Koji Hasebe

According to our database1, Koji Hasebe authored at least 41 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Flaws of Termination and Optimality in ADOPT-based Algorithms.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Playstyle Generation for Geister With Genetic Algorithm and Clustering.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Decision-Making in Hearthstone Based on Evolutionary Algorithm.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

Strategy Analysis for Competitive Bilateral Multi-Issue Negotiation.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

2022
Analysis of Optimal File Placement for Energy-Efficient File-Sharing Cloud Storage System.
IEEE Trans. Sustain. Comput., 2022

A Framework for Generating Playstyles of Game AI with Clustering of Play Logs.
Proceedings of the 14th International Conference on Agents and Artificial Intelligence, 2022

2021
Compositional Object Synthesis in Game of Life Cellular Automata Using SAT Solver.
Proceedings of the Advances in Swarm Intelligence - 12th International Conference, 2021

Ant Colony Optimization for K-Independent Average Traveling Salesman Problem.
Proceedings of the Advances in Swarm Intelligence - 12th International Conference, 2021

C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Playing Geister by Estimating Hidden Information with Deep Reinforcement Learning.
Proceedings of the 2021 IEEE Conference on Games (CoG), 2021

Identifying Playstyles in Games with NEAT and Clustering.
Proceedings of the 2021 IEEE Conference on Games (CoG), 2021

2020
Robustness and Failure Detection in Epistemic Gossip Protocols.
Proceedings of the Formal Methods and Software Engineering, 2020

Multi-tier Power-Saving Method in Cloud Storage Systems for Content Sharing Services.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2020

2018
Fault Tolerance in the Traffic Management System of a Last-mile Transportation Service.
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018

A Flexible Data Migration Strategy for Power Savings in Distributed Storage Systems.
Proceedings of the 7th International Conference on Smart Cities and Green ICT Systems, 2018

2017
Deadlock Detection in the Scheduling of Last-Mile Transportation Using Model Checking.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
A Game Theoretic Approach to Power Reduction in Distributed Storage Systems.
J. Inf. Process., 2016

Model Checking of BPMN Models for Reconfigurable Workflows.
CoRR, 2016

2015
Power-Saving in Storage Systems for Cloud Data Sharing Services with Data Access Prediction.
IEICE Trans. Inf. Syst., 2015

2014
Using a Potential Game for Power Reduction in Distributed Storage Systems.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Highly Available Primary-Backup Mechanism for Internet Services with Optimistic Consensus.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Power-saving in storage systems for Internet hosting services with data access prediction.
Proceedings of the International Green Computing Conference, 2013

Computationally complete symbolic attacker and key exchange.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Power-Aware Autonomous Distributed Storage Systems for Internet Hosting Service Platforms.
Proceedings of the Cloud Computing - Third International Conference, 2012

2011
Erratum to: Iterative information update and stability of strategies.
Synth., 2011

Iterative information update and stability of strategies.
Synth., 2011

Stepwise process of clinical trials in safety-conscious development of human assistive robots.
Proceedings of the 2011 IEEE International Conference on Robotics and Biomimetics, 2011

Self-Stabilizing Passive Replication for Internet Service Platforms.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2010
Dynamic grid quorum: a reconfigurable grid quorum and its power optimization algorithm.
Serv. Oriented Comput. Appl., 2010

Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols.
IACR Cryptol. ePrint Arch., 2010

Capability-based delegation model in RBAC.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

CapaCon: access control mechanism for inter-device communications through TCP connections.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Towards a guideline for clinical trials in the development of human assistive robots.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

Capability-Role-Based Delegation in Workflow Systems.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Power-Saving in Large-Scale Storage Systems with Data Migration.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Dynamic grid quorum: A novel approach for minimizing power consumption without data migration in grid quorums.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols.
Proceedings of the Formal to Practical Security, 2009

2007
Computational Semantics for Basic Protocol Logic - A Stochastic Approach.
IACR Cryptol. ePrint Arch., 2007

2005
Completeness and Counter-Example Generations of a Basic Protocol Logic: (Extended Abstract).
Proceedings of the 6th International Workshop on Rule-Based Programming, 2005

2003
Inferences on Honesty in Compositional Logic for Protocol Analysis.
Proceedings of the Software Security, 2003

2002
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic.
Proceedings of the Software Security -- Theories and Systems, 2002


  Loading...