Noboru Sonehara
According to our database1,
Noboru Sonehara
authored at least 112 papers
between 1990 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Time Related Information Description of Business Hours of Clinics for Regional RDF Data.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023
2019
IEICE Trans. Inf. Syst., 2019
2018
Resource propagation algorithm considering predicates to complement knowledge bases in linked data.
Int. J. Space Based Situated Comput., 2018
Determinants of Personal Health Information Disclosure: A Case of Mobile Application.
Int. J. Softw. Innov., 2018
2017
J. Robotics Netw. Artif. Life, 2017
Privacy Disclosure Adaptation for Trading between Personal Attributes and Incentives.
J. Inf. Process., 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the IEEE 6th Global Conference on Consumer Electronics, 2017
On-Demand Barrier-Free Street View System Using Sensor Information from General-Purpose Wheelchair Users.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Differential Diagnosis Listing as Relevance Feedback: An Essential User Interface for Clinical Decision Support Systems.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017
2016
IEICE Trans. Inf. Syst., 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Link prediction of LOD by multiple label propagation algorithm considering semantic distance.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016
Proceedings of the 10th International Conference on Complex, 2016
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
Practical approach for disease similarity calculation based on disease phenotype, etiology, and locational clues in disease names.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016
2015
Int. J. Big Data Intell., 2015
Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information.
IEICE Trans. Inf. Syst., 2015
Sound collection and visualization system enabled participatory and opportunistic sensing approaches.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015
Evaluating the importance of personal information attributes using graph mining technique.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
Tradeoff Between the Price of Distributing a Database and Its Collusion Resistance Based on Concatenated Codes.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Gamification Effect of Collection System for Digital Photographs with Geographic Information which Utilizes Land Acquisition Game.
Proceedings of the Human-Computer Interaction: Interaction Technologies, 2015
Proceedings of the 37th Annual Meeting of the Cognitive Science Society, 2015
Proceedings of the Business Information Systems Workshops, 2015
Proceedings of the 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015, 2015
Relationship between Willingness to Share Photos and Preferred Level of Photo Blurring for Privacy Protection.
Proceedings of the ASE BigData & SocialInformatics 2015, 2015
Efficient Authentication, Traitor Detection, and Privacy-Preserving for the Most Common Queries in Two-Tiered Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Impacts of Tourist Accommodations as Temporal Shelter on Evacuee Overflow for the Reassignment of Shelters Jurisdiction.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Research on text data mining of hospital patient records within Electronic Medical Records.
Proceedings of the 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
A proposal of personal information trading platform (PIT): A fair trading between personal information and incentives.
Proceedings of the Fourth International Conference on Digital Information and Communication Technology and its Applicationsm DICTAP 2014, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
A k-anonymity method based on search engine query statistics for disaster impact statements.
Proceedings of the Ninth International Conference on Availability, 2014
A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure.
Proceedings of the Ninth International Conference on Availability, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Incremental Single-Source Multi-Target A* Algorithm for LBS Based on Road Network Distance.
IEICE Trans. Inf. Syst., 2013
Proceedings of the Web-Age Information Management - 14th International Conference, 2013
A K-Anonymity Method Based on SEM (Search Engine Marketing) Price of Personal Information.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Algorithms and Architectures for Parallel Processing, 2013
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Proceedings of the Web-Age Information Management - 13th International Conference, 2012
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the 2012 International Conference on Information Networking, 2012
Sequenced Route Query in Road Network Distance Based on Incremental Euclidean Restriction.
Proceedings of the Database and Expert Systems Applications, 2012
Group Management System for Federated Identities with Flow Control of Membership Information by Subjects.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Proceedings of the Advances in Databases and Information Systems, 2012
2011
Isolation im Cloud-Computing und Mechanismen zum Schutz der Privatsphäre - Eignung von Mechanismen zum Schutz der Privatsphäre für die Trennung der Datenverarbeitung in Geschäftsprozessen.
