default search action
Masaaki Hashimoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j6]Shuntaro Ito, Masaaki Hashimoto, Yoshihiro Taguchi:
Development of a Robust Autofluorescence Lifetime Sensing Method for Use in an Endoscopic Application. Sensors 20(7): 1847 (2020)
2010 – 2019
- 2018
- [j5]Masaaki Hashimoto, Yoshihiro Taguchi:
Motion Tracking System for Robust Non-Contact Blood Perfusion Sensor. Sensors 18(1): 277 (2018) - 2014
- [j4]Masanobu Umeda, Keiichi Katamine, Keiichi Ishibashi, Masaaki Hashimoto, Takaichi Yoshida:
Motivation Process Formalization and Its Application to Education Improvement for the Personal Software Process Course. IEICE Trans. Inf. Syst. 97-D(5): 1127-1138 (2014) - 2012
- [c20]Keiichi Ishibashi, Masaaki Hashimoto, Masanobu Umeda, Keiichi Katamine, Takaichi Yoshida, Yoshihiro Akiyama:
A Preliminary Study on Formalization of Motivation Process in Personal Software Process Course. JCKBSE 2012: 128-137 - 2010
- [j3]Shouzo Hori, Takako Nakatani, Keiichi Katamine, Naoyasu Ubayashi, Masaaki Hashimoto:
Project Management Patterns to Prevent Schedule Delay Caused by Requirement Elicitation. IEICE Trans. Inf. Syst. 93-D(4): 745-753 (2010) - [j2]Takako Nakatani, Shouzo Hori, Naoyasu Ubayashi, Keiichi Katamine, Masaaki Hashimoto:
A Case Study of Requirements Elicitation Process with Changes. IEICE Trans. Inf. Syst. 93-D(8): 2182-2189 (2010)
2000 – 2009
- 2009
- [c19]Shouzo Hori, Takako Nakatani, Keiichi Katamine, Naoyasu Ubayashi, Masaaki Hashimoto:
Project Management Patterns to Prevent Schedule Delay Caused by Requirements Changes - Empirical Study on a Successful Project. ICSOFT (1) 2009: 115-120 - [c18]Takako Nakatani, Shouzo Hori, Michio Tsuda, Mari Inoki, Keiichi Katamine, Masaaki Hashimoto:
Towards a Strategic Requirements Elicitation - A Proposal of the PRINCE Model. ICSOFT (1) 2009: 145-150 - 2008
- [c17]Keiichi Katamine, Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Naoyasu Ubayashi, Takako Nakatani:
A Conceptual Model for Analysis Method of Extracting Unexpected Obstacles of Embedded Systems. JCKBSE 2008: 22-31 - [c16]Keiichi Ishibashi, Masaaki Hashimoto, Keiichi Katamine, Ryoma Shiratsuchi, Keita Asaine, Takako Nakatani, Naoyasu Ubayashi, Yoshihiro Akiyama:
A Discussion on Domain Modeling in an Example of Motivation-Based Human Resource Management. JCKBSE 2008: 32-41 - [c15]Takako Nakatani, Shouzo Hori, Naoyasu Ubayashi, Keiichi Katamine, Masaaki Hashimoto:
A Case Study: Requirements Elicitation Processes throughout a Project. RE 2008: 241-246 - 2007
- [c14]Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Keiichi Katamine, Naoyasu Ubayashi, Takako Nakatani:
Enhancing the ESIM (Embedded Systems Improving Method) by Combining Information Flow Diagram with Analysis Matrix for Efficient Analysis of Unexpected Obstacles in Embedded Software. APSEC 2007: 326-333 - [c13]Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Keiichi Katamine, Naoyasu Ubayashi, Takako Nakatani:
A Suggestion for Analysis of Unexpected Obstacles in Embedded System. HCI (8) 2007: 755-768 - 2006
- [c12]Hiroshi Nagasawa, Isao Nagasawa, Osamu Takata, Masanobu Umeda, Masaaki Hashimoto, Chiyuki Takizawa:
Knowledge Modeling for Operation Management Support of a Distribution Center. CIT 2006: 269 - [c11]Toshiro Mise, Yasufumi Shinyashiki, Takako Nakatani, Naoyasu Ubayashi, Keiichi Katamine, Masaaki Hashimoto:
A Method for Extracting Unexpected Scenarios of Embedded Systems. JCKBSE 2006: 41-50 - [c10]Hidehiro Kametani, Yasufumi Shinyashiki, Toshiro Mise, Masaaki Hashimoto, Naoyasu Ubayashi, Keiichi Katamine, Takako Nakatani:
Information Flow Diagram and Analysis Method for Unexpected Obstacle Specification of Embedded Software. JCKBSE 2006: 115-124 - 2005
- [c9]Toshiro Mise, Masaaki Hashimoto, Keiichi Katamine, Yasufumi Shinyashiki, Naoyasu Ubayashi, Takako Nakatani:
An Analysis Method with Failure Scenario Matrix for Specifying Unexpected Obstacles in Embedded Systems. APSEC 2005: 447-456 - [c8]Masanobu Umeda, Keiichi Katamine, Isao Nagasawa, Masaaki Hashimoto, Osamu Takata:
Multi-threading Inside Prolog for Knowledge-Based Enterprise Applications. INAP 2005: 200-214 - 2004
- [j1]Keiichi Katamine, Masanobu Umeda, Isao Nagasawa, Masaaki Hashimoto:
Integrated Development Environment for Knowledge-Based Systems and Its Practical Application. IEICE Trans. Inf. Syst. 87-D(4): 877-885 (2004) - 2000
- [c7]Lukman Efendy, Masaaki Hashimoto, Toyohiko Hirota:
Adoption of Structure Clash Detection Method for Architectural CAD System Generation. ISMSE 2000: 237-244
1990 – 1999
- 1996
- [c6]Masaaki Hashimoto, Toyohiko Hirota, Isao Nagasawa, Keiichi Katamine, Yoshiaki Tegoshi:
A Domain-Specific Conceptual Model in Building Design. IEA/AIE 1996: 71-76 - 1994
- [c5]Toyohiko Hirota, M. Tohki, C. Michael Overstreet, Masaaki Hashimoto, Robert Cherinka:
An approach to predict software maintenance cost based on ripple complexity. APSEC 1994: 439-444 - 1992
- [c4]Kazuhisa Yokota, Masaaki Hashimoto, Masakazu Sato:
An Experiment on Reusing Program Specifications Described with Conceptual Data Model- and Dependency Constraint-Based Language. ICCI 1992: 350-354 - [c3]Masakazu Sato, Masaaki Hashimoto:
A Constraint Satisfaction System on the Entity and Relationship Model. SEKE 1992: 503-510 - 1990
- [c2]Masaaki Hashimoto, Katsumi Okamoto:
A set and mapping-based detection and solution method for structure clash between program input and output data. COMPSAC 1990: 629-638 - [c1]Katsumi Okamoto, Masaaki Hashimoto:
On Real-Time Program Specification Description with a Data Model-Based Language. ICCI 1990: 206-215
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint