Hiroyuki Sato

According to our database1, Hiroyuki Sato
  • authored at least 186 papers between 1985 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Structure-Preserving H2 Optimal Model Reduction Based on the Riemannian Trust-Region Method.
IEEE Trans. Automat. Contr., 2018

Scalable and secure access control policy update for outsourced big data.
Future Generation Comp. Syst., 2018

2017
An empirical study on the effects of code visibility on program testability.
Software Quality Journal, 2017

A matrix-free implementation of Riemannian Newton's method on the Stiefel manifold.
Optimization Letters, 2017

Learning Classifier System Based on Mean of Reward.
JACIII, 2017

XCSR Learning from Compressed Data Acquired by Deep Neural Network.
JACIII, 2017

An Application Framework for Smart Education System Based on Mobile and Cloud Systems.
IEICE Transactions, 2017

Achieving Scalable and Optimized Attribute Revocation in Cloud Computing.
IEICE Transactions, 2017

Riemannian Optimal System Identification Algorithm for Linear MIMO Systems.
IEEE Control Systems Letters, 2017

Riemannian stochastic variance reduced gradient.
CoRR, 2017

Riemannian stochastic quasi-Newton algorithm with variance reduction and its convergence analysis.
CoRR, 2017

Strategies to Improve Cuckoo Search Toward Adapting Randomly Changing Environment.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

Multi-objetive optimization problem mapping based on algorithmic parameter rankings.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era.
Proceedings of the Advances in Network-Based Information Systems, 2017

A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud.
Proceedings of the Advances in Network-Based Information Systems, 2017

Towards Adaptive Aircraft Landing Order with Aircraft Routes Partially Fixed by Air Traffic Controllers as Human Intervention.
Proceedings of the Human Interface and the Management of Information: Supporting Learning, Decision-Making and Collaboration, 2017

Automatic adjustment of selection pressure based on range of reward in learning classifier system.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

An improved MOEA/D utilizing variation angles for multi-objective optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Utilization of infeasible solutions in MOEA/D for solving constrained many-objective optimization problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Trust for Data and Data Platforms in the Cyber-World.
Proceedings of the 2017 International Conference on Cyberworlds, 2017

Detection of Irregularities and Rips by Finding Critical Points of Morse Theory - Preliminary Results on Analysis on Sales Data.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Collaborative Computation Offloading in Heterogeneous Asynchronous Cloud Environment.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Message from the EATA 2017 Co-Chairs.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Enforcing Hidden Access Policy for Supporting Write Access in Cloud Storage Systems.
Proceedings of the CLOSER 2017, 2017

Applying variance-based Learning Classifier System without Convergence of Reward Estimation into various Reward distribution.
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017

2016
Chain-reaction solution update in MOEA/D and its effects on multi- and many-objective optimization.
Soft Comput., 2016

Optimization of Aircraft Landing Route and Order: An approach of Hierarchical Evolutionary Computation.
EAI Endorsed Trans. Self-Adaptive Systems, 2016

Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2015.
JIP, 2016

Practical Correctness in ICT Environments.
IT Professional, 2016

Embedding lightweight proxy re-encryption for efficient attribute revocation in cloud computing.
IJHPCN, 2016

Riemannian stochastic variance reduced gradient on Grassmann manifold.
CoRR, 2016

A Dai-Yuan-type Riemannian conjugate gradient method with the weak Wolfe conditions.
Comp. Opt. and Appl., 2016

Controlling selection areas of useful infeasible solutions for directed mating in evolutionary constrained multi-objective optimization.
Ann. Math. Artif. Intell., 2016

Establishing Trust in the Emerging Era of IoT.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Guiding random test generation with program analysis.
Proceedings of the Software Engineering 2016, 2016

Extracting Different Abstracted Level Rule with Variance-Based LCS.
Proceedings of the 2016 Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), 2016

