<?xml version="1.0"?>
<dblpperson name="Masahiro Hiji" pid="76/6014" n="37">
<person key="homepages/76/6014" mdate="2009-06-10">
<author pid="76/6014">Masahiro Hiji</author>
</person>
<r><inproceedings key="conf/icissp/KatoMHSH25" mdate="2025-04-10">
<author pid="219/4409">Hiroya Kato</author>
<author pid="257/7027">Ryo Meguro</author>
<author pid="78/5474">Seira Hidano</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>Flexible Noise Based Robustness Certification Against Backdoor Attacks in Graph Neural Networks.</title>
<pages>552-563</pages>
<year>2025</year>
<booktitle>ICISSP (2)</booktitle>
<ee>https://doi.org/10.5220/0013188700003899</ee>
<crossref>conf/icissp/2025-2</crossref>
<url>db/conf/icissp/icissp2025-2.html#KatoMHSH25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icissp/MeguroKNHFSH24" mdate="2024-04-02">
<author pid="257/7027">Ryo Meguro</author>
<author pid="219/4409">Hiroya Kato</author>
<author pid="186/8201">Shintaro Narisada</author>
<author pid="78/5474">Seira Hidano</author>
<author pid="45/2182">Kazuhide Fukushima</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks.</title>
<pages>510-521</pages>
<year>2024</year>
<booktitle>ICISSP</booktitle>
<ee>https://doi.org/10.5220/0012369500003648</ee>
<crossref>conf/icissp/2024</crossref>
<url>db/conf/icissp/icissp2024.html#MeguroKNHFSH24</url>
</inproceedings>
</r>
<r><article key="journals/computers/UchibayashiASH23" mdate="2023-03-28">
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="98/2609">Bernady O. Apduhan</author>
<author orcid="0000-0002-5798-5125" pid="91/6772">Takuo Suganuma</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<title>Experiments and Evaluation of a Container Migration Data-Auditing System on Edge Computing Environment.</title>
<pages>27</pages>
<year>2023</year>
<month>February</month>
<volume>12</volume>
<journal>Comput.</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.3390/computers12020027</ee>
<url>db/journals/computers/computers12.html#UchibayashiASH23</url>
</article>
</r>
<r><inproceedings key="conf/dasc/UchibayashiASH22" mdate="2023-05-01">
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="98/2609">Bernady O. Apduhan</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>Design and Implementation of a Data-Auditing Mechanism for Container Migration.</title>
<pages>1-4</pages>
<year>2022</year>
<booktitle>DASC/PiCom/CBDCom/CyberSciTech</booktitle>
<ee>https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9927748</ee>
<crossref>conf/dasc/2022</crossref>
<url>db/conf/dasc/dasc2022.html#UchibayashiASH22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccsa/UchibayashiASH22" mdate="2023-05-01">
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="98/2609">Bernady O. Apduhan</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>Toward a Container Migration Data-Auditing Mechanism for Edge Computing Environment.</title>
<pages>90-102</pages>
<year>2022</year>
<booktitle>ICCSA (Workshops 3)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-10545-6_7</ee>
<crossref>conf/iccsa/2022-w3</crossref>
<url>db/conf/iccsa/iccsa2022-w3.html#UchibayashiASH22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/NarisadaMHUSHK21" mdate="2023-05-01">
<author pid="186/8201">Shintaro Narisada</author>
<author pid="86/1585">Yuki Matsumoto</author>
<author pid="78/5474">Seira Hidano</author>
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="76/6014">Masahiro Hiji</author>
<author pid="69/3714">Shinsaku Kiyomoto</author>
