Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flexible Method for Supporting OAuth 2.0 Based Security Profiles in Keycloak., , and . Open Identity Summit, volume P-325 of LNI, page 87-98. Gesellschaft für Informatik e.V., (2022)Learning State Recognition in Self-Paced E-Learning., , , , and . IEICE Trans. Inf. Syst., 100-D (2): 340-349 (2017)Inter-FPGA Routing for Partially Time-Multiplexing Inter-FPGA Signals on Multi-FPGA Systems with Various Topologies., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (12): 2572-2583 (2015)Hotspot Modeling of Hand-Machine Interaction Experiences from a Head-Mounted RGB-D Camera., , , and . IEICE Trans. Inf. Syst., 102-D (2): 319-330 (2019)Fast FPGA-Emulation-Based Simulation Environment for Custom Processors., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (12): 3464-3470 (2006)Siamese-structure Deep Neural Network Recognizing Changes in Facial Expression According to the Degree of Smiling., , , and . ICPR, page 4605-4612. IEEE, (2020)Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes., , , , and . Int. J. Inf. Sec., 20 (4): 461-473 (2021)SELinux Security Policy Configuration System with Higher Level Language., , and . J. Inf. Process., (2010)Domino Logic Synthesis System and its Applications., , , , and . J. Circuits Syst. Comput., 15 (2): 277-287 (2006)Content Provisioning for Ubiquitous Learning., , , , and . IEEE Pervasive Comput., 7 (4): 62-70 (2008)