default search action
Hiroshi Maruyama
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Jonghoon Im, Jun Younes Louhi Kasahara, Hiroshi Maruyama, Hajime Asama, Atsushi Yamashita:
Blend AutoAugment: Automatic Data Augmentation for Image Classification Using Linear Blending. IEEE Access 12: 68770-68784 (2024) - 2023
- [c39]Gonzalo Aguirre Dominguez, Keigo Kawaai, Hiroshi Maruyama:
Quality Assurance for ML Devices A Risk-Based Approach. APSEC 2023: 524-531 - [i5]Kenta Oono, Nontawat Charoenphakdee, Kotatsu Bito, Zhengyan Gao, Yoshiaki Ota, Shoichiro Yamaguchi, Yohei Sugawara, Shin-ichi Maeda, Kunihiko Miyoshi, Yuki Saito, Koki Tsuda, Hiroshi Maruyama, Kohei Hayashi:
Virtual Human Generative Model: Masked Modeling Approach for Learning Human Characteristics. CoRR abs/2306.10656 (2023) - 2022
- [c38]Sachiko Nakagawa, Hiroshi Maruyama, Yasufumi Takama:
Teaching support cockpit: Real-time avatarization for learning-activity logs with communication function. IIAI-AAI 2022: 461-466 - 2021
- [c37]Gonzalo Aguirre Dominguez, Keigo Kawaai, Hiroshi Maruyama:
FAILS: a tool for assessing risk in ML systems. APSEC Workshops 2021: 1-4 - 2020
- [c36]Nattapat Boonprakong, Tsukasa Kimura, Ken-ichi Fukui, Kazuya Okada, Masato Ito, Hiroshi Maruyama, Masayuki Numao:
Towards Multimodal Office Task Performance Estimation. SMC 2020: 2695-2701 - [i4]Dario Garcia-Gasulla, Sergio Álvarez-Napagao, Irene Li, Hiroshi Maruyama, Hiroki Kanezashi, Raquel Pérez-Arnal, Kunihiko Miyoshi, Euma Ishii, Keita Suzuki, Sayaka Shiba, Mariko Kurokawa, Yuta Kanzawa, Naomi Nakagawa, Masatoshi Hanai, Yixin Li, Tianxiao Li:
Global Data Science Project for COVID-19 Summary Report. CoRR abs/2006.05573 (2020)
2010 – 2019
- 2019
- [i3]Foutse Khomh, Fuyuki Ishikawa, Hiroshi Maruyama:
Software Engineering for Machine Learning Systems (SEMLS) (NII Shonan Meeting 156). NII Shonan Meet. Rep. 2019 (2019) - 2018
- [c35]Hiroshi Maruyama:
Guaranteeing Deep Neural Network Outputs in a Feasible Region (short paper). WESPr-iMLSE@APSEC 2018: 40-42 - 2016
- [j7]Nicolas Schwind, Morgan Magnin, Katsumi Inoue, Tenda Okimoto, Taisuke Sato, Kazuhiro Minami, Hiroshi Maruyama:
Formalization of resilience for constraint-based dynamic systems. J. Reliab. Intell. Environ. 2(1): 17-35 (2016) - [j6]Chengzhe Li, Lai Yoong Yee, Hiroshi Maruyama, Yoshiki Yamaguchi:
FPGA-based Volleyball Player Tracker. SIGARCH Comput. Archit. News 44(4): 80-86 (2016) - 2015
- [c34]Rungsiman Nararatwong, Roberto Sebastian Legaspi, Hitoshi Okada, Hiroshi Maruyama:
A Novel Mental State Model of Social Perception of Brand Crisis from an Entertainment Perspective. SBP 2015: 153-162 - [i2]Hiroshi Maruyama, Günter Müllerr, Kazuo Furuta:
Systems Resilience – Bridging the Gap Between Social and Mathematical (NII Shonan Meeting 2015-3). NII Shonan Meet. Rep. 2015 (2015) - 2014
- [j5]Tomoya Tanjo, Kazuhiro Minami, Ken Mano, Hiroshi Maruyama:
Evaluating data utility of privacy-preserving pseudonymized location datasets. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(3): 63-78 (2014) - [c33]Roberto Sebastian Legaspi, Hiroshi Maruyama, Rungsiman Nararatwong, Hitoshi Okada:
