Author of the publication

Journalism in Power Relations and Pierre Bourdieu’s Concept of “Field”: A Case Study of the Coverage of the 1999 Group Bullying Murder Case in Tochigi Prefecture

. Keio Communication Review, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Every Normal Toeplitz Matrix is Either of Type I or of Type II.. SIAM J. Matrix Anal. Appl., 17 (4): 998-1006 (1996)A 28 nm Embedded Split-Gate MONOS (SG-MONOS) Flash Macro for Automotive Achieving 6.4 GB/s Read Throughput by 200 MHz No-Wait Read Operation and 2.0 MB/s Write Throughput at Tj of 170°C., , , , , , , and . IEEE J. Solid State Circuits, 51 (1): 213-221 (2016)Population and Evolutionary Dynamics based on Predator-Prey Relationships in a 3D Physical Simulation., , , and . Artif. Life, 22 (2): 226-240 (2016)Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting., , , , , , and . IMACC, volume 7089 of Lecture Notes in Computer Science, page 190-209. Springer, (2011)Journalism in Power Relations and Pierre Bourdieu’s Concept of “Field”: A Case Study of the Coverage of the 1999 Group Bullying Murder Case in Tochigi Prefecture. Keio Communication Review, (2006)A key pre-distribution scheme for secure sensor networks using probability density function of node deployment., , , and . SASN, page 69-75. ACM, (2005)Semantic Analysis Using GloVe for Onomatopoeia in Cosmetics Review., , and . IEEM, page 439-443. IEEE, (2022)Evaluation of Sense of Self-agency and Self-ownership During Mouse Operation Using Gaze and EEG., , and . IEEM, page 1367-1371. IEEE, (2021)Proposal of an Onomatopoeia Feature Table Using Cosmetic Reviews., , and . IEEM, page 1072-1076. IEEE, (2021)A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols., , , , , and . ISITA, page 315-319. IEEE, (2016)