Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Soramame: what you see is what you control access control user interface., , , and . CHIMIT, ACM, (2009)A design of usable and secure access-control APIs for mashup applications., , and . Digital Identity Management, page 31-34. ACM, (2009)Time Domain Crosstalk Characteristics between Single-Ended and Differential Lines., , , and . IEICE Trans. Commun., 90-B (6): 1305-1312 (2007)Verbalization Support for Motor Skill Using Form Drawing Tool Based on Skeleton Model., and . KES, volume 60 of Procedia Computer Science, page 1687-1696. Elsevier, (2015)Design of seamlessly and limitlessly expandable OXC and verification tests on its versatile applicability., , , and . JOCN, 12 (5): 99-108 (2020)Creating Various Styles of Animations Using Example-Based Filtering., , and . Computer Graphics International, page 312-317. IEEE Computer Society, (2003)Macaque monkeys show reversed ocular following responses to two-frame-motion stimulus presented with inter-stimulus intervals., , , , and . J. Comput. Neurosci., 49 (3): 273-282 (2021)Mixed material point method formulation, stabilization, and validation for a unified analysis of free-surface and seepage flow., , , and . CoRR, (2024)Filter-based access control model: exploring a more usable database management., , , , and . CHIMIT, page 3. ACM, (2010)Verification of High Performance and Wide Applicability of Seamlessly Expandable and Limitless OXC., , , and . OFC, page 1-3. IEEE, (2019)