Perception-Based Resilience: Accounting for the Impact of Human Perception on Resilience Thinking. BDCloud 2014: 547-554 - [c32]Ken Mano, Kazuhiro Minami, Hiroshi Maruyama:
Pseudonym exchange for privacy-preserving publishing of trajectory data set. GCCE 2014: 691-695 - [c31]Tomoya Tanjo, Kazuhiro Minami, Ken Mano, Hiroshi Maruyama:
On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems. ICT-EurAsia 2014: 511-520 - 2013
- [c30]Hiroshi Maruyama, Kiyoshi Watanabe, Sachiko Yoshihama, Naohiko Uramoto, Yoichiro Takehora, Kazuhiro Minami:
ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching. ARES 2013: 525-529 - [c29]Ken Mano, Kazuhiro Minami, Hiroshi Maruyama:
Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data Set. ARES 2013: 615-624 - [c28]Nicolas Schwind, Tenda Okimoto, Katsumi Inoue, Hei Chan, Tony Ribeiro, Kazuhiro Minami, Hiroshi Maruyama:
Systems resilience: a challenge problem for dynamic constraint-based agent systems. AAMAS 2013: 785-788 - [c27]Hiroshi Maruyama:
Towards Systems Resilience. DSN Workshops 2013: 1-4 - [c26]Tenda Okimoto, Naoto Ikegai, Katsumi Inoue, Hitoshi Okada, Tony Ribeiro, Hiroshi Maruyama:
Cyber security problem based on Multi-Objective Distributed Constraint Optimization technique. DSN Workshops 2013: 1-7 - [c25]Asaka Yagi, Yuki Tachikawa, Hiroshi Maruyama, Taichi Nakamura:
An analysis of conversations in role-play training for project management education. EDUCON 2013: 156-161 - [c24]Yuki Tachikawa, Hiroshi Maruyama, Taichi Nakamura, Akio Takashima:
A method for evaluating project management competency acquired from role-play training. EDUCON 2013: 162-170 - [c23]Hiroshi Maruyama, Daisuke Okanohara, Shohei Hido:
Data Marketplace for Efficient Data Placement. ICDM Workshops 2013: 702-705 - [c22]Ken Mano, Kazuhiro Minami, Hiroshi Maruyama:
Protecting location privacy with k-confusing paths based on dynamic pseudonyms. PerCom Workshops 2013: 285-290 - 2012
- [c21]Hiroshi Maruyama, Shuhei Harada, Akio Takashima, Taichi Nakamura:
Integrated Environment for Scenario Development, Exercise Implements and Evaluation for Role-Play Training. ICALT 2012: 374-375 - 2011
- [j4]Masato Kotsugi, Takanori Wakita, Toshiyuki Taniuchi, Hiroshi Maruyama, Chiharu Mitsumata, Kanta Ono, Motohiro Suzuki, Naomi Kawamura, Naoki Ishimatsu, Masaharu Oshima, Yoshio Watanabe, Masaki Taniguchi:
Direct metallographic analysis of an iron meteorite using hard x-ray photoelectron emission microscopy. IBM J. Res. Dev. 55(4): 13 (2011)
2000 – 2009
- 2009
- [c20]Taichi Nakamura, Yuko Kitaura, Hiroshi Maruyama, Akio Takashima:
Analysis of Learners' Behavior in Role-Play Training for Project Management Education. ICALT 2009: 144-146 - 2008
- [c19]Hiroshi Maruyama:
Challenges and Opportunities for Computer Science in Services Science. ISAS 2008: 13-16 - [c18]Hiroshi Maruyama, Kennshi Suzuki, Taichi Nakamura:
Method for Building Dictionaries to Extract Reputation Information. JCKBSE 2008: 349-358 - 2007
- [p1]Sachiko Yoshihama, Tim Ebringer, Megumi Nakamura, Seiji Munetoh, Takuya Mishina, Hiroshi Maruyama:
ws-Attestation: Enabling Trusted Computing on Web Services. Test and Analysis of Web Services 2007: 441-469 - 2006
- [j3]Ernesto Damiani, Gabriele Gianini, Hiroshi Maruyama:
Special issue: Web service security. Comput. Syst. Sci. Eng. 21(5) (2006) - [c17]Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama:
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. ESORICS 2006: 65-80 - [c16]Taichi Nakamura, Hiroshi Maruyama:
Extracting Opinions Relating to Consumer Electronic Goods from Web Pages. JCKBSE 2006: 206-209 - 2005
- [c15]Sachiko Yoshihama, Tim Ebringer, Megumi Nakamura, Seiji Munetoh, Hiroshi Maruyama:
WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services. ICWS 2005: 743-750 - [e1]Ernesto Damiani, Hiroshi Maruyama:
Proceedings of the 2nd ACM Workshop On Secure Web Services, SWS 2005, Fairfax, VA, USA, November 11, 2005. ACM 2005, ISBN 1-59593-234-8 [contents] - 2003
- [c14]Hiroshi Maruyama, Taiga Nakamura, Tony Hsieh:
Optimistic fair contract signing for Web services. XML Security 2003: 79-85 - 2002
- [c13]Mikio Aoyama, Sanjiva Weerawarana, Hiroshi Maruyama, Clemens A. Szyperski, Kevin J. Sullivan, Doug Lea:
Web services engineering: promises and challenges. ICSE 2002: 647-648 - [c12]Takeshi Imamura, Andy Clark, Hiroshi Maruyama:
A stream-based implementation of XML encryption. XML Security 2002: 11-17 - 2001
- [c11]Takeshi Imamura, Hiroshi Maruyama:
Mapping between ASN.1 and XML. SAINT 2001: 57-64 - 2000
- [j2]Mitsuru Sakai, Masaaki Yoneda, Hiroyuki Hase, Hiroshi Maruyama, Michiko Naoe:
A quadratic discriminant function based on bias rectification of eigenvalues. Syst. Comput. Jpn. 31(9): 28-38 (2000) - [i1]Hiroshi Maruyama, Kent Tamura, Naohiko Uramoto:
Digest Values for DOM (DOMHASH). RFC 2803: 1-11 (2000)
1990 – 1999
- 1999
- [c10]Hiroshi Maruyama, Keijiro Araki:
VRML Program Slicing. APSEC 1999: 355-358 - [c9]Hiroyuki Hase, Toshiyuki Shinokawa, Masaaki Yoneda, Mitsuru Sakai, Hiroshi Maruyama:
Character String Extraction from a Color Document. ICDAR 1999: 75-78 - [c8]Naohiko Uramoto, Hiroshi Maruyama:
InfoBus Repeater: A Secure and Distributed Publish/Subscribe Middleware. ICPP Workshops 1999: 260-267 - 1997
- [c7]Hiroyuki Hase, Toshiyuki Shinokawa, Masaaki Yoneda, Mitsuru Sakai, Hiroshi Maruyama:
Character String Extraction by Multi-stage Relaxation. ICDAR 1997: 298-302 - 1995
- [c6]Krishna S. Nathan, Homayoon S. M. Beigi, Jayashree Subrahmonia, Gregory J. Clary, Hiroshi Maruyama:
Real-time on-line unconstrained handwriting recognition using statistical methods. ICASSP 1995: 2619-2622 - 1994
- [c5]Hiroshi Maruyama:
Backtracking-Free Dictionary Access Method for Japanese Morphological Analysis. COLING 1994: 208-213 - 1992
- [c4]Hiroshi Maruyama:
JAUNT: A Constraint Solver for Disjunctive Feature Structures. COLING 1992: 1162-1166 - [c3]Hiroshi Maruyama, Masaki Matsuyama, Keijiro Araki:
Support tool and strategy for type error correction with polymorphic types. COMPSAC 1992: 287-293 - 1990
- [c2]Hiroshi Maruyama:
Structural Disambiguation with Constraint Propagation. ACL 1990: 31-38 - [c1]Hiroshi Maruyama:
An Interactive Japanese Parser for Machine Translation. COLING 1990: 257-262
1980 – 1989
- 1984
- [j1]Hiroshi Maruyama, Akinori Yonezawa:
A Prolog-Based Natural Language Front-End System. New Gener. Comput. 2(1): 91-99 (1984)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint