Hiroshi Maruyama
Orcid: 0000-0001-6597-0436
According to our database1,
Hiroshi Maruyama
authored at least 54 papers
between 1984 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
1985
1990
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
9
10
1
1
1
1
1
2
1
1
1
1
2
1
1
1
1
1
1
1
1
3
9
1
1
2
2
1
1
2
1
3
1
1
1
2
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Blend AutoAugment: Automatic Data Augmentation for Image Classification Using Linear Blending.
IEEE Access, 2024
Does In-Bed Airflow to the Feet Improve Postural Balance After Waking?: Aiming to Reduce Fatigue.
Proceedings of the 13th IEEE Global Conference on Consumer Electronics, 2024
2023
Virtual Human Generative Model: Masked Modeling Approach for Learning Human Characteristics.
CoRR, 2023
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
2022
Teaching support cockpit: Real-time avatarization for learning-activity logs with communication function.
Proceedings of the 12th International Congress on Advanced Applied Informatics, 2022
2021
Proceedings of the 28th Asia-Pacific Software Engineering Conference Workshops, 2021
2020
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020
2019
NII Shonan Meet. Rep., 2019
2018
Proceedings of the International Workshop on Evidence-based Security and Privacy in the Wild and the 1st International Workshop on Machine Learning Systems Engineering co-located with 25th Asia-Pacific Software Engineering Conference (APSEC 2018), 2018
2016
J. Reliab. Intell. Environ., 2016
2015
Systems Resilience – Bridging the Gap Between Social and Mathematical (NII Shonan Meeting 2015-3).
NII Shonan Meet. Rep., 2015
A Novel Mental State Model of Social Perception of Brand Crisis from an Entertainment Perspective.
Proceedings of the Social Computing, Behavioral-Cultural Modeling, and Prediction, 2015
2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems.
Proceedings of the Information and Communication Technology, 2014
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014
Perception-Based Resilience: Accounting for the Impact of Human Perception on Resilience Thinking.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014
2013
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013
Proceedings of the IEEE Global Engineering Education Conference, 2013
A method for evaluating project management competency acquired from role-play training.
Proceedings of the IEEE Global Engineering Education Conference, 2013
Cyber security problem based on Multi-Objective Distributed Constraint Optimization technique.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013
ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Integrated Environment for Scenario Development, Exercise Implements and Evaluation for Role-Play Training.
Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, 2012
2011
Direct metallographic analysis of an iron meteorite using hard x-ray photoelectron emission microscopy.
IBM J. Res. Dev., 2011
2009
Analysis of Learners' Behavior in Role-Play Training for Project Management Education.
Proceedings of the 9th IEEE International Conference on Advanced Learning Technologies, 2009
2008
Proceedings of the Knowledge-Based Software Engineering, 2008
Proceedings of the Service Availability, 5th International Service Availability Symposium, 2008
2007
Proceedings of the Test and Analysis of Web Services, 2007
2006
Special issue: Web service security.
Comput. Syst. Sci. Eng., 2006
Proceedings of the Knowledge-Based Software Engineering, 2006
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
Proceedings of the Computer Security, 2006
2005
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005
2003
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003
2002
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002
Proceedings of the 24th International Conference on Software Engineering, 2002
2001
Proceedings of the 2001 Symposium on Applications and the Internet (SAINT 2001), 2001
2000
Syst. Comput. Jpn., 2000
1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
Proceedings of the Fifth International Conference on Document Analysis and Recognition, 1999
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999
1997
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997
1995
Proceedings of the 1995 International Conference on Acoustics, 1995
1994
Proceedings of the 15th International Conference on Computational Linguistics, 1994
1992
Proceedings of the Sixteenth Annual International Computer Software and Applications Conference, 1992
Proceedings of the 14th International Conference on Computational Linguistics, 1992
1990
Proceedings of the 13th International Conference on Computational Linguistics, 1990
Proceedings of the 28th Annual Meeting of the Association for Computational Linguistics, 1990
1984