Kazuo Hashimoto

According to our database1, Kazuo Hashimoto authored at least 67 papers between 1990 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Sequential Fish Catch Forecasting Using Bayesian State Space Models.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

2016
One DoF robotic hand that makes human laugh by tickling through rubbing underarm.
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016

2015
iKaaS Data Modeling: A Data Model for Community Services and Environment Monitoring in Smart City.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

Context Aware Services: A Novel Trend in IoT Based Research in Smart City Project.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Development of a comic mark based expressive robotic head adapted to Japanese cultural background.
Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2014

2011
MS2 : A New Real-Time Multi-Source Mobile-Streaming Architecture.
TBC, 2011

Development of a WLAN based monitoring system for group activity measurement in real-time.
Journal of Communications and Networks, 2011

Socio-familiar Personalized Service and Its Application - Towards a New Network Software for Next Generation Ubiquitous Service.
Proceedings of the 10th International Symposium on Autonomous Decentralized Systems, 2011

Mental state detection and tagging in nursing records.
Proceedings of the Seventh International Conference on Natural Computation, 2011

2010
Condensed Vector Machines: Learning Fast Machine for Large Data.
IEEE Trans. Neural Networks, 2010

A Flexible and Secure Access Control Scheme Using Social Behavior in Real World.
J. Mobile Multimedia, 2010

A Proposal of Privacy Management Architecture.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

An Overlay Authentication Network for Active Utilization of Private Information.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Visitor Access Control Scheme Utilizing Social Relationship in the Real World.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Partially Overlapped Channel Assignment on Wireless Mesh Network Backbone.
Proceedings of the Global Communications Conference, 2010

Hash-Based Distributed Public Key Infrastructure for Ubiquitous Environments.
Proceedings of the CISIS 2010, 2010

A Fair Load Sharing Scheme for Multi-source Multimedia Overlay Application Layer Multicast.
Proceedings of the CISIS 2010, 2010

2009
Efficient algorithms to compute compressed longest common substrings and compressed palindromes.
Theor. Comput. Sci., 2009

Proposal and Performance Evaluation of Hash-based Authentication for P2P Network.
JIP, 2009

Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation.
IEICE Transactions, 2009

A Group-Based Key Management Protocol for Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A Flexible and Secure Access Control Scheme Using Social Behavior in the Real World.
Proceedings of the 2009 International Conference on Complex, 2009

Anomaly Detection for DNS Servers Using Frequent Host Selection.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
A Cross-Layer Approach for an Efficient Delivery of TCP/RTP-Based Multimedia Applications in Heterogeneous Wireless Networks.
IEEE Trans. Vehicular Technology, 2008

A Novel Web Usage Mining Method - Mining and Clustering of DAG Access Patterns Considering Page Browsing Time.
Proceedings of the WEBIST 2008, 2008

An Efficient Collision Avoidance Strategy for ITS systems.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Computing Longest Common Substring and All Palindromes from Compressed Strings.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

Multi-class Support Vector Machine Simplification.
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008

On supporting handoff management for multi-source video streaming in mobile communication systems.
Proceedings of the LCN 2008, 2008

Learning Higher Accuracy Decision Trees from Concept Drifting Data Streams.
Proceedings of the New Frontiers in Applied Artificial Intelligence, 2008

Multi-Source Streaming in Next Generation Mobile Communication Systems.
Proceedings of IEEE International Conference on Communications, 2008

Design of Physical Activity Recommendation System.
Proceedings of the IADIS European Conference on Data Mining 2008, 2008

Decision Tree Induction from Numeric Data Stream.
Proceedings of the AI 2008: Advances in Artificial Intelligence, 2008

A New Authentication Method with Distributed Hash Table for P2P Network.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
A Stable Routing Protocol to Support ITS Services in VANET Networks.
IEEE Trans. Vehicular Technology, 2007

Toward Efficient Service-Level QoS Provisioning in Large-Scale 802.11-Based Networks.
IEEE Network, 2007

Dynamic QoS Negotiation for Next-Generation Wireless Communications Systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Tracing back attacks against encrypted protocols.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks.
Proceedings of IEEE International Conference on Communications, 2007

A Dynamic Service Level Negotiation Mechanism for QoS Provisioning in NGEO Satellite Networks.
Proceedings of IEEE International Conference on Communications, 2007

Combating Against Attacks on Encrypted Protocols.
Proceedings of IEEE International Conference on Communications, 2007

A Bandwidth Aggregation-Aware QoS Negotiation Mechanism for Next-Generation Wireless Networks.
Proceedings of the Global Communications Conference, 2007

Route Optimization for Large Scale Network Mobility Assisted by BGP.
Proceedings of the Global Communications Conference, 2007

A Fair and Lifetime-Maximum Routing Algorithm for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

2006
Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

ELB: An Explicit Load Balancing Routing Protocol for Multi-Hop NGEO Satellite Constellations.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Video Data Transmission Protocol "SVFTP" Using Multiple TCP Connections and Its Application.
IEICE Transactions, 2005

2004
Multimedia contents management and transmission system "VAST-web" and its effective transport protocol "SVFTP".
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

2003
AI application of the Internet - Backgrounds and Issues.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

2002
Humanoid Robots in Waseda University-Hadaly-2 and WABIAN.
Auton. Robots, 2002

2001
A Method for Supporting Document Selection in Cross-language Information Retrieval and its Evaluation.
Computers and the Humanities, 2001

Query Expansion Based on Predictive Algorithms for Collaborative Filtering.
Proceedings of the SIGIR 2001: Proceedings of the 24th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2001

2000
Experiments on the TREC-9 Filtering Track.
Proceedings of The Ninth Text REtrieval Conference, 2000

Document filtering method using non-relevant information profile.
Proceedings of the SIGIR 2000: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2000

Probabilistic Modeling of Alarm Observation Delay in Network Diagnosis.
Proceedings of the PRICAI 2000, Topics in Artificial Intelligence, 6th Pacific Rim International Conference on Artificial Intelligence, Melbourne, Australia, August 28, 2000

1999
Experiments on the TREC-8 Filtering Track.
Proceedings of The Eighth Text REtrieval Conference, 1999

Query Expansion Method Based on Word Contribution (poster abstract).
Proceedings of the SIGIR '99: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 1999

A study of speech recognition for the elderly.
Proceedings of the Sixth European Conference on Speech Communication and Technology, 1999

Intelligent Monitoring Method Using Time Varying Binomial Distribution Models for Pseudo-Periodic Communication Traffic.
Proceedings of the Advances in Intelligent Data Analysis, Third International Symposium, 1999

Schema Design for Causal Law Mining from Incomplete Database.
Proceedings of the Discovery Science, 1999

1998
TREC-7 Experiments: Query Expansion Method Based on Word Contribution.
Proceedings of The Seventh Text REtrieval Conference, 1998

A Study of Bayesian Clustering of a Document Set Based on GA.
Proceedings of the Simulated Evolution and Learning, 1998

1995
Design and Implementation of Real-Time Expert System for Troubleshooting in International Telephone Networks.
Proceedings of the Eighth International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, 1995

1994
Reconstruction of a decision tree with learning examples generated from an original tree and its characteristics.
Systems and Computers in Japan, 1994

1991
Text-to-speech synthesizer using superposition of sinusoidal waves generated by synchronized oscillators.
Proceedings of the Second European Conference on Speech Communication and Technology, 1991

1990
Speech synthesis using superposition of sinusoidal waves generated by synchronized oscillators.
Proceedings of the First International Conference on Spoken Language Processing, 1990


  Loading...