Masayoshi Aritsugi

Orcid: 0000-0003-0861-849X

According to our database1, Masayoshi Aritsugi authored at least 115 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Noise-free sampling with majority framework for an imbalanced classification problem.
Knowl. Inf. Syst., July, 2024

Improving the Classification of Unexposed Potsherd Cavities by Means of Preprocessing.
Inf., May, 2024

Anomaly detection against mimicry attacks based on time decay modelling.
Int. J. Grid Util. Comput., 2024

Meta-learning for vessel time series data imputation method recommendation.
Expert Syst. Appl., 2024

Semi-automated Disaster Image Tagging While Protecting Privacy: A Case Study.
Proceedings of the Database and Expert Systems Applications, 2024

A Q-Learning Hybrid BRKGA Applied to the Knapsack Problem with Forfeits.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

A Hybrid Approach with BRKGA and Data Mining for the Early/Tardy Scheduling Problem.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

Efficient Hyperparameter Optimization Using Deep Q-Network and BRKGA.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

Optimization of Node Reduction Using BRKGA for GNN-Based Traffic Speed Forecasting.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

Towards an Edge-Fog-Cloud Serverless Continuum for IoT Data Processing Pipeline.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2024

2023
Monitoring and Control Framework for IoT, Implemented for Smart Agriculture.
Sensors, March, 2023

A Quantum Tanimoto Coefficient Fidelity for Entanglement Measurement.
IEEE CAA J. Autom. Sinica, 2023

A Population-Based Hybrid Approach for Hyperparameter Optimization of Neural Networks.
IEEE Access, 2023

Not Seeing is a Flower: Experiences and Lessons Learned from Making IoT Platforms for Small-Scale Farms in Japan.
Proceedings of the 13th International Conference on the Internet of Things, 2023

ImputAnom: Anomaly Detection Framework Using Imputation Methods for Univariate Time Series.
Proceedings of the Information Integration and Web Intelligence, 2023

Age Classification Based on Voice Using Mel-Spectrogram and MFCC.
Proceedings of the 24th International Conference on Digital Signal Processing, 2023

Text Augmentation Based on Integrated Gradients Attribute Score for Aspect-based Sentiment Analysis.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2023

Automatic Rule Definition for Pattern-Based Text Mining.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2023

2022
Smart agricultural monitoring system: a practical design approach.
Proceedings of the 12th International Conference on the Internet of Things, 2022

An Incremental Learning Algorithm on Imbalanced Data for Network Intrusion Detection Systems.
Proceedings of the 10th International Conference on Computer and Communications Management, 2022

A conjugated evolutionary algorithm for hyperparameter optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

Two-Stage Sampling: A Framework for Imbalanced Classification With Overlapped Classes.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Making Use of More Reviews Skillfully in Explaninable Recommendation Gerneration.
J. Data Intell., 2021

Word reordering on multiple pivots for the Japanese and Indonesian language pair.
Mach. Transl., 2021

Editorial on Special Issue: "Applications of Intelligent and Fuzzy Theory in Data Science".
Int. J. Fuzzy Syst., 2021

Extracting Arguments Based on User Decisions in App Reviews.
IEEE Access, 2021

An Automatic Convolutional Neural Network Optimization Using a Diversity-Guided Genetic Algorithm.
IEEE Access, 2021

T-DFNN: An Incremental Learning Algorithm for Intrusion Detection Systems.
IEEE Access, 2021

To Optimize, or Not to Optimize, That Is the Question: TelU-KU Models for WMT21 Large-Scale Multilingual Machine Translation.
Proceedings of the Sixth Conference on Machine Translation, 2021

Anomaly detection for sensor data of semiconductor manufacturing equipment using a GAN.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

2020
Robustness of Word and Character N-gram Combinations in Detecting Deceptive and Truthful Opinions.
ACM J. Data Inf. Qual., 2020

Efficient feature extraction model for validation performance improvement of duplicate bug report detection in software bug triage systems.
Inf. Softw. Technol., 2020

Text Detection on Roughly Placed Books by Leveraging a Learning-based Model Trained with Another Domain Data.
CoRR, 2020

Making Use of Reviews for Good Explainable Recommendation.
Proceedings of the iiWAS '20: The 22nd International Conference on Information Integration and Web-based Applications & Services, Virtual Event / Chiang Mai, Thailand, November 30, 2020

Characterizing User Decision based on Argumentative Reviews.
Proceedings of the 7th IEEE/ACM International Conference on Big Data Computing, 2020

Effects of the Number of Hyperparameters on the Performance of GA-CNN.
Proceedings of the 7th IEEE/ACM International Conference on Big Data Computing, 2020