<title>Countermeasures Against Backdoor Attacks Towards Malware Detectors.</title>
<pages>295-314</pages>
<year>2021</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-92548-2_16</ee>
<crossref>conf/cans/2021</crossref>
<url>db/conf/cans/cans2021.html#NarisadaMHUSHK21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cscwd/FujitaTMKHSSMG21" mdate="2024-10-06">
<author pid="10/6421">Shigeru Fujita</author>
<author pid="294/1822">Yutaro Taki</author>
<author pid="30/2346">Yohtaro Miyanishi</author>
<author pid="65/2951">Tokuyasu Kakuta</author>
<author pid="76/6014">Masahiro Hiji</author>
<author pid="90/1814">Kenji Sugawara</author>
<author pid="03/5898">Norio Shiratori</author>
<author pid="28/67">Claude Moulin</author>
<author orcid="0000-0003-0271-2565" pid="116/6797">Thierry Gidel</author>
<title>&#34;Digital-Ji-in&#34;: A Framework for Sustainable Digital Identification Records Based on A Peer-to-peer Network.</title>
<pages>1281-1286</pages>
<year>2021</year>
<booktitle>CSCWD</booktitle>
<ee>https://doi.org/10.1109/CSCWD49262.2021.9437610</ee>
<crossref>conf/cscwd/2021</crossref>
<url>db/conf/cscwd/cscwd2021.html#FujitaTMKHSSMG21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isaga/HamadaKH21" mdate="2022-07-28">
<author pid="201/7943">Ryoju Hamada</author>
<author pid="201/7953">Tomomi Kaneko</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>Designing Business Game by Student-Teacher Collaboration.</title>
<pages>239-253</pages>
<year>2021</year>
<booktitle>ISAGA</booktitle>
<ee>https://doi.org/10.1007/978-3-031-09959-5_20</ee>
<crossref>conf/isaga/2021</crossref>
<url>db/conf/isaga/isaga2021.html#HamadaKH21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/NarisadaSHUSHK20" mdate="2023-05-01">
<author pid="186/8201">Shintaro Narisada</author>
<author pid="256/2047">Shoichiro Sasaki</author>
<author pid="78/5474">Seira Hidano</author>
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="76/6014">Masahiro Hiji</author>
<author pid="69/3714">Shinsaku Kiyomoto</author>
<title>Stronger Targeted Poisoning Attacks Against Malware Detection.</title>
<pages>65-84</pages>
<year>2020</year>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-65411-5_4</ee>
<crossref>conf/cans/2020</crossref>
<url>db/conf/cans/cans2020.html#NarisadaSHUSHK20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ic-nc/HijiHKFMS20" mdate="2025-03-03">
<author pid="76/6014">Masahiro Hiji</author>
<author pid="168/2777">Yuichi Hashi</author>
<author pid="286/7377">Kazuhiko Kikuchi</author>
<author orcid="0000-0002-1935-9676" pid="10/6421">Shigeru Fujita</author>
<author pid="30/2346">Yohtaro Miyanishi</author>
<author pid="03/5898">Norio Shiratori</author>
<title>Noble Inheritance Mechanism of Digital Content for &#34;Digital-Ji-in&#34; toward Sustainable Society.</title>
<pages>254-259</pages>
<year>2020</year>
<booktitle>CANDAR (Workshops)</booktitle>
<ee>https://doi.org/10.1109/CANDARW51189.2020.00056</ee>
<crossref>conf/ic-nc/2020w</crossref>
<url>db/conf/ic-nc/candar2020w.html#HijiHKFMS20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccsa/UchibayashiASH20" mdate="2023-05-01">
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="98/2609">Bernady O. Apduhan</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>A Cloud VM Migration Control Mechanism Using Blockchain.</title>
<pages>221-235</pages>
<year>2020</year>
<booktitle>ICCSA (4)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-58811-3_16</ee>
<crossref>conf/iccsa/2020-4</crossref>
<url>db/conf/iccsa/iccsa2020-4.html#UchibayashiASH20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dasc/UchibayashiASSH19" mdate="2023-05-01">
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="98/2609">Bernady O. Apduhan</author>
<author pid="03/5898">Norio Shiratori</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>Policy Management Technique Using Blockchain for Cloud VM Migration.</title>
<pages>360-362</pages>
<year>2019</year>
<booktitle>DASC/PiCom/DataCom/CyberSciTech</booktitle>
<ee>https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00073</ee>
<crossref>conf/dasc/2019</crossref>
<url>db/conf/dasc/dasc2019.html#UchibayashiASSH19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isaga/HamadaIKH19" mdate="2022-10-02">
<author orcid="0000-0001-6909-0647" pid="201/7943">Ryoju Hamada</author>
<author pid="288/7635">Nanako Iwasa</author>
<author pid="201/7953">Tomomi Kaneko</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>Resolving Migrant Issues in Thailand Using the Framework of 'Simulation Game - Project PAL'.</title>
<pages>343-357</pages>
<year>2019</year>
<booktitle>ISAGA</booktitle>
<ee>https://doi.org/10.1007/978-3-030-72132-9_29</ee>
<crossref>conf/isaga/2019</crossref>
<url>db/conf/isaga/isaga2019.html#HamadaIKH19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pst/SasakiHUSHK19" mdate="2023-05-01">
<author pid="256/2047">Shoichiro Sasaki</author>
<author pid="78/5474">Seira Hidano</author>
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="76/6014">Masahiro Hiji</author>
<author pid="69/3714">Shinsaku Kiyomoto</author>
<title>On Embedding Backdoor in Malware Detectors Using Machine Learning.</title>
<pages>1-5</pages>
<year>2019</year>
<booktitle>PST</booktitle>
<ee>https://doi.org/10.1109/PST47121.2019.8949034</ee>
<crossref>conf/pst/2019</crossref>
<url>db/conf/pst/pst2019.html#SasakiHUSHK19</url>
</inproceedings>
</r>
<r><article key="journals/ieicet/Hiji18" mdate="2020-10-26">
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<title>Foreword.</title>
<pages>1</pages>
<year>2018</year>
<volume>101-B</volume>
<journal>IEICE Trans. Commun.</journal>
<number>1</number>
<ee>https://doi.org/10.1587/transcom.2017ITF0001</ee>
<ee>http://search.ieice.org/bin/summary.php?id=e101-b_1_1</ee>
<url>db/journals/ieicet/ieicet101b.html#Hiji18</url>
</article>
</r>
<r><inproceedings key="conf/iccsa/UchibayashiASH18" mdate="2023-05-01">
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="98/2609">Bernady O. Apduhan</author>
<author pid="91/6772">Takuo Suganuma</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<title>Toward a Secure VM Migration Control Mechanism Using Blockchain Technique for Cloud Computing Environment.</title>
<pages>177-186</pages>
<year>2018</year>
<booktitle>ICCSA (3)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-95168-3_12</ee>
<crossref>conf/iccsa/2018-3</crossref>
<url>db/conf/iccsa/iccsa2018-3.html#UchibayashiASH18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccsa/UchibayashiHHKA17" mdate="2023-05-01">
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="168/2777">Yuichi Hashi</author>
<author pid="78/5474">Seira Hidano</author>
<author pid="69/3714">Shinsaku Kiyomoto</author>
<author pid="98/2609">Bernady O. Apduhan</author>
<author pid="05/1058">Toru Abe</author>
<author pid="91/6772">Takuo Suganuma</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<title>A Control Mechanism for Live Migration with Data Regulations Preservation.</title>
<pages>509-522</pages>
<year>2017</year>
<booktitle>ICCSA (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-62392-4_37</ee>
<crossref>conf/iccsa/2017-1</crossref>
<url>db/conf/iccsa/iccsa2017-1.html#UchibayashiHHKA17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isaga/HamadaKH17" mdate="2022-10-02">
<author orcid="0000-0001-6909-0647" pid="201/7943">Ryoju Hamada</author>
<author pid="201/7953">Tomomi Kaneko</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<title>Development of BASE Manufacturing Business Board Game.</title>
<pages>34-40</pages>
<year>2017</year>
<booktitle>ISAGA</booktitle>
<ee>https://doi.org/10.1007/978-3-319-91902-7_4</ee>
<crossref>conf/isaga/2017</crossref>
<url>db/conf/isaga/isaga2017.html#HamadaKH17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nbis/UchibayashiHHKS17" mdate="2023-05-01">
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="168/2777">Yuichi Hashi</author>
<author pid="78/5474">Seira Hidano</author>
<author pid="69/3714">Shinsaku Kiyomoto</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>Verification of Data Collection Methods for Live Migration Protection Mechanism.</title>
<pages>420-430</pages>
<year>2017</year>
<booktitle>NBiS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-65521-5_36</ee>
<crossref>conf/nbis/2017</crossref>
<url>db/conf/nbis/nbis2017.html#UchibayashiHHKS17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/NakagawaHE16" mdate="2023-03-24">
<author pid="94/3197">Ikuo Nakagawa</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<author pid="41/6012">Hiroshi Esaki</author>
<title>Design and Implementation of Global Reference and Indirect Method Invocation Mechanisms in the Dripcast.</title>
<pages>338-343</pages>
<year>2016</year>
<booktitle>COMPSAC Workshops</booktitle>
<ee>https://doi.org/10.1109/COMPSAC.2016.92</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COMPSAC.2016.92</ee>
<crossref>conf/compsac/2016w</crossref>
<url>db/conf/compsac/compsac2016w.html#NakagawaHE16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ic-nc/HashiUHKBSH16" mdate="2023-05-01">
<author pid="168/2777">Yuichi Hashi</author>
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author pid="78/5474">Seira Hidano</author>
<author pid="69/3714">Shinsaku Kiyomoto</author>
<author pid="32/7883">Abdur Rahim Biswas</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>Data Protection for Cross-Border Live Migration in Multi-cloud Environment.</title>
<pages>681-685</pages>
<year>2016</year>
<booktitle>CANDAR</booktitle>
<ee>https://doi.org/10.1109/CANDAR.2016.0122</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CANDAR.2016.0122</ee>
<crossref>conf/ic-nc/2016</crossref>
<url>db/conf/ic-nc/candar2016.html#HashiUHKBSH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kicss/KanekoHH16" mdate="2022-10-02">
<author pid="201/7953">Tomomi Kaneko</author>
<author orcid="0000-0001-6909-0647" pid="201/7943">Ryoju Hamada</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<title>Effectiveness of analogue business game for learning elementary corporate management : An experimental approach.</title>
<pages>1-6</pages>
<year>2016</year>
<booktitle>KICSS</booktitle>
<ee>https://doi.org/10.1109/KICSS.2016.7951417</ee>
<crossref>conf/kicss/2016</crossref>
<url>db/conf/kicss/kicss2016.html#KanekoHH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kicss/UchibayashiHSHH16" mdate="2023-05-01">
<author orcid="0000-0003-1042-2461" pid="95/4525">Toshihiro Uchibayashi</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<author pid="91/6772">Takuo Suganuma</author>