Evolutionary Algorithmic Parameter Optimization of MOEAs for Multiple Multi-objective Problems.
Proceedings of the 2016 Joint 8th International Conference on Soft Computing and Intelligent Systems (SCIS) and 17th International Symposium on Advanced Intelligent Systems (ISIS), 2016

Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Specifying a Trust Model for Academic Cloud Services.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016

Performance evaluation on data management approach for multiple clouds using secret sharing scheme.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

Personalized Real-Time Sleep Stage from Past Sleep Data to Today's Sleep Estimation.
Proceedings of the Human Interface and the Management of Information: Applications and Services, 2016

Preventing Incorrect Opinion Sharing with Weighted Relationship Among Agents.
Proceedings of the Human Interface and the Management of Information: Applications and Services, 2016

Variance-based Learning Classifier System without Convergence of Reward Estimation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2016

Updating Policies in CP-ABE-Based Access Control: An Optimized and Secure Service.
Proceedings of the Service-Oriented and Cloud Computing, 2016

User Identification of Pseudonyms without Identity Information Exposure in Access Federations.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

A modified cuckoo search algorithm for dynamic optimization problems.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

Enhanced decomposition-based many-objective optimization using supplemental weight vectors.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

Learning classifier system with deep autoencoder.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

A New H2 optimal model reduction method based on riemannian conjugate gradient method.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Key Update as a Service (KAAS): An Agent-Based Modeling for Cloud-Based Access Control.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

Improved Lightweight Proxy Re-encryption for Flexible and Scalable Mobile Revocation Management in Cloud Computing.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Risk assessment quantification of social-media utilization in enterprise.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
A 0.33 nJ/bit IEEE802.15.6/Proprietary MICS/ISM Wireless Transceiver With Scalable Data Rate for Medical Implantable Applications.
IEEE J. Biomedical and Health Informatics, 2015

Improved sampling using loopy belief propagation for probabilistic model building genetic programming.
Swarm and Evolutionary Computation, 2015

Linear Performance-Breakdown Model: A Framework for GPU kernel programs performance analysis.
IJNC, 2015

Analysis of inverted PBI and comparison with other scalarizing functions in decomposition based MOEAs.
J. Heuristics, 2015

Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Risk assessment of social-media utilization in an enterprise.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Improvement of multiple CP/CPS based on level of assurance for campus PKI deployment.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related Risks.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Risk Assessment in Cyber-Physical System in Office Environment.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

GRT: An Automated Test Generator Using Orchestrated Program Analysis.
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

GRT: Program-Analysis-Guided Random Testing (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Estimating surrounding symptom level of dementia patient by sleep stage.
Proceedings of the 9th International Symposium on Medical Information and Communication Technology, 2015

An Approach to Selecting Cloud Services for Data Storage in Heterogneous-Multicloud Environment with High Availability and Confidentiality.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

An Empirical Study on Effects of Code Visibility on Code Coverage of Software Testing.
Proceedings of the 10th IEEE/ACM International Workshop on Automation of Software Test, 2015

GRT at the SBST 2015 Tool Competition.
Proceedings of the 8th IEEE/ACM International Workshop on Search-Based Software Testing, 2015

CLOUD-CAT: A collaborative access control tool for data outsourced in cloud computing.
Proceedings of the Tenth International Conference on Digital Information Management, 2015

A Parallel MOEA/D Generating Solutions in Minimum Overlapped Update Ranges of Solutions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Control of Crossed Genes Ratio for Directed Mating in Evolutionary Constrained Multi-Objective Optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Cost reduction effect on running costs in ISMS based on sensors.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Secure protocol with variable security level using secret sharing scheme.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Dynamic risk evaluation model as a security field.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

Message from NATA Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Handling different level of unstable reward environment through an estimation of reward distribution in XCS.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

Toward robustness against environmental change speed by artificial bee colony algorithm based on local information sharing.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

Ship route evolutionary optimization of multiple ship companies for distributed coordination of resources.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

MOEA/D using constant-distance based neighbors designed for many-objective optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

Directed mating using inverted PBI function for constrained multi-objective optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

