Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An order searching algorithm of extensible hashing., and . Int. J. Comput. Math., 63 (3-4): 179-201 (1997)A Trie Compaction Algorithm for a Large Set of Keys., , , and . IEEE Trans. Knowl. Data Eng., 8 (3): 476-491 (1996)Tsunami Evacuation Drill System Focusing on Mobile Devices., and . Int. J. Interact. Mob. Technol., 16 (6): 4-20 (March 2022)Investigative Report Writing Support System for Effective Knowledge Construction from the Web., , and . IEICE Trans. Inf. Syst., 101-D (4): 874-883 (2018)Shelter GO: multiplayer location-based game to promote knowing shelters for emergency evacuation., and . Res. Pract. Technol. Enhanc. Learn., (March 2024)Robust feature extraction in a variety of input devices on the basis of ETSI standard DSR front-end., , , , and . INTERSPEECH, page 2221-2224. ISCA, (2002)Preventing Web Page Plagiarism in Investigative Report Writing., , and . ICADIWT, volume 288 of Frontiers in Artificial Intelligence and Applications, page 162-171. IOS Press, (2016)Compression of Search Range of VP-Tree for Multimedia Data Retrieval Applications., , and . DCC, page 403. IEEE Computer Society, (2012)Efficient multi-attribute pattern matching., , , and . Int. J. Comput. Math., 66 (1-2): 21-38 (1998)Dimensionality reduction using non-negative matrix factorization for information retrieval., , , and . SMC, page 960-965. IEEE, (2001)