<author pid="168/2777">Yuichi Hashi</author>
<author pid="78/5474">Seira Hidano</author>
<title>Proposed data audit system enhances use in accordance with the data owner's policy.</title>
<pages>1-5</pages>
<year>2016</year>
<booktitle>KICSS</booktitle>
<ee>https://doi.org/10.1109/KICSS.2016.7951439</ee>
<crossref>conf/kicss/2016</crossref>
<url>db/conf/kicss/kicss2016.html#UchibayashiHSHH16</url>
</inproceedings>
</r>
<r><article key="journals/jip/NakagawaHE15" mdate="2021-02-16">
<author pid="94/3197">Ikuo Nakagawa</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<author pid="41/6012">Hiroshi Esaki</author>
<title>Dripcast - Architecture and Implementation of Server-less Java Programming Framework for Billions of IoT Devices.</title>
<pages>458-464</pages>
<year>2015</year>
<volume>23</volume>
<journal>J. Inf. Process.</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.2197/ipsjjip.23.458</ee>
<url>db/journals/jip/jip23.html#NakagawaHE15</url>
</article>
</r>
<r><inproceedings key="conf/compsac/HashiMSHAS15" mdate="2023-03-24">
<author pid="168/2777">Yuichi Hashi</author>
<author pid="168/2782">Kazuyoshi Matsumoto</author>
<author pid="168/2803">Yoshinori Seki</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<author pid="05/1058">Toru Abe</author>
<author pid="91/6772">Takuo Suganuma</author>
<title>Data Management Scheme to Enable Efficient Analysis of Sensing Data for Smart Community.</title>
<pages>182-187</pages>
<year>2015</year>
<booktitle>COMPSAC Workshops</booktitle>
<ee>https://doi.org/10.1109/COMPSAC.2015.233</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COMPSAC.2015.233</ee>
<crossref>conf/compsac/2015w</crossref>
<url>db/conf/compsac/compsac2015w.html#HashiMSHAS15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/NakagawaHGHKFS15" mdate="2023-03-24">
<author pid="94/3197">Ikuo Nakagawa</author>
<author pid="168/6320">Yoshifumi Hashimoto</author>
<author pid="168/6396">Mitsuharu Goto</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<author pid="35/6851">Yutaka Kikuchi</author>
<author pid="60/2915">Masahiro Fukumoto</author>
<author orcid="0000-0003-2348-7408" pid="85/6175">Shinji Shimojo</author>
<title>DHT Extension of m-Cloud - Scalable and Distributed Privacy Preserving Statistical Computation on Public Cloud.</title>
<pages>682-683</pages>
<year>2015</year>
<booktitle>COMPSAC Workshops</booktitle>
<ee>https://doi.org/10.1109/COMPSAC.2015.94</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COMPSAC.2015.94</ee>
<crossref>conf/compsac/2015w</crossref>
<url>db/conf/compsac/compsac2015w.html#NakagawaHGHKFS15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icac/HashiMSHAS15" mdate="2023-03-24">
<author pid="168/2777">Yuichi Hashi</author>
<author pid="168/2782">Kazuyoshi Matsumoto</author>
<author pid="168/2803">Yoshinori Seki</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<author pid="05/1058">Toru Abe</author>
<author pid="91/6772">Takuo Suganuma</author>
<title>Design and Implementation of Data Management Scheme to Enable Efficient Analysis of Sensing Data.</title>
<pages>319-324</pages>
<year>2015</year>
<booktitle>ICAC</booktitle>
<ee>https://doi.org/10.1109/ICAC.2015.58</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICAC.2015.58</ee>
<crossref>conf/icac/2015</crossref>
<url>db/conf/icac/icac2015.html#HashiMSHAS15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kicss/KanekoHH15" mdate="2022-10-02">
<author pid="201/7953">Tomomi Kaneko</author>
