Noboru Sonehara

According to our database1, Noboru Sonehara authored at least 112 papers between 1990 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Time Related Information Description of Business Hours of Clinics for Regional RDF Data.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

2019
Data-Driven Decision-Making in Cyber-Physical Integrated Society.
IEICE Trans. Inf. Syst., 2019

2018
Resource propagation algorithm considering predicates to complement knowledge bases in linked data.
Int. J. Space Based Situated Comput., 2018

Determinants of Personal Health Information Disclosure: A Case of Mobile Application.
Int. J. Softw. Innov., 2018

2017
Beacon-based tourist information system to identify visiting trends of tourists.
J. Robotics Netw. Artif. Life, 2017

Privacy Disclosure Adaptation for Trading between Personal Attributes and Incentives.
J. Inf. Process., 2017

TTPP method for validation of k-anonymity on wi-fi association log data: poster.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Resource Propagation Algorithm to Reinforce Knowledge Base in Linked Data.
Proceedings of the Advances in Network-Based Information Systems, 2017

LOD conversion system for generating large knowledge base from web contents.
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017

On-Demand Barrier-Free Street View System Using Sensor Information from General-Purpose Wheelchair Users.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Differential Diagnosis Listing as Relevance Feedback: An Essential User Interface for Clinical Decision Support Systems.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017

2016
Achieving High Data Utility K-Anonymization Using Similarity-Based Clustering Model.
IEICE Trans. Inf. Syst., 2016

A New Multiple Label Propagation Algorithm for Linked Open Data.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Requirements for smart privacy aware photo sharing services by visual abstraction.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Link prediction of LOD by multiple label propagation algorithm considering semantic distance.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Automatic LOD conversion system of tweet data associated with tourist spots.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

Tourism Local Community System Using LOD.
Proceedings of the 10th International Conference on Complex, 2016

Estimation of national tourism statistics based on Wi-Fi association log data.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

Practical approach for disease similarity calculation based on disease phenotype, etiology, and locational clues in disease names.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2015
Robust fingerprinting codes for database using non-adaptive group testing.
Int. J. Big Data Intell., 2015

Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information.
IEICE Trans. Inf. Syst., 2015

Sound collection and visualization system enabled participatory and opportunistic sensing approaches.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Evaluating the importance of personal information attributes using graph mining technique.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

Tradeoff Between the Price of Distributing a Database and Its Collusion Resistance Based on Concatenated Codes.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Gamification Effect of Collection System for Digital Photographs with Geographic Information which Utilizes Land Acquisition Game.
Proceedings of the Human-Computer Interaction: Interaction Technologies, 2015

The Effects of Criticism on Creative Ideation.
Proceedings of the 37th Annual Meeting of the Cognitive Science Society, 2015

A Rule-Based Approach for Detecting Location Leaks of Short Text Messages.
Proceedings of the Business Information Systems Workshops, 2015

A Prototype Decision Support System for Privacy-Service Trading.
Proceedings of the 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015, 2015

Relationship between Willingness to Share Photos and Preferred Level of Photo Blurring for Privacy Protection.
Proceedings of the ASE BigData & SocialInformatics 2015, 2015

Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Impacts of Tourist Accommodations as Temporal Shelter on Evacuee Overflow for the Reassignment of Shelters Jurisdiction.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Security and privacy in business networking.
Electron. Mark., 2014

Research on text data mining of hospital patient records within Electronic Medical Records.
Proceedings of the 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), 2014

Tag Detection for Preventing Unauthorized Face Image Processing.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Definition of Private Information for Image Sharing in Social Networking Services.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

A proposal of personal information trading platform (PIT): A fair trading between personal information and incentives.
Proceedings of the Fourth International Conference on Digital Information and Communication Technology and its Applicationsm DICTAP 2014, 2014

Modeling the Cost Structure of Identity Proofing.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

A k-anonymity method based on search engine query statistics for disaster impact statements.
Proceedings of the Ninth International Conference on Availability, 2014

A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure.
Proceedings of the Ninth International Conference on Availability, 2014

Visualization of Recovery Situation in Disaster Area by Using Web Reservation Data.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Incremental Single-Source Multi-Target A* Algorithm for LBS Based on Road Network Distance.
IEICE Trans. Inf. Syst., 2013

Shortest Path Finder with Light Materialized Path View for Location Based Services.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

A K-Anonymity Method Based on SEM (Search Engine Marketing) Price of Personal Information.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Effective Fingerprinting Codes for Database.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Robust Fingerprinting Codes for Database.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013

Coupons as Monetary Incentives in Participatory Sensing.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Fault- and disaster-resistant medical cloud system for various medical applications.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

Estimating the Value of Personal Information with SNS Utility.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Using Twitter's Mentions for Efficient Emergency Message Propagation.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Optimal Sequenced Route Query Algorithm Using Visited POI Graph.
Proceedings of the Web-Age Information Management - 13th International Conference, 2012

Distributed Auction for Self-Optimization in Wireless Cooperative Networks.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

An approach for short message resilience in disaster-stricken areas.
Proceedings of the 2012 International Conference on Information Networking, 2012

Sequenced Route Query in Road Network Distance Based on Incremental Euclidean Restriction.
Proceedings of the Database and Expert Systems Applications, 2012

Group Management System for Federated Identities with Flow Control of Membership Information by Subjects.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Aggregate Nearest Neighbor Search Methods Using SSMTA* Algorithm on Road-Network.
Proceedings of the Advances in Databases and Information Systems, 2012

