolution Image Capture by Using Phase-shift Photographing for Periodic Motion of Machine Element.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

Complementary Methods of IoT Reliability for Embedding IoT Devices into SDP.
Proceedings of the 11th IEEE International Conference on Consumer Electronics, 2021

Sunspot: A Decentralized Framework Enabling Privacy for Authorizable Data Sharing on Transparent Public Blockchains.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Misclassification detection based on conditional VAE for rule evolution in learning classifier system.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

IoT Reliability Improvement Method for Secure Supply Chain Management.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

A Visualization Model for Silent Cyber Risks Contained in Emerging Risks.
Proceedings of the 10th IEEE Global Conference on Consumer Electronics, 2021

Generating Duplex Routes for Robust Bus Transport Network by Improved Multi-objective Evolutionary Algorithm Based on Decomposition.
Proceedings of the Applications of Evolutionary Computation, 2021

Pareto Front Estimation Using Unit Hyperplane.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2021

In-air Signature Authentication Using Smartwatch Motion Sensors.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Weight Vector Arrangement Using Virtual Objective Vectors in Decomposition-based MOEA.
Proceedings of the IEEE Congress on Evolutionary Computation, 2021

XCS with Weight-based Matching in VAE Latent Space and Additional Learning of High-Dimensional Data.
Proceedings of the IEEE Congress on Evolutionary Computation, 2021

Increasing Accuracy and Interpretability of High-Dimensional Rules for Learning Classifier System.
Proceedings of the IEEE Congress on Evolutionary Computation, 2021

Simple Acceleration of the Riemannian Steepest Descent Method with the Armijo Condition.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Multi-factorial Evolutionary Algorithm Using Objective Similarity Based Parent Selection.
Proceedings of the Bio-Inspired Information and Communications Technologies, 2021

Double-Layered Cortical Learning Algorithm for Time-Series Prediction.
Proceedings of the Bio-Inspired Information and Communications Technologies, 2021

2020
Riemannian Optimal Identification Method for Linear Systems With Symmetric Positive-Definite Matrix.
IEEE Trans. Autom. Control., 2020

Self-Structured Cortical Learning Algorithm by Dynamically Adjusting Columns and Cells.
J. Adv. Comput. Intell. Intell. Informatics, 2020

Transition-Oriented Programming: Developing Verifiable Systems.
CoRR, 2020

Extending Concurrent Separation Logic to Enhance Modular Formalization.
CoRR, 2020

Riemannian conjugate gradient methods with inverse retraction.
Comput. Optim. Appl., 2020

Risk Breakdown Structure and Security Space for Security Management.
Proceedings of the 14th IEEE International Conference on Service Oriented Systems Engineering, 2020

Service-Oriented Software Design Model for Communication Robot.
Proceedings of the 14th IEEE International Conference on Service Oriented Systems Engineering, 2020

Column-based Decoder of Internal Prediction Representation in Cortical Learning Algorithms.
Proceedings of the Joint 11th International Conference on Soft Computing and Intelligent Systems and 21st International Symposium on Advanced Intelligent Systems, 2020

Proposal of a Perimeter Line Management Method for Fog and Edge Computing with SDP Concept.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Bloccess: Towards Fine-Grained Access Control Using Blockchain in a Distributed Untrustworthy Environment.
Proceedings of the 8th IEEE International Conference on Mobile Cloud Computing, 2020

A Study of Multi-viewpoint Risk Assessment of Internet of Things (IoT).
Proceedings of the 9th International Congress on Advanced Applied Informatics, 2020

Risk Management of Mobile Workers based on Multiple Viewpoints.
Proceedings of the 9th International Congress on Advanced Applied Informatics, 2020

A Fake News Dissemination Model Based on Updating Reliability and Doubt among Individuals.
Proceedings of the 11th International Conference on Awareness Science and Technology, 2020

Formalizing and Verifying Decentralized Systems with Extended Concurrent Separation Logic.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Automated Test Input Generation for Convolutional Neural Networks by Implementing Multi-objective Evolutionary Algorithms.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

Distance Minimization Problems for Multi-factorial Evolutionary Optimization Benchmarking.
Proceedings of the Hybrid Intelligent Systems, 2020

Visual mapping of multi-objective optimization problems and evolutionary algorithms.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

Incremental lattice design of weight vector set.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