<author orcid="0000-0001-6909-0647" pid="201/7943">Ryoju Hamada</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<title>Experimental Teaching of Collaborative Knowledge Creation Using Analogue Games.</title>
<pages>69-76</pages>
<year>2015</year>
<booktitle>KICSS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-70019-9_6</ee>
<crossref>conf/kicss/2015</crossref>
<url>db/conf/kicss/kicss2015.html#KanekoHH15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/NakagawaHE14" mdate="2023-03-24">
<author pid="94/3197">Ikuo Nakagawa</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<author pid="41/6012">Hiroshi Esaki</author>
<title>Dripcast - Server-less Java Programming Framework for Billions of IoT Devices.</title>
<pages>186-191</pages>
<year>2014</year>
<booktitle>COMPSAC Workshops</booktitle>
<ee>https://doi.org/10.1109/COMPSACW.2014.35</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COMPSACW.2014.35</ee>
<crossref>conf/compsac/2014w</crossref>
<url>db/conf/compsac/compsac2014w.html#NakagawaHE14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/compsac/NakagawaHKFS14" mdate="2023-03-24">
<author pid="94/3197">Ikuo Nakagawa</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<author pid="35/6851">Yutaka Kikuchi</author>
<author pid="60/2915">Masahiro Fukumoto</author>
<author orcid="0000-0003-2348-7408" pid="85/6175">Shinji Shimojo</author>
<title>m-cloud - Distributed Statistical Computation Using Multiple Cloud Computers.</title>
<pages>301-305</pages>
<year>2014</year>
<booktitle>COMPSAC Workshops</booktitle>
<ee>https://doi.org/10.1109/COMPSACW.2014.53</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COMPSACW.2014.53</ee>
<crossref>conf/compsac/2014w</crossref>
<url>db/conf/compsac/compsac2014w.html#NakagawaHKFS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/IEEEcit/SatoshiSH08" mdate="2020-10-25">
<author pid="40/4336">Munakata Satoshi</author>
<author pid="10/11261">Kunio Saito</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<title>A new session management method for efficient mobile access to web applications.</title>
<pages>497-502</pages>
<year>2008</year>
<booktitle>CIT</booktitle>
<ee>https://doi.org/10.1109/CIT.2008.4594725</ee>
<crossref>conf/IEEEcit/2008</crossref>
<url>db/conf/IEEEcit/IEEEcit2008.html#SatoshiSH08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cec/TezukaMAH06" mdate="2017-05-21">
<author pid="12/748">Masaru Tezuka</author>
<author pid="54/4269">Masaharu Munetomo</author>
<author pid="24/2165">Kiyoshi Akama</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>Genetic Algorithm to Optimize Fitness Function with Sampling Error and its Application to Financial Optimization Problem.</title>
<pages>81-87</pages>
<year>2006</year>
<booktitle>IEEE Congress on Evolutionary Computation</booktitle>
<ee>https://doi.org/10.1109/CEC.2006.1688293</ee>
<crossref>conf/cec/2006</crossref>
<url>db/conf/cec/cec2006.html#TezukaMAH06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gecco/TezukaH03" mdate="2017-05-23">
<author pid="12/748">Masaru Tezuka</author>
<author pid="76/6014">Masahiro Hiji</author>
<title>Genetic Algorithm for Supply Planning Optimization under Uncertain Demand.</title>
<pages>2337-2346</pages>
<year>2003</year>
<crossref>conf/gecco/2003-2</crossref>
<booktitle>GECCO</booktitle>
<ee>https://doi.org/10.1007/3-540-45110-2_126</ee>
<url>db/conf/gecco/gecco2003-2.html#TezukaH03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/evoW/TezukaHMO00" mdate="2020-10-25">
<author pid="12/748">Masaru Tezuka</author>