Riemannian trust-region methods for H2 optimal model reduction.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Optimization of Aircraft Landing Route and Order: An approach of Hierarchical Evolutionary Computation.
Proceedings of the BICT 2015, 2015

Sightseeing plan recommendation system using sequential pattern mining based on adjacent activities.
Proceedings of the 10th Asian Control Conference, 2015

Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach.
JIP, 2014

Privacy Preserving Attribute Aggregation Method without Shared Identifier Binding.
JIP, 2014

Archive of Useful Solutions for Directed Mating in Evolutionary Constrained Multiobjective Optimization.
JACIII, 2014

Risk assessment quantification in life log service.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

Adaptive Update Range of Solutions in MOEA/D for Multi and Many-Objective Optimization.
Proceedings of the Simulated Evolution and Learning - 10th International Conference, 2014

Project centralization based on graph coloring.
Proceedings of the Symposium on Applied Computing, 2014

A Study of Risk Assessment Quantification in Cloud Computing.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Data Management Approach for Multiple Clouds Using Secret Sharing Scheme.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

What is Needed to Promote an Asynchronous Program Evolution in Genetic Programing?
Proceedings of the Learning and Intelligent Optimization, 2014

Controlling Selection Area of Useful Infeasible Solutions in Directed Mating for Evolutionary Constrained Multiobjective Optimization.
Proceedings of the Learning and Intelligent Optimization, 2014

Application of E-learning System Reality in Kyoto-style Earthen Wall Training.
Proceedings of the Digital Human Modeling. Applications in Health, Safety, Ergonomics and Risk Management, 2014

Efficient testing of software product lines via centralization (short paper).
Proceedings of the Generative Programming: Concepts and Experiences, 2014

Inverted PBI in MOEA/D and its impact on the search performance on multi and many-objective optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Controlling selection area of useful infeasible solutions and their archive for directed mating in evolutionary constrained multiobjective optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Autonomous running control system of an AGV by a tablet PC based on the wall-floor boundary line.
Proceedings of the 2014 IEEE Symposium on Computational Intelligence in Vehicles and Transportation Systems, 2014

Riemannian conjugate gradient method for complex singular value decomposition problem.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
A Riemannian Optimization Approach to the Matrix Singular Value Decomposition.
SIAM Journal on Optimization, 2013

On the Impact of Path Redundancy Awareness in Evolutionary P2P Networking.
JACIII, 2013

Variable space diversity, crossover and mutation in MOEA solving many-objective knapsack problems.
Ann. Math. Artif. Intell., 2013

A Study of Data Management in Hybrid Cloud Configuration.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

Designing carrier's online storage "family cloud" for enhancing telecom home services.
Proceedings of the 17th International Conference on Intelligence in Next Generation Networks, 2013

Towards Understanding of Relationship among Pareto Optimal Solutions in Multi-dimensional Space via Interactive System.
Proceedings of the Human Interface and the Management of Information. Information and Interaction for Learning, Culture, Collaboration and Business,, 2013

Two-stage non-dominated sorting and directed mating for solving problems with multi-objectives and constraints.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

Privacy Enhancing Proxies in Attribute Releases: Two Approaches.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities across Shibboleth SPs.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Analyzing Distributed Java Applications by Automatic Centralization.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Learning non-linear ranking functions for web search using probabilistic model building GP.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

A complex singular value decomposition algorithm based on the Riemannian Newton method.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

2012
Quantifying Cost Structure of Campus PKI Based on Estimation and Actual Measurement.
JIP, 2012

Risk Management to User Perception of Insecurity in Ambient Service.
Proceedings of the 13th ACIS International Conference on Software Engineering, 2012

Dynamic control of the number of crossed genes in evolutionary many-objective optimization.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012

An evolutionary algorithm using two-stage non-dominated sorting and directed mating for constrained multi-objective optimization.
Proceedings of the 6th International Conference on Soft Computing and Intelligent Systems (SCIS), 2012