Preliminary study of adaptive grid-based decomposition on many-objective evolutionary optimization.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

Evolutionary many-objective optimization.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

Derepo: A Distributed Privacy-Preserving Data Repository with Decentralized Access Control for Smart Health.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Handwritten Signature Authentication Using Smartwatch Motion Sensors.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Dagbase: A Decentralized Database Platform Using DAG-Based Consensus.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Non-dominated Solution Sampling Using Environmental Selection in EMO algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020

Local Covering: Adaptive Rule Generation Method Using Existing Rules for XCS.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020

Evolutionary Air-Conditioning optimization Using an LSTM-Based Surrogate Evaluator.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020

2019
Riemannian Stochastic Variance Reduced Gradient Algorithm with Retraction and Vector Transport.
SIAM J. Optim., 2019

Elastic Trust Model for Dynamically Evolving Trust Frameworks.
IEICE Trans. Inf. Syst., 2019

Cholesky QR-based retraction on the generalized Stiefel manifold.
Comput. Optim. Appl., 2019

Sleep Apnea Syndrome Detection based on Biological Vibration Data from Mattress Sensor.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Concept Proposal of Multi-layer Defense Security Countermeasures Based on Dynamic Reconfiguration Multi-perimeter Lines.
Proceedings of the Advances in Networked-based Information Systems, 2019

Edge Computing Platform Management: Design for F2C and F2F for Small Businesses to Reduce Costs.
Proceedings of the 8th International Congress on Advanced Applied Informatics, 2019

Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems.
Proceedings of the 8th International Congress on Advanced Applied Informatics, 2019

Simultaneous Local Adaptation for Different Local Properties.
Proceedings of the 23rd Asia Pacific Symposium on Intelligent and Evolutionary Systems, 2019

Development of Consumer Camera-Based Pseudo High-Speed High-Resolution Capturing System Using Phase-Shift Photographing.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

A Study of Risk Assessment for Sharing Economy based on a User's Viewpoint.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Evolving Generalized Solutions for Robust Multi-objective Optimization: Transportation Analysis in Disaster.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2019

An Interactive and Continuous Authorization Scheme by using Belnap Logic.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

A Privacy-Preserving and Fully Decentralized Storage and Sharing System on Blockchain.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Communication Robot for Elderly Based on Robotic Process Automation.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Message from EATA Symposium Chairs.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Complex-Valued-based Learning Classifier System for POMDP Environments.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

Knowledge Extraction from XCSR Based on Dimensionality Reduction and Deep Generative Models.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

Evolutionary Optimization of Air-conditioning Schedule Robust for Temperature Forecast Errors.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

Niche Radius Adaptation in Bat Algorithm for Locating Multiple Optima in Multimodal Functions.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

Riemannian Gradient-Based Online Identification Method for Linear Systems with Symmetric Positive-Definite Matrix.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

A Distribution Control of Weight Vector Set for Multi-objective Evolutionary Algorithms.
Proceedings of the Bio-inspired Information and Communication Technologies, 2019

2018
Structure-Preserving H<sup>2</sup> Optimal Model Reduction Based on the Riemannian Trust-Region Method.
IEEE Trans. Autom. Control., 2018

Scalable and secure access control policy update for outsourced big data.
Future Gener. Comput. Syst., 2018

Adaptive Policy Evaluation Framework for Flexible Service Provision.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

A Study on a Cortical Learning Algorithm Dynamically Adjusting Columns and Cells.
Proceedings of the 2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on Advanced Intelligent Systems (ISIS), 2018

Effects of Duplication Operator in Evolutionary Simultaneous Design Optimization of Multiple Cars.
Proceedings of the 2018 Joint 10th International Conference on Soft Computing and Intelligent Systems (SCIS) and 19th International Symposium on Advanced Intelligent Systems (ISIS), 2018

Enabling Dynamic and Efficient Data Access Control in Cloud Computing Based on Attribute Certificate Management and CP-ABE.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

Riemannian Stochastic Recursive Gradient Algorithm with Retraction and Vector Transport and Its Convergence Analysis.
Proceedings of the 35th International Conference on Machine Learning, 2018

