Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigative Report Writing Support System for Effective Knowledge Construction from the Web., , and . IEICE Trans. Inf. Syst., 101-D (4): 874-883 (2018)Tsunami Evacuation Drill System Focusing on Mobile Devices., and . Int. J. Interact. Mob. Technol., 16 (6): 4-20 (March 2022)An order searching algorithm of extensible hashing., and . Int. J. Comput. Math., 63 (3-4): 179-201 (1997)A Trie Compaction Algorithm for a Large Set of Keys., , , and . IEEE Trans. Knowl. Data Eng., 8 (3): 476-491 (1996)Preventing Web Page Plagiarism in Investigative Report Writing., , and . ICADIWT, volume 288 of Frontiers in Artificial Intelligence and Applications, page 162-171. IOS Press, (2016)Compression of Search Range of VP-Tree for Multimedia Data Retrieval Applications., , and . DCC, page 403. IEEE Computer Society, (2012)Robust feature extraction in a variety of input devices on the basis of ETSI standard DSR front-end., , , , and . INTERSPEECH, page 2221-2224. ISCA, (2002)Shelter GO: multiplayer location-based game to promote knowing shelters for emergency evacuation., and . Res. Pract. Technol. Enhanc. Learn., (March 2024)Two improved access methods on compact binary (CB) trees., , , and . Inf. Process. Manag., 36 (3): 379-399 (2000)Instance Search Experiment for TRECVID 2010., and . TRECVID, National Institute of Standards and Technology (NIST), (2010)