2011
Isolation im Cloud-Computing und Mechanismen zum Schutz der Privatsphäre - Eignung von Mechanismen zum Schutz der Privatsphäre für die Trennung der Datenverarbeitung in Geschäftsprozessen.
Wirtschaftsinf., 2011

Interview mit Charley K. Watanabe zum Thema "Cloud Computing in Japan - Die Rolle der japanischen Regierung".
Wirtschaftsinf., 2011

Nachhaltiges Computing in Clouds.
Wirtschaftsinf., 2011

On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking.
J. Inf. Hiding Multim. Signal Process., 2011

Aspects of privacy for electronic health records.
Int. J. Medical Informatics, 2011

User consent acquisition system for Japanese Shibboleth-based academic federation (GakuNin).
Int. J. Grid Util. Comput., 2011

Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes.
Bus. Inf. Syst. Eng., 2011

Interview with Mr. Charley K. Watanabe on "Cloud Computing in Japan - The Role of the Japanese Government".
Bus. Inf. Syst. Eng., 2011

Sustainable Cloud Computing.
Bus. Inf. Syst. Eng., 2011

Single-Source Multi-Target A* Algorithm for POI Queries on Road Network.
Proceedings of the Web-Age Information Management, 2011

User Centric Privacy in Mobile Communication Scenarios.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

An Algorithm for k-Anonymity-Based Fingerprinting.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

A Proposal of "Identity Commons": Utilization of Life Log and ID Information for Resilient Social System.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

The Structure of Psychological Resistance and Incentives in Lifelog Disclosure: An Experimental Study with Smartphone Users.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A Proposal of "Identity Commons" for Service Creation using Communication Log - Position Paper.
Proceedings of the ICE-B 2011, 2011

Real-Time Monitoring of Moving Objects Using Frequently Used Routes.
Proceedings of the Database Systems for Advanced Applications, 2011

Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte).
it Inf. Technol., 2010

Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Attribute Aggregating System for Shibboleth Based Access Management Federation.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Fair Bandwidth Allocation with Distance Fairness Provisioning in Optical Burst Switching Networks.
Proceedings of the Global Communications Conference, 2010

User-controlled Privacy Protection with Attribute-filter Mechanism for a Federated SSO Environment Using Shibboleth.
Proceedings of the 3PGCIC 2010, 2010

2009
IT-Enabled Survey and Its Problems: Analyses of an Australian Internet Poll.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Leveraging PKI in SAML 2.0 Federation for Enhanced Discovery Service.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Privacy-aware access to Patient-controlled Personal Health Records in emergency situations.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

On Privacy-aware Delegation of Personal Data using Digital Watermarking.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking.
Proceedings of the ICE-B 2009, 2009

On Observable Delegation of Personal Data by Watermarking.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Management of information-credibility risk in an ICT society: A social implementation.
Internet Res., 2008

Cluster Analysis of E-Commerce Customer Profiles Based on Trust Perception.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

Website Credibility - A Proposal on an Evaluation Method for e-Commerce.
Proceedings of the ICE-B 2008, 2008

Trust perception in internet shopping: comparative study of customers in Japan and South Korea.
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008

2007
What keeps online customers repurchasing through the internet?
SIGecom Exch., 2007

Simple and Secure Authentication Escrow for Rights Trading Protocol.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Image-Identification Methods for Camera-Equipped Mobile Phones.
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007

A Fast, Robust Watermark Detection Scheme for Videos Captured on Camera Phones.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Critical Success Factors of Internet Shopping in Japan: Customer-Centric and Website-Centric Perspectives.
Proceedings of the ICE-B 2007, 2007

Critical Success Factors of Internet Shopping: The Case of Japan.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Theoretical model of purchase and repurchase in internet shopping: evidence from japanese online customers.
Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007

2006
Fast Watermark Detection Scheme from Camera-captured Images on Mobile Phones.
Int. J. Pattern Recognit. Artif. Intell., 2006

Efficient Content Location Algorithm for Content Distribution Networks based on Distributed Construction of Search Tree from Contents of Proximal Nodes.
Proceedings of the IASTED International Conference on Databases and Applications, 2006

2004
Fast watermark detection scheme for camera-equipped cellular phone.
Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia, 2004

New high-speed frame detection method: Side Trace Algorithm (STA) for i-appli on cellular phones to detect watermarks.
Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia, 2004

2000
Human walking animation based on foot reaction force in the three-dimensional virtual world.
Comput. Animat. Virtual Worlds, 2000

The Motion Generation of Pedestrians as Avatars and Crowds of People.
Proceedings of the Digital Cities, 2000

1998
Precipitation Nowcast with Artificial Neural Networks.
Proceedings of the Fifth International Conference on Neural Information Processing, 1998

1997
Numerical studies of resonance in a sinusoidally driven chaotic neuron model and its network.
Proceedings of International Conference on Neural Networks (ICNN'97), 1997

1996
Edge-based binocular stereopsis algorithm--a matching mechanism with probabilistic feedback.
Neural Networks, 1996

1995
Snowfall and rainfall forecasting from weather radar images with artificial neural networks.
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27, 1995

Controlling Chaos in Chaotic Neural Networks.
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27, 1995

1993
Neural Network Models for Image Inversion.
J. Robotics Mechatronics, 1993

Solving inverse problems in nonlinear PDEs by recurrent neural networks.
Proceedings of International Conference on Neural Networks (ICNN'88), San Francisco, CA, USA, March 28, 1993

1992
Relaxation neural network model for optimal binary representation of images and its implementation on a parallel computer.
Syst. Comput. Jpn., 1992

1990
Binary representation and intensity surface interpolation of the grey level image by relaxation neural network models.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990


  Loading...