Accelerating Facial Detection for Improvement of Person Identification Accuracy in Entering and Exiting Management System.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Multiple swarm intelligence methods based on multiple population with sharing best solution for drastic environmental change.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Infeasible solution repair and MOEA/D sharing weight vectors for solving multi-objective set packing problems.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Artificial bee colony algorithm based on adaptive local information sharing: approach for several dynamic changes.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Evolutionary multi-objective air-conditioning schedule optimization for office buildings.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Directed mating in decomposition-based MOEA for constrained many-objective optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2018

XCSR based on compressed input by deep neural network for high dimensional data.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Message from EATA Symposium Chairs.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Riemannian stochastic quasi-Newton algorithm with variance reduction and its convergence analysis.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2018

2017
An empirical study on the effects of code visibility on program testability.
Softw. Qual. J., 2017

A matrix-free implementation of Riemannian Newton's method on the Stiefel manifold.
Optim. Lett., 2017

User Identification of Pseudonyms without Identity Information Exposure - A Scenario in Access Federations.
J. Inf. Process., 2017

Authorization by Documents.
J. Inf. Process., 2017

Learning Classifier System Based on Mean of Reward.
J. Adv. Comput. Intell. Intell. Informatics, 2017

XCSR Learning from Compressed Data Acquired by Deep Neural Network.
J. Adv. Comput. Intell. Intell. Informatics, 2017

An Application Framework for Smart Education System Based on Mobile and Cloud Systems.
IEICE Trans. Inf. Syst., 2017

Achieving Scalable and Optimized Attribute Revocation in Cloud Computing.
IEICE Trans. Inf. Syst., 2017

Riemannian Optimal System Identification Algorithm for Linear MIMO Systems.
IEEE Control. Syst. Lett., 2017

Riemannian stochastic variance reduced gradient.
CoRR, 2017

Strategies to Improve Cuckoo Search Toward Adapting Randomly Changing Environment.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

Multi-objetive optimization problem mapping based on algorithmic parameter rankings.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era.
Proceedings of the Advances in Network-Based Information Systems, 2017

A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud.
Proceedings of the Advances in Network-Based Information Systems, 2017

The Entering and Exiting Management System by Person Specification Using Deep-CNN.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Towards Adaptive Aircraft Landing Order with Aircraft Routes Partially Fixed by Air Traffic Controllers as Human Intervention.
Proceedings of the Human Interface and the Management of Information: Supporting Learning, Decision-Making and Collaboration, 2017

Automatic adjustment of selection pressure based on range of reward in learning classifier system.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

An improved MOEA/D utilizing variation angles for multi-objective optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Utilization of infeasible solutions in MOEA/D for solving constrained many-objective optimization problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Trust for Data and Data Platforms in the Cyber-World.
Proceedings of the 2017 International Conference on Cyberworlds, 2017

Supervised-Topic-Model-Based Hybrid Filtering for Recommender Systems.
Proceedings of the 5th International Conference on Applied Computing and Information Technology, 2017

Detection of Irregularities and Rips by Finding Critical Points of Morse Theory - Preliminary Results on Analysis on Sales Data.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Collaborative Computation Offloading in Heterogeneous Asynchronous Cloud Environment.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Message from the EATA 2017 Co-Chairs.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Enforcing Hidden Access Policy for Supporting Write Access in Cloud Storage Systems.
Proceedings of the CLOSER 2017, 2017

Applying variance-based Learning Classifier System without Convergence of Reward Estimation into various Reward distribution.
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017

2016
Chain-reaction solution update in MOEA/D and its effects on multi- and many-objective optimization.
Soft Comput., 2016

Optimization of Aircraft Landing Route and Order: An approach of Hierarchical Evolutionary Computation.
EAI Endorsed Trans. Self Adapt. Syst., 2016

Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2015.
J. Inf. Process., 2016

Practical Correctness in ICT Environments.
IT Prof., 2016

Embedding lightweight proxy re-encryption for efficient attribute revocation in cloud computing.
Int. J. High Perform. Comput. Netw., 2016

Riemannian stochastic variance reduced gradient on Grassmann manifold.
CoRR, 2016

A Dai-Yuan-type Riemannian conjugate gradient method with the weak Wolfe conditions.
Comput. Optim. Appl., 2016

Controlling selection areas of useful infeasible solutions for directed mating in evolutionary constrained multi-objective optimization.
Ann. Math. Artif. Intell., 2016

Establishing Trust in the Emerging Era of IoT.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Guiding random test generation with program analysis.
Proceedings of the Software Engineering 2016, 2016

Extracting Different Abstracted Level Rule with Variance-Based LCS.
Proceedings of the 2016 Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), 2016

Evolutionary Algorithmic Parameter Optimization of MOEAs for Multiple Multi-objective Problems.
Proceedings of the 2016 Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), 2016

Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Specifying a Trust Model for Academic Cloud Services.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016

Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service.
Proceedings of the 5th IIAI International Congress on Advanced Applied Informatics, 2016

Proceedings in Adaptation, Learning and Optimization.
Proceedings of the Intelligent and Evolutionary Systems - The 20th Asia Pacific Symposium, 2016

Performance evaluation on data management approach for multiple clouds using secret sharing scheme.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

Personalized Real-Time Sleep Stage from Past Sleep Data to Today's Sleep Estimation.
Proceedings of the Human Interface and the Management of Information: Applications and Services, 2016

Preventing Incorrect Opinion Sharing with Weighted Relationship Among Agents.
Proceedings of the Human Interface and the Management of Information: Applications and Services, 2016

Variance-based Learning Classifier System without Convergence of Reward Estimation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2016

Risk assessment of BYOD: Bring your own device.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Temporary grouping method using smartphones.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Automatic LOD conversion system of tweet data associated with tourist spots.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Updating Policies in CP-ABE-Based Access Control: An Optimized and Secure Service.
Proceedings of the Service-Oriented and Cloud Computing, 2016

User Identification of Pseudonyms without Identity Information Exposure in Access Federations.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

A modified cuckoo search algorithm for dynamic optimization problems.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

Enhanced decomposition-based many-objective optimization using supplemental weight vectors.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

Learning classifier system with deep autoencoder.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

A New H<sup>2</sup> optimal model reduction method based on riemannian conjugate gradient method.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

19.2 cm<sup>3</sup> flexible fetal heart rate sensor for improved quality of pregnancy life.
Proceedings of the IEEE Biomedical Circuits and Systems Conference, 2016

Key Update as a Service (KAAS): An Agent-Based Modeling for Cloud-Based Access Control.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

Improved Lightweight Proxy Re-encryption for Flexible and Scalable Mobile Revocation Management in Cloud Computing.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Risk assessment quantification of social-media utilization in enterprise.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
A 0.33 nJ/bit IEEE802.15.6/Proprietary MICS/ISM Wireless Transceiver With Scalable Data Rate for Medical Implantable Applications.
IEEE J. Biomed. Health Informatics, 2015

Improved sampling using loopy belief propagation for probabilistic model building genetic programming.
Swarm Evol. Comput., 2015

Adaptive Control of Dominance Area of Solutions in Evolutionary Many-Objective Optimization.
New Math. Nat. Comput., 2015

Evolutionary Algorithm for Uncertain Evaluation Function.
New Math. Nat. Comput., 2015

Multi-objective Optimization for Common and Special Components: First Step Toward Network Optimization of Regular and Non-Regular Flights.
New Math. Nat. Comput., 2015

Joint singular value decomposition algorithm based on the Riemannian trust-region method.
JSIAM Lett., 2015

Linear Performance-Breakdown Model: A Framework for GPU kernel programs performance analysis.
Int. J. Netw. Comput., 2015

Analysis of inverted PBI and comparison with other scalarizing functions in decomposition based MOEAs.
J. Heuristics, 2015

Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Risk assessment of social-media utilization in an enterprise.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Improvement of multiple CP/CPS based on level of assurance for campus PKI deployment.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related Risks.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Risk Assessment in Cyber-Physical System in Office Environment.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

GRT: An Automated Test Generator Using Orchestrated Program Analysis.
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

GRT: Program-Analysis-Guided Random Testing (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Estimating surrounding symptom level of dementia patient by sleep stage.
Proceedings of the 9th International Symposium on Medical Information and Communication Technology, 2015

An Approach to Selecting Cloud Services for Data Storage in Heterogneous-Multicloud Environment with High Availability and Confidentiality.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

An Empirical Study on Effects of Code Visibility on Code Coverage of Software Testing.
Proceedings of the 10th IEEE/ACM International Workshop on Automation of Software Test, 2015

GRT at the SBST 2015 Tool Competition.
Proceedings of the 8th IEEE/ACM International Workshop on Search-Based Software Testing, 2015