2019
Vehicle Vibration Error Compensation on IMU-accelerometer Sensor Using Adaptive Filter and Low-pass Filter Approaches.
J. Inf. Process., 2019

Weber Centralized Binary Fusion Descriptor for Fingerprint Liveness Detection.
IEICE Trans. Inf. Syst., 2019

DBMS-KU Interpolation for WMT19 News Translation Task.
Proceedings of the Fourth Conference on Machine Translation, 2019

Preventing Data Popularity Concentration in HDFS based Cloud Storage.
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, 2019

DBMS-KU at SemEval-2019 Task 9: Exploring Machine Learning Approaches in Classifying Text as Suggestion or Non-Suggestion.
Proceedings of the 13th International Workshop on Semantic Evaluation, 2019

DBMS-KU Approach for Author Profiling and Deception Detection in Arabic.
Proceedings of the Working Notes of FIRE 2019, 2019

Text Detection on Books Using CNN Trained with Another Domain Data.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

How Important Are Logs of Ordinary Operations? Empirical Investigation of Anomaly Detection.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
An Adaptive Parallel Processing Strategy for Complex Event Processing Systems over Data Streams in Wireless Sensor Networks.
Sensors, 2018

Real-time deep satellite image quality assessment.
J. Real Time Image Process., 2018

Avoiding Performance Impacts by Re-Replication Workload Shifting in HDFS Based Cloud Storage.
IEICE Trans. Inf. Syst., 2018

Deblocking Artifact of Satellite Image Based on Adaptive Soft-Threshold Anisotropic Filter Using Wavelet.
IEICE Trans. Inf. Syst., 2018

A Robust Algorithm for Deadline Constrained Scheduling in IaaS Cloud Environment.
IEICE Trans. Inf. Syst., 2018

An adaptive parallel processing strategy in complex event processing systems over data streams.
CoRR, 2018

PRTuner: Proactive-Reactive Re-Replication Tuning in HDFS-based Cloud Data Center.
IEEE Cloud Comput., 2018

A transparent approach to performance analysis and comparison of infrastructure as a service providers.
Comput. Electr. Eng., 2018

Exploiting Function Words Feature in Classifying Deceptive and Truthful Reviews.
Proceedings of the 2018 Thirteenth International Conference on Digital Information Management (ICDIM), 2018

Deep Learning Based Sentiment Classification in Social Network Services Datasets.
Proceedings of the 2018 IEEE International Conference on Big Data, 2018

2017
Assignment strategies for ground truths in the crowdsourcing of labeling tasks.
J. Syst. Softw., 2017

Proactive Re-replication Strategy in HDFS based Cloud Data Center.
Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

Robust Deadline-Constrained Resource Provisioning and Workflow Scheduling Algorithm for Handling Performance Uncertainty in IaaS Clouds.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

Spell corrector to social media datasets in message filtering systems.
Proceedings of the Twelfth International Conference on Digital Information Management, 2017

Application of k-Step Random Walk Paths to Graph Kernel for Automatic Patent Classification.
Proceedings of the Digital Libraries: Data, Information, and Knowledge for Digital Lives, 2017

Combining Word and Character N-Grams for Detecting Deceptive Opinions.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Efficient processing of multiple nested event pattern queries over multi-dimensional event streams based on a triaxial hierarchical model.
Artif. Intell. Medicine, 2016

Fragment retransmission scheme with enhanced collision avoidance for energy-efficient IEEE 802.11 WLANs.
Proceedings of the 2016 Wireless Days, 2016

TCloud: a transparent framework for public cloud service comparison.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

Applying a tendency to be well retweeted to false information detection.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

2015
A feasibility study of POI recommendation based on bursts of visits.
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015

A Case Study of IaaS and SaaS in a Public Cloud.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

How Many Ground Truths Should We Insert? Having Good Quality of Labeling Tasks in Crowdsourcing.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Can We Detect Bug Report Duplication with Unfinished Bug Reports?
Proceedings of the 2015 Asia-Pacific Software Engineering Conference, 2015

2014
Econo-ESA Reduction Scheme and the Impact of its Index Matrix Density.
Proceedings of the 18th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2014

A User Sensitive Privacy-preserving Location Sharing System in Mobile Social Networks.
Proceedings of the 18th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2014

Reducing collisions of a TCP stream on multi-hop wireless networks.
Proceedings of the Seventh International Conference on Mobile Computing and Ubiquitous Networking, 2014