Adaptive Control of the Number of Crossed Genes in Many-Objective Evolutionary Optimization.
Proceedings of the Learning and Intelligent Optimization - 6th International Conference, 2012

A Solution for Privacy Protection in MapReduce.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

Analysis of Security of PKI Operation with Multiple CP/CPS Based on Level of Assurance.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Probabilistic model building GP with Belief propagation.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

2011
Graded Trust of Certificates and Its Management with Extended Path Validation.
JIP, 2011

Improving Recovery Capability of Multiple Robots in Different Scale Structure Assembly.
JACIII, 2011

Robustness to Bit Inversion in Registers and Acceleration of Program Evolution in On-Board Computer.
JACIII, 2011

A New Formula of Security Risk Analysis That Takes Risk Improvement Factor into Account.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Quantifying Cost Structure of Campus PKI.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Federated Authentication in a Hierarchy of IdPs by Using Shibboleth.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Genetic Diversity and Effective Crossover in Evolutionary Many-objective Optimization.
Proceedings of the Learning and Intelligent Optimization - 5th International Conference, 2011

Building a Security Aware Cloud by Extending Internal Control to Cloud.
Proceedings of the 10th International Symposium on Autonomous Decentralized Systems, 2011

The Biased Multi-objective Optimization Using the Reference Point: Toward the Industrial Logistics Network.
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011

Linking digital signage with mobile phones.
Proceedings of the 15th International Conference on Intelligence in Next Generation Networks, 2011

What Kinds of Human Negotiation Skill Can Be Acquired by Changing Negotiation Order of Bargaining Agents?
Proceedings of the Human Interface and the Management of Information. Interacting with Information, 2011

Improved S-CDAs using crossover controlling the number of crossed genes for many-objective optimization.
Proceedings of the 13th Annual Genetic and Evolutionary Computation Conference, 2011

2010
Self-Controlling Dominance Area of Solutions in Evolutionary Many-Objective Optimization.
Proceedings of the Simulated Evolution and Learning - 8th International Conference, 2010

A Cloud Trust Model in a Security Aware Cloud.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Hybrid Directional-Biased Evolutionary Algorithm for Multi-Objective Optimization.
Proceedings of the Parallel Problem Solving from Nature, 2010

Design of Graded Trusts by Using Dynamic Path Validation.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Pareto partial dominance MOEA and hybrid archiving strategy included CDAS in many-objective optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

Dynamic matching range in Exemplar-based Learning Classifier System.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

2009
Analysis of NSGA-II and NSGA-II with CDAS, and Proposal of an Enhanced CDAS Mechanism.
JACIII, 2009

Analysis of a Security Incident of Open Source Middleware .
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

N+/-epsilon: Reflecting Local Risk Assessment in LoA.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

Analyzing Semantics of Documents by Using a Program Analysis Method.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Analysis of Chronological Tag Dependency in Folksonomy.
Proceedings of the 2008 International Conference on Semantic Web & Web Services, 2008

LESSO: Legacy Enabling SSO.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

Local dominance and controlling dominance area of solutions in multi and many objectives EAs.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008

Delay Front and Skip Interval - Assessing Open Source Software Maintenance of System Vendors and Computer Centers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Local dominance and local recombination in MOEAs on 0/1 multiobjective knapsack problems.
European Journal of Operational Research, 2007

MultiBand-OFDM System with Concatenated Coding Scheme.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Extracing Tag Hierarchy from Folksonomy.
Proceedings of the 2007 International Conference on Semantic Web & Web Services, 2007

A resource-oriented grid meta-scheduler based on agents.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2007

High Performance Road Traffic Simulation based on Dynamic Time Step Synchronization Method.
Proceedings of the 11th IEEE International Symposium on Distributed Simulation and Real-Time Applications, 2007

Local Dominance Including Control of Dominance Area of Solutions in MOEAs.
Proceedings of the IEEE Symposium on Computational Intelligence in Multicriteria Decision Making, 2007

2006
Accurate evaluation of the absorption maxima of retinal proteins based on a hybrid QM/MM method.
Journal of Computational Chemistry, 2006

Event-Aware Dynamic Time Step Synchronization Method for Distributed Moving Object Simulation.
IEICE Transactions, 2006

Controlling Dominance Area of Solutions and Its Impact on the Performance of MOEAs.
Proceedings of the Evolutionary Multi-Criterion Optimization, 4th International Conference, 2006

2005
Computational Complexity and Performance of RAKE Receivers with Channel Estimation for DS-UWB.
IEICE Transactions, 2005

Extracting Metadata using Ontologies to Collect Comparison Information.
Proceedings of the IASTED International Conference on Web Technologies, 2005

Static optimization of XSLT stylesheets: template instantiation optimization and lazy XML parsing.
Proceedings of the 2005 ACM Symposium on Document Engineering, 2005

On the locality of dominance and recombination in multiobjective evolutionary algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2005

2004
Speed-up of radiation treatment planning using a workstation cluster.
Systems and Computers in Japan, 2004

A Technical Survey of Data Integration and Information Sharing Using Knowledge Representation on the Web.
IEICE Transactions, 2004

Local dominance using polar coordinates to enhance multiobjective evolutionary algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
Flow Analytic Type System for Array Bound Checks.
Electr. Notes Theor. Comput. Sci., 2003

Building A High Performance Parallel File System Using Grid Datafarm and ROOT I/O
CoRR, 2003

A data Grid testbed environment in Gigabit WAN with HPSS
CoRR, 2003

2002
A Knowledge Sharing System using XML Linking Language and Peer-to-Peer Technology.
Proceedings of the 2002 Symposium on Applications and the Internet (SAINT 2002), 28 January, 2002

An Efficient Technique for Corner-Turn in SAR Image Reconstruction by Improving Cache Access.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

2001
Array form representation of idiom recognition system for numerical programs.
APL, 2001

1999
A Particle Treatment Scheduling System Using Two Genetic Algorithms.
Proceedings of the 17th IASTED International Conference on Applied Informatics, 1999

1998
Three-dimensional Shape Reconstruction from Two-dimensional Images Using Symmetric Camera Location.
Proceedings of the Conference on Three-Dimensional Image Capture and Applications, 1998

1997
A Portable Distributed Shared Memory System on the Cluster Environment: Design and Implementation Fully in Software.
Proceedings of the High Performance Computing, International Symposium, 1997

Cost Estimation of Coherence Protocols of Software Managed Cache on Distributed Shared Memory System.
Proceedings of the High Performance Computing, International Symposium, 1997

Design and implementation of PVM-based portable distributed shared memory system on the workstation cluster environment.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

1995
Using Asynchronous and Bulk Communications to Construct an Optimizing Compiler for Distributed-Memory Machines with Consideration Given to Communications Costs.
Proceedings of the 9th international conference on Supercomputing, 1995

1994
Using YACC and Lex with C++.
SIGPLAN Notices, 1994

1993
A Study on a Performance Improvement Algorithm in DQDB MAN.
Computer Networks and ISDN Systems, 1993

1992
Parallel Database Management System: Kappa-P.
FGCS, 1992

1991
Communication in Linda/Q : Datatypes and Unification.
Proceedings of the International Conference on Parallel Processing, 1991

1990
Practice of Quality Modeling and Measurement on Software Life-Cycle.
Proceedings of the 12th International Conference on Software Engineering, 1990

1989
Cellular array processor CAP and applications.
VLSI Signal Processing, 1989

E-CCC: Between CCC and Topos.
Theor. Comput. Sci., 1989

E-CCC: Between CCC and Topos, - its Expressive Power from the Viewpoint of Data Type Theory.
J. Symb. Comput., 1989

1988
Overview of the Parallel Inference Machine Operating System (PIMOS).
FGCS, 1988

1985
Fast image generation of construcitve solid geometry using a cellular array processor.
Proceedings of the 12th Annual Conference on Computer Graphics and Interactive Techniques, 1985


  Loading...