CLOUD-CAT: A collaborative access control tool for data outsourced in cloud computing.
Proceedings of the Tenth International Conference on Digital Information Management, 2015

A Parallel MOEA/D Generating Solutions in Minimum Overlapped Update Ranges of Solutions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Control of Crossed Genes Ratio for Directed Mating in Evolutionary Constrained Multi-Objective Optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Cost reduction effect on running costs in ISMS based on sensors.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Secure protocol with variable security level using secret sharing scheme.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Dynamic risk evaluation model as a security field.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Message from NATA Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Handling different level of unstable reward environment through an estimation of reward distribution in XCS.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

Toward robustness against environmental change speed by artificial bee colony algorithm based on local information sharing.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

Ship route evolutionary optimization of multiple ship companies for distributed coordination of resources.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

MOEA/D using constant-distance based neighbors designed for many-objective optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

Directed mating using inverted PBI function for constrained multi-objective optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

Riemannian trust-region methods for H2 optimal model reduction.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Sightseeing plan recommendation system using sequential pattern mining based on adjacent activities.
Proceedings of the 10th Asian Control Conference, 2015

A Study of Cost Structure Visualization for Digital Forensics Deployment.
Proceedings of the 3rd International Conference on Applied Computing and Information Technology, 2015

Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach.
J. Inf. Process., 2014

Privacy Preserving Attribute Aggregation Method without Shared Identifier Binding.
J. Inf. Process., 2014

Archive of Useful Solutions for Directed Mating in Evolutionary Constrained Multiobjective Optimization.
J. Adv. Comput. Intell. Intell. Informatics, 2014

Risk assessment quantification in life log service.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

Adaptive Update Range of Solutions in MOEA/D for Multi and Many-Objective Optimization.
Proceedings of the Simulated Evolution and Learning - 10th International Conference, 2014

Project centralization based on graph coloring.
Proceedings of the Symposium on Applied Computing, 2014

A Study of Risk Assessment Quantification in Cloud Computing.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Data Management Approach for Multiple Clouds Using Secret Sharing Scheme.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

What is Needed to Promote an Asynchronous Program Evolution in Genetic Programing?
Proceedings of the Learning and Intelligent Optimization, 2014

Controlling Selection Area of Useful Infeasible Solutions in Directed Mating for Evolutionary Constrained Multiobjective Optimization.
Proceedings of the Learning and Intelligent Optimization, 2014

Application of E-learning System Reality in Kyoto-style Earthen Wall Training.
Proceedings of the Digital Human Modeling. Applications in Health, Safety, Ergonomics and Risk Management, 2014

Efficient testing of software product lines via centralization (short paper).
Proceedings of the Generative Programming: Concepts and Experiences, 2014

Inverted PBI in MOEA/D and its impact on the search performance on multi and many-objective optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Controlling selection area of useful infeasible solutions and their archive for directed mating in evolutionary constrained multiobjective optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Autonomous running control system of an AGV by a tablet PC based on the wall-floor boundary line.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Vehicles and Transportation Systems, 2014

Riemannian conjugate gradient method for complex singular value decomposition problem.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
Riemannian Optimization Algorithms and Their Applications to Numerical Linear Algebra.
PhD thesis, 2013

A Riemannian Optimization Approach to the Matrix Singular Value Decomposition.
SIAM J. Optim., 2013

On the Impact of Path Redundancy Awareness in Evolutionary P2P Networking.
J. Adv. Comput. Intell. Intell. Informatics, 2013

Variable space diversity, crossover and mutation in MOEA solving many-objective knapsack problems.
Ann. Math. Artif. Intell., 2013

A Study of Data Management in Hybrid Cloud Configuration.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

Designing carrier's online storage "family cloud" for enhancing telecom home services.
Proceedings of the 17th International Conference on Intelligence in Next Generation Networks, 2013

Towards Understanding of Relationship among Pareto Optimal Solutions in Multi-dimensional Space via Interactive System.
Proceedings of the Human Interface and the Management of Information. Information and Interaction for Learning, Culture, Collaboration and Business,, 2013

Two-stage non-dominated sorting and directed mating for solving problems with multi-objectives and constraints.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

Privacy Enhancing Proxies in Attribute Releases: Two Approaches.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities across Shibboleth SPs.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Analyzing Distributed Java Applications by Automatic Centralization.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Learning non-linear ranking functions for web search using probabilistic model building GP.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