Energy Efficient Backoff-Free Fragment Retransmission Fragmentation Scheme for IEEE 802.11 WLAN.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Performance Evaluation of Probabilistic Relay in Ad Hoc on-demand Distance Vector and Ad Hoc on-demand multipath Distance Vector under Highly Dynamic Environments.
J. Comput. Sci., 2013

A Preliminary Study of the Number of Votes under Majority Rule in Crowdsourcing.
Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, 2013

Nested Pattern Queries Processing Optimization over Multi-dimensional Event Streams.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
Economical and Fault-Tolerant Load Balancing in Distributed Stream Processing Systems.
IEICE Trans. Inf. Syst., 2012

Test collection recycling for semantic text similarity.
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS '12, Bali, Indonesia, 2012

An Experiment on Performing DSTM Applications in a Public Cloud.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

Performance Evaluation of AODV and AOMDV with Probabilistic Relay in VANET Environments.
Proceedings of the Third International Conference on Networking and Computing, 2012

2011
Design and implementation of a system for finding appropriate tags to photos in Flickr from Web browsing behaviour.
Int. J. Web Grid Serv., 2011

A Web Browsing Behavior Recording System.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2011

Annotations on access controls in wikis: a proposal.
Proceedings of the iiWAS'2011, 2011

2010
Redundant TC Message Senders in OLSR.
IEICE Trans. Inf. Syst., 2010

Where to Crawl Next for Focused Crawlers.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2010

Exploitation of backup nodes for reducing recovery cost in high availability stream processing systems.
Proceedings of the Fourteenth International Database Engineering and Applications Symposium (IDEAS 2010), 2010

Tag Recommendation for Flickr Using Web Browsing Behavior.
Proceedings of the Computational Science and Its Applications, 2010

Improving a News Recommendation System in Adapting to Interests of a User with Storage of a Constant Size.
Proceedings of the Advances in Web Technologies and Applications, 2010

2009
A Replica Management Protocol in a Binary Balanced Tree Structure-Based P2P Network.
J. Comput., 2009

Introducing Group Participation Support into P2P Web Caching Systems.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Extracting user preference from Web browsing behaviour for spam filtering.
Int. J. Adv. Intell. Paradigms, 2008

A Spam Filtering Method Learning from Web Browsing Behavior.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

2007
A virtual type for a multiple-type object and its implementation.
Syst. Comput. Jpn., 2007

An Index Allocation Method for Data Access over Multiple Wireless Broadcast Channels.
Inf. Media Technol., 2007

Applying Privacy Preserving Count Aggregate Queries to <i>k</i> -Classification.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

An Implementation Design of a Fine-Grained Database Access Control Policy Consistency Checking Mechanism.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

2006
Array-based Cache Conscious Trees.
Inf. Media Technol., 2006

Extended Virtual Type for a Multiple-Type Object with Repeating Types.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

An Air Index for Data Access over Multiple Wireless Broadcast Channels.
Proceedings of the 22nd International Conference on Data Engineering, 2006

An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

2005
Parallel Image Convolution Processing with Replicas in a Network of Workstations.
IEICE Trans. Inf. Syst., 2005

On Applying an Image Processing Technique to Detecting Spams.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2003
Accessee Controlled Type Selection for a Multiple-Type Object.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

2002
Performance Evaluation of Combining Data Migration and Method Migration in Object Database Environments.
Proceedings of the Database Technologies 2002, 2002

2001
Several partitioning strategies for parallel image convolution in a network of heterogeneous workstations.
Parallel Comput., 2001

2000
Multiple-type objects in an enhanced C++ persistent programming language.
Softw. Pract. Exp., 2000

1998
Implementing Class Library and Index for Managing Spatio-Temporal Data.
Proceedings of the Advances in Database Technologies, 1998

Implementing Time-Interval Class for Managing Temporal Data.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

1997
Manipulation of Image Objects and Their Versions under CORBA Environment.
Proceedings of the Eighth International Workshop on Database and Expert Systems Applications, 1997

An Approach to Spatio-Temporal Queries - Interval-Based Contents Representation of Images.
Proceedings of the Database and Expert Systems Applications, 8th International Conference, 1997

Interval-Based Representation of Spatio-Temporal Concepts.
Proceedings of the Advanced Information Systems Engineering, 1997

1996
Multimedia Applications using a Database Programming Language-INADA.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1996

Integrating Parallel Functions into the Manipulation for Distributed Persistent Objects.
Proceedings of the COMPSAC '96, 1996

1995
Several Implementations of Persistent Pointers in a Memory-Mapped I/O Environment
Proceedings of the Database and Expert Systems Applications, 1995

Design and Implementation of Multiple Type Objects in a Persistent Programming Language.
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995


  Loading...