Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Takashi IshioNara Institute of Science and TechnologyVerified email at is.naist.jp
Toshihiro KamiyaShimane UniversityVerified email at cis.shimane-u.ac.jp
Yoshiki HigoOsaka University, JapanVerified email at ist.osaka-u.ac.jp
Norihiro YoshidaRitsumeikan UniversityVerified email at fc.ritsumei.ac.jp
Raula Gaikovina KulaNara Institute of Science and TechnologyVerified email at is.naist.jp
Kenichi MatsumotoNAISTVerified email at is.naist.jp
Ali OuniÉcole de Technologie Supérieure (ÉTS Montreal), University of QuebecVerified email at etsmtl.ca
Daniel M. GermanProfessor, Computer Science, University of VictoriaVerified email at uvic.ca
Reishi YokomoriNanzan UniversityVerified email at se.nanzan-u.ac.jp
Tetsuo YamamotoRyukoku UniversityVerified email at rins.ryukoku.ac.jp
Yasuhiro Hayase / 早瀬 康裕Faculty of Engineering, Information and Systems, University of TsukubaVerified email at cs.tsukuba.ac.jp
Yuki ManabeThe University of FukuchiyamaVerified email at fukuchiyama.ac.jp
Akito MondenProfessor, Okayama UniversityVerified email at okayama-u.ac.jp
Tetsuya KandaOsaka UniversityVerified email at ist.osaka-u.ac.jp
Shinji (Kawaguchi) Matsumoto / 松本(...SlalomVerified email at slalom.com
Simone LivieriPost-doc student, Osaka UniversityVerified email at ist.osaka-u.ac.jp
Hiroyuki SekiGraduate School of Informatics, Nagoya UniversityVerified email at i.nagoya-u.ac.jp
Coen De RooverSoftware Languages Lab, Vrije Universiteit BrusselVerified email at vub.ac.be
Yuhao WuPh.D Student of Computer Science, Osaka UniveristyVerified email at ist.osaka-u.ac.jp
Giedre SabaliauskaiteSystems Security Group, Coventry University, UKVerified email at coventry.ac.uk