A complex singular value decomposition algorithm based on the Riemannian Newton method.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

2012
Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement.
J. Inf. Process., 2012

Risk Management to User Perception of Insecurity in Ambient Service.
Proceedings of the 13th ACIS International Conference on Software Engineering, 2012

Dynamic control of the number of crossed genes in evolutionary many-objective optimization.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012

An evolutionary algorithm using two-stage non-dominated sorting and directed mating for constrained multi-objective optimization.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012

Adaptive Control of the Number of Crossed Genes in Many-Objective Evolutionary Optimization.
Proceedings of the Learning and Intelligent Optimization - 6th International Conference, 2012

A Solution for Privacy Protection in MapReduce.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of Assurance.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Probabilistic model building GP with Belief propagation.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

2011
Graded Trust of Certificates and Its Management with Extended Path Validation.
J. Inf. Process., 2011

Improving Recovery Capability of Multiple Robots in Different Scale Structure Assembly.
J. Adv. Comput. Intell. Intell. Informatics, 2011

Robustness to Bit Inversion in Registers and Acceleration of Program Evolution in On-Board Computer.
J. Adv. Comput. Intell. Intell. Informatics, 2011

A New Formula of Security Risk Analysis That Takes Risk Improvement Factor into Account.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Quantifying Cost Structure of Campus PKI.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Federated Authentication in a Hierarchy of IdPs by Using Shibboleth.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Genetic Diversity and Effective Crossover in Evolutionary Many-objective Optimization.
Proceedings of the Learning and Intelligent Optimization - 5th International Conference, 2011

Building a Security Aware Cloud by Extending Internal Control to Cloud.
Proceedings of the 10th International Symposium on Autonomous Decentralized Systems, 2011

The Biased Multi-objective Optimization Using the Reference Point: Toward the Industrial Logistics Network.
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011

Linking digital signage with mobile phones.
Proceedings of the 15th International Conference on Intelligence in Next Generation Networks, 2011

What Kinds of Human Negotiation Skill Can Be Acquired by Changing Negotiation Order of Bargaining Agents?
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Improved S-CDAs using crossover controlling the number of crossed genes for many-objective optimization.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

2010
Self-Controlling Dominance Area of Solutions in Evolutionary Many-Objective Optimization.
Proceedings of the Simulated Evolution and Learning - 8th International Conference, 2010

A Cloud Trust Model in a Security Aware Cloud.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Hybrid Directional-Biased Evolutionary Algorithm for Multi-Objective Optimization.
Proceedings of the Parallel Problem Solving from Nature, 2010

Design of Graded Trusts by Using Dynamic Path Validation.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Pareto partial dominance MOEA and hybrid archiving strategy included CDAS in many-objective optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

Dynamic matching range in Exemplar-based Learning Classifier System.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

2009
Analysis of NSGA-II and NSGA-II with CDAS, and Proposal of an Enhanced CDAS Mechanism.
J. Adv. Comput. Intell. Intell. Informatics, 2009

Analysis of a Security Incident of Open Source Middleware .
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

<i>N</i>+/-<i>epsilon</i>: Reflecting Local Risk Assessment in LoA.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

Analyzing Semantics of Documents by Using a Program Analysis Method.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Analysis of Chronological Tag Dependency in Folksonomy.
Proceedings of the 2008 International Conference on Semantic Web & Web Services, 2008

LESSO: Legacy Enabling SSO.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

Local dominance and controlling dominance area of solutions in multi and many objectives EAs.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Delay Front and Skip Interval - Assessing Open Source Software Maintenance of System Vendors and Computer Centers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Local dominance and local recombination in MOEAs on 0/1 multiobjective knapsack problems.
Eur. J. Oper. Res., 2007

MultiBand-OFDM System with Concatenated Coding Scheme.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Extracing Tag Hierarchy from Folksonomy.
Proceedings of the 2007 International Conference on Semantic Web & Web Services, 2007

A resource-oriented grid meta-scheduler based on agents.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2007

Controlling Dominance Area of Solutions and Its Impact on the Performance of MOEAs.
Proceedings of the Evolutionary Multi-Criterion Optimization, 4th International Conference, 2007

High Performance Road Traffic Simulation based on Dynamic Time Step Synchronization Method.
Proceedings of the 11th IEEE International Symposium on Distributed Simulation and Real-Time Applications, 2007

