Author of the publication

Computer Ethics Video Clips for University Students in Japan from 2003 until 2013.

, , , , , , , , , , , and . COMPSAC Workshops, page 96-101. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A polynomial-time algorithm for computing characteristic strings under a set of strings., , , and . Syst. Comput. Jpn., 26 (3): 30-38 (1995)An efficient procedure for maintaining materialized views on distributed database systems., , , and . Syst. Comput. Jpn., 31 (5): 86-96 (2000)Using coLinux to provide a linux environment on windows PC in public computer labs., , , and . SIGUCCS, page 221-224. ACM, (2006)On Designing Relational Database Schemes for Efficient Query Processing., , , and . ICCI, volume 497 of Lecture Notes in Computer Science, page 264-275. Springer, (1991)Diskless linux system with unionfs for an educational computer center., , , and . SIGUCCS, page 207-210. ACM, (2005)An Object-Oriented Database of Protein Structure Data., , and . ADB, volume 819 of Lecture Notes in Computer Science, page 336-350. Springer, (1994)On Deriving Specialization Constraints over Complex Objects., and . DASFAA, volume 4 of Advanced Database Research and Development Series, page 335-342. World Scientific, (1993)Implementation and Evaluation of Authorized Access LAN Sockets Using PPPoE., , , and . SAINT, page 20-25. IEEE Computer Society, (2002)Improving computer ethics video clips for higher education., , , , , , , , , and 1 other author(s). SIGUCCS, page 235-242. ACM, (2008)Polynomial-Time Algorithms for Computing Characteristic Strings., , , and . CPM, volume 807 of Lecture Notes in Computer Science, page 274-288. Springer, (1994)