Author of the publication

Computer Ethics Video Clips for University Students in Japan from 2003 until 2013.

, , , , , , , , , , , and . COMPSAC Workshops, page 96-101. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of the Loop Restructuring Feature for the MIRAI Parallelizing Complier., , , , and . PDPTA, page 1134-1140. CSREA Press, (2003)An Automatic Parallelizing Compiler MIRAI with Data Distribution Function and its Runtime Support System Fagus for Distributed Memory Architecture., , , , and . PDPTA, page 1451-1457. CSREA Press, (2002)A Histogram and GLCM-based Approach for Image Copy-Move Forgery Detection., and . J. Inf. Process., (2019)An Extended Benchmark System of Word Embedding Methods for Vulnerability Detection., , and . ICFNDS, page 54:1-54:8. ACM, (2020)A Turing Machine-Based Model for Computer Forensic Reconstruction., , and . SSIRI, page 289-290. IEEE Computer Society, (2009)IP Multicast Video Broadcasting System with User Authentication., , , and . ICME, page 1186-1189. IEEE Computer Society, (2005)An Agent-Based Approach to Evaluation of Workflow Support Systems., , , , , , and . C5, page 51-55. IEEE Computer Society, (2010)Development of Intellectual Network Forensic System LIFT against Targeted Attacks., , , , , , , and . CyberSec, page 16-21. IEEE Computer Society, (2015)Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be., , and . ICITST, page 1-6. IEEE, (2020)Implementation of an extended FIDO2 authenticator using Attribute-Based Signatures., , , and . QRS Companion, page 825-832. IEEE, (2021)