Wirtschaftsinf., 2011
Interview mit Charley K. Watanabe zum Thema "Cloud Computing in Japan - Die Rolle der japanischen Regierung".
Wirtschaftsinf., 2011
On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking.
J. Inf. Hiding Multim. Signal Process., 2011
User consent acquisition system for Japanese Shibboleth-based academic federation (GakuNin).
Int. J. Grid Util. Comput., 2011
Isolation in Cloud Computing and Privacy-Enhancing Technologies - Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes.
Bus. Inf. Syst. Eng., 2011
Interview with Mr. Charley K. Watanabe on "Cloud Computing in Japan - The Role of the Japanese Government".
Bus. Inf. Syst. Eng., 2011
Proceedings of the Web-Age Information Management, 2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
A Proposal of "Identity Commons": Utilization of Life Log and ID Information for Resilient Social System.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
The Structure of Psychological Resistance and Incentives in Lifelog Disclosure: An Experimental Study with Smartphone Users.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
A Proposal of "Identity Commons" for Service Creation using Communication Log - Position Paper.
Proceedings of the ICE-B 2011, 2011
Proceedings of the Database Systems for Advanced Applications, 2011
Using Generalization Patterns for Fingerprinting Sets of Partially Anonymized Microdata in the Course of Disasters.
Proceedings of the Sixth International Conference on Availability, 2011
2010
Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte).
it Inf. Technol., 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010
Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
Fair Bandwidth Allocation with Distance Fairness Provisioning in Optical Burst Switching Networks.
Proceedings of the Global Communications Conference, 2010
User-controlled Privacy Protection with Attribute-filter Mechanism for a Federated SSO Environment Using Shibboleth.
Proceedings of the 3PGCIC 2010, 2010
2009
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
Privacy-aware access to Patient-controlled Personal Health Records in emergency situations.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking.
Proceedings of the ICE-B 2009, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Management of information-credibility risk in an ICT society: A social implementation.
Internet Res., 2008
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008
Website Credibility - A Proposal on an Evaluation Method for e-Commerce.
Proceedings of the ICE-B 2008, 2008
Trust perception in internet shopping: comparative study of customers in Japan and South Korea.
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008
2007
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Critical Success Factors of Internet Shopping in Japan: Customer-Centric and Website-Centric Perspectives.
Proceedings of the ICE-B 2007, 2007
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
Theoretical model of purchase and repurchase in internet shopping: evidence from japanese online customers.
Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007
2006
Int. J. Pattern Recognit. Artif. Intell., 2006
Efficient Content Location Algorithm for Content Distribution Networks based on Distributed Construction of Search Tree from Contents of Proximal Nodes.
Proceedings of the IASTED International Conference on Databases and Applications, 2006
2004
Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia, 2004
New high-speed frame detection method: Side Trace Algorithm (STA) for i-appli on cellular phones to detect watermarks.
Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia, 2004
2000
Human walking animation based on foot reaction force in the three-dimensional virtual world.
Comput. Animat. Virtual Worlds, 2000
Proceedings of the Digital Cities, 2000
1998
Precipitation Nowcast with Artificial Neural Networks.
Proceedings of the Fifth International Conference on Neural Information Processing, 1998
1997
Numerical studies of resonance in a sinusoidally driven chaotic neuron model and its network.
Proceedings of International Conference on Neural Networks (ICNN'97), 1997
1996
Edge-based binocular stereopsis algorithm--a matching mechanism with probabilistic feedback.
Neural Networks, 1996
1995
Snowfall and rainfall forecasting from weather radar images with artificial neural networks.
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27, 1995
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27, 1995
1993
Proceedings of International Conference on Neural Networks (ICNN'88), San Francisco, CA, USA, March 28, 1993
1992
Relaxation neural network model for optimal binary representation of images and its implementation on a parallel computer.
Syst. Comput. Jpn., 1992
1990
Binary representation and intensity surface interpolation of the grey level image by relaxation neural network models.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990