Local Dominance Including Control of Dominance Area of Solutions in MOEAs.
Proceedings of the IEEE Symposium on Computational Intelligence in Multicriteria Decision Making, 2007

2006
Accurate evaluation of the absorption maxima of retinal proteins based on a hybrid QM/MM method.
J. Comput. Chem., 2006

Event-Aware Dynamic Time Step Synchronization Method for Distributed Moving Object Simulation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

2005
Computational Complexity and Performance of RAKE Receivers with Channel Estimation for DS-UWB.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Extracting Metadata using Ontologies to Collect Comparison Information.
Proceedings of the IASTED International Conference on Web Technologies, 2005

Static optimization of XSLT stylesheets: template instantiation optimization and lazy XML parsing.
Proceedings of the 2005 ACM Symposium on Document Engineering, 2005

On the locality of dominance and recombination in multiobjective evolutionary algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2005

Eye-contact visual communication with virtual view synthesis.
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005

2004
Speed-up of radiation treatment planning using a workstation cluster.
Syst. Comput. Jpn., 2004

A Technical Survey of Data Integration and Information Sharing Using Knowledge Representation on the Web.
IEICE Trans. Inf. Syst., 2004

Local dominance using polar coordinates to enhance multiobjective evolutionary algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Representation and Analysis of Mobile Computing using TeleLog - A Mobile Logic Language.
Proceedings of the 2nd International Conference Computing, 2004

2003
Flow Analytic Type System for Array Bound Checks.
Proceedings of the Computing: the Australasian Theory Symposiumm, 2003

Building A High Performance Parallel File System Using Grid Datafarm and ROOT I/O
CoRR, 2003

A data Grid testbed environment in Gigabit WAN with HPSS
CoRR, 2003

2002
A Knowledge Sharing System using XML Linking Language and Peer-to-Peer Technology.
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002

An Efficient Technique for Corner-Turn in SAR Image Reconstruction by Improving Cache Access.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

2001
Array form representation of idiom recognition system for numerical programs.
Proceedings of the 2001 International Conference on APL: An Arrays Odyssey, 2001

1999
A Particle Treatment Scheduling System Using Two Genetic Algorithms.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

1998
Three-dimensional Shape Reconstruction from Two-dimensional Images Using Symmetric Camera Location.
Proceedings of the Conference on Three-Dimensional Image Capture and Applications, 1998

1997
A Portable Distributed Shared Memory System on the Cluster Environment: Design and Implementation Fully in Software.
Proceedings of the High Performance Computing, International Symposium, 1997

Cost Estimation of Coherence Protocols of Software Managed Cache on Distributed Shared Memory System.
Proceedings of the High Performance Computing, International Symposium, 1997

Design and implementation of PVM-based portable distributed shared memory system on the workstation cluster environment.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

1995
Using Asynchronous and Bulk Communications to Construct an Optimizing Compiler for Distributed-Memory Machines with Consideration Given to Communications Costs.
Proceedings of the 9th international conference on Supercomputing, 1995

1994
Using YACC and Lex with C++.
ACM SIGPLAN Notices, 1994

1993
A Study on a Performance Improvement Algorithm in DQDB MAN.
Comput. Networks ISDN Syst., 1993

1992
Parallel Database Management System: Kappa-P.
Proceedings of the International Conference on Fifth Generation Computer Systems. FGCS 1992, 1992

1991
Communication in Linda/Q : Datatypes and Unification.
Proceedings of the International Conference on Parallel Processing, 1991

1990
Practice of Quality Modeling and Measurement on Software Life-Cycle.
Proceedings of the 12th International Conference on Software Engineering, 1990

1989
Cellular array processor CAP and applications.
J. VLSI Signal Process., 1989

E-CCC: Between CCC and Topos.
Theor. Comput. Sci., 1989

E-CCC: Between CCC and Topos, - its Expressive Power from the Viewpoint of Data Type Theory.
J. Symb. Comput., 1989

1988
Overview of the Parallel Inference Machine Operating System (PIMOS).
Proceedings of the International Conference on Fifth Generation Computer Systems, 1988

1985
Fast image generation of construcitve solid geometry using a cellular array processor.
Proceedings of the 12th Annual Conference on Computer Graphics and Interactive Techniques, 1985


  Loading...