Остановите войну!
for scientists:
default search action
Yasushi Hirano
- > Home > Persons > Yasushi Hirano
Publications
- 2018
- [c31]Tamotsu Kawamura, Masaru Fukushi, Yasushi Hirano, Yusuke Fujita, Yoshihiko Hamamoto:
A Network-Based Event Detection Module Using NTP for Cyber Attacks on IoT. CANDAR Workshops 2018: 86-91 - 2010
- [j4]Yuichi Koyama, Yuichi Sawamoto, Yasushi Hirano, Shoji Kajita, Kenji Mase, Tomio Suzuki, Kimiko Katsuyama, Kazunobu Yamauchi:
A multi-modal dialogue analysis method for medical interviews based on design of interaction corpus. Pers. Ubiquitous Comput. 14(8): 767-778 (2010) - [c19]Shohei Yoshioka, Takuya Maekawa, Yasushi Hirano, Shoji Kajita, Kenji Mase:
Interactive story creation for knowledge acquisition. HRI 2010: 131-132 - [c18]Takuya Kitade, Yasushi Hirano, Shoji Kajita, Kenji Mase:
Personalizing Public and Privacy-Free Sensing Information with a Personal Digital Assistant. IPMU (2) 2010: 673-679 - 2009
- [j3]Kazuto Kuzuu, Yasushi Hirano, Kenji Mase, Toyohide Watanabe:
Construction of a Shared Terminal System by LDAP-Smart Card Authentication Cooperation. J. Networks 4(8): 711-719 (2009) - [c17]Shohei Yoshioka, Yasushi Hirano, Shoji Kajita, Kenji Mase, Takuya Maekawa:
Semi-automatic Story Creation System in Ubiquitous Sensor Environment. AmI 2009: 106-111 - 2008
- [c16]Mehrdad Panahpour Tehrani, Kenta Niwa, Norishige Fukushima, Yasushi Hirano, Toshiaki Fujii, Masayuki Tanimoto, Kazuya Takeda, Kenji Mase, Akio Ishikawa, Shigeyuki Sakazawa, Atsushi Koike:
3DAV integrated system featuring arbitrary listening-point and viewpoint generation. MMSP 2008: 855-860 - [c15]Kazuto Kuzuu, Yasushi Hirano, Kenji Mase, Toyohide Watanabe:
Application to a Shared Terminal of a Roaming User Profile Set Up through LDAP-Smart Card Authentication Cooperation. SECRYPT 2008: 29-34 - 2007
- [c14]Yuichi Sawamoto, Yuichi Koyama, Yasushi Hirano, Shoji Kajita, Kenji Mase, Kimiko Katsuyama, Kazunobu Yamauchi:
Extraction of important interactions in medical interviewsusing nonverbal information. ICMI 2007: 82-85 - [c13]Tomoyuki Morita, Kenji Mase, Yasushi Hirano, Shoji Kajita:
Reciprocal attentive communication in remote meeting with a humanoid robot. ICMI 2007: 228-235 - [c12]Takahiko Mase, Yasushi Hirano, Shoji Kajita, Kenji Mase:
Improving Accuracy of WLAN-Based Location Estimation by Recursive Estimation. ISWC 2007: 117-118 - [c11]Hisashi Naito, Shoji Kajita, Yasushi Hirano, Kenji Mase:
Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service. SAINT Workshops 2007: 27 - 2006
- [c10]Mehrdad Panahpour Tehrani, Yasushi Hirano, Toshiaki Fujii, Shoji Kajita, Kazuya Takeda, Kenji Mase:
Arbitrary Listening-Point Generation Using Sub-Band Representation of Sound Wave Ray-Space. ICASSP (5) 2006: 541-544 - [c9]Kosuke Akune, Kenji Mase, Yasushi Hirano, Shoji Kajita:
Discussion Support System for Video-oriented Sports Meetings. ICICIC (2) 2006: 561-564 - [c8]Kenji Matsuzawa, Kenji Mase, Yasushi Hirano, Shoji Kajita:
Experience Map Creation by Virtual WLAN Location Estimation. ISWC 2006: 117-118 - 2005
- [c7]Mehrdad Panahpour Tehrani, Yasushi Hirano, Toshiaki Fujii, Shoji Kajita, Kazuya Takeda, Masayuki Tanimoto, Kenji Mase:
The sound wave ray-space. ICME 2005: 1118-1121 - [c6]Tomoyuki Morita, Yasushi Hirano, Yasuyuki Sumi, Shoji Kajita, Kenji Mase:
A pattern mining method for interpretation of interaction. ICMI 2005: 267-273
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 18:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint