Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest Editorial.. Intelligent Automation & Soft Computing, 2 (2): 93-94 (1996)Introduction., and . Appl. Intell., 22 (1): 7 (2005)Galaxy clusters at z~1 imaged by ALMA with the Sunyaev-Zel'dovich effect, , , , , , , , , and 8 other author(s). (2022)cite arxiv:2209.09503Comment: 26 pages, 13 figures, 8 tables, submitted to PASJ.Concurrent automata, database computers, and security: a "new" security paradigm for secure parallel processing.. NSPW, page 94-104. ACM, (1993)Classifying twitter data with Naïve Bayes Classifier., , , , and . GrC, page 294-299. IEEE Computer Society, (2012)Robust analysis on promotion duration for two competitive brands., and . J. Oper. Res. Soc., 59 (4): 548-555 (2008)Surface topographical characterization of silver-plated film on the wedge bondability of leaded IC packages., , , , , , , , and . Microelectron. Reliab., 43 (5): 803-809 (2003)On constructing minimum height B*-trees in optimal time., and . ACM Southeast Regional Conference, page 445-448. ACM, (1992)Content-based selective enhancement for streaming video., and . ICIP (2), page 977-980. IEEE, (2001)Systematic defect screening in controlled experiments using volume diagnosis., , , and . ITC, page 1-7. IEEE Computer Society, (2012)