<author orcid="0000-0002-3202-6315" pid="76/6014">Masahiro Hiji</author>
<author pid="96/1957">Kazunori Miyabayashi</author>
<author pid="00/6848">Keigo Okumura</author>
<title>A New Genetic Representation and Common Cluster Crossover for Job Shop Scheduling Problems.</title>
<pages>297-306</pages>
<year>2000</year>
<crossref>conf/evoW/2000</crossref>
<booktitle>EvoWorkshops</booktitle>
<url>db/conf/evoW/evoW2000.html#TezukaHMO00</url>
<ee>https://doi.org/10.1007/3-540-45561-2_29</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/isads/HijiT99" mdate="2023-03-23">
<author pid="76/6014">Masahiro Hiji</author>
<author pid="12/748">Masaru Tezuka</author>
<title>Modeling Manufacturing Resources based on Agent Model.</title>
<pages>107-115</pages>
<year>1999</year>
<crossref>conf/isads/1999</crossref>
<booktitle>ISADS</booktitle>
<ee>https://doi.org/10.1109/ISADS.1999.838376</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ISADS.1999.838376</ee>
<url>db/conf/isads/isads1999.html#HijiT99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isads/HijiNM97" mdate="2023-03-23">
<author pid="76/6014">Masahiro Hiji</author>
<author pid="83/4123">Hiroshi Nunokawa</author>
<author pid="88/1791">Masatoshi Miyazaki</author>
<title>A communication computation model for developing computer supported cooperative work systems.</title>
<pages>213-220</pages>
<year>1997</year>
<booktitle>ISADS</booktitle>
<ee>https://doi.org/10.1109/ISADS.1997.590624</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ISADS.1997.590624</ee>
<crossref>conf/isads/1997</crossref>
<url>db/conf/isads/isads1997.html#HijiNM97</url>
</inproceedings>
</r>
<r><article key="journals/scjapan/HijiMN96" mdate="2023-09-13">
<author pid="76/6014">Masahiro Hiji</author>
<author pid="88/1791">Masatoshi Miyazaki</author>
<author pid="83/4123">Hiroshi Nunokawa</author>
<title>Communication computation model for modeling dynamic human communication.</title>
<pages>63-72</pages>
<year>1996</year>
<volume>27</volume>
<journal>Syst. Comput. Jpn.</journal>
<number>12</number>
<ee>https://doi.org/10.1002/scj.4690271206</ee>
<url>db/journals/scjapan/scjapan27.html#HijiMN96</url>
</article>
</r>
<coauthors n="44" nc="6">
<co c="0"><na f="a/Abe:Toru" pid="05/1058">Toru Abe</na></co>
<co c="2"><na f="a/Akama:Kiyoshi" pid="24/2165">Kiyoshi Akama</na></co>
<co c="0"><na f="a/Apduhan:Bernady_O=" pid="98/2609">Bernady O. Apduhan</na></co>
<co c="0"><na f="b/Biswas:Abdur_Rahim" pid="32/7883">Abdur Rahim Biswas</na></co>
<co c="1"><na f="e/Esaki:Hiroshi" pid="41/6012">Hiroshi Esaki</na></co>
<co c="0"><na f="f/Fujita:Shigeru" pid="10/6421">Shigeru Fujita</na></co>
<co c="1"><na f="f/Fukumoto:Masahiro" pid="60/2915">Masahiro Fukumoto</na></co>
<co c="0"><na f="f/Fukushima:Kazuhide" pid="45/2182">Kazuhide Fukushima</na></co>
<co c="0"><na f="g/Gidel:Thierry" pid="116/6797">Thierry Gidel</na></co>
<co c="1"><na f="g/Goto:Mitsuharu" pid="168/6396">Mitsuharu Goto</na></co>
<co c="3"><na f="h/Hamada:Ryoju" pid="201/7943">Ryoju Hamada</na></co>
<co c="0"><na f="h/Hashi:Yuichi" pid="168/2777">Yuichi Hashi</na></co>
<co c="1"><na f="h/Hashimoto:Yoshifumi" pid="168/6320">Yoshifumi Hashimoto</na></co>
<co c="0"><na f="h/Hidano:Seira" pid="78/5474">Seira Hidano</na></co>
<co c="3"><na f="i/Iwasa:Nanako" pid="288/7635">Nanako Iwasa</na></co>
<co c="0"><na f="k/Kakuta:Tokuyasu" pid="65/2951">Tokuyasu Kakuta</na></co>
<co c="3"><na f="k/Kaneko:Tomomi" pid="201/7953">Tomomi Kaneko</na></co>
<co c="0"><na f="k/Kato:Hiroya" pid="219/4409">Hiroya Kato</na></co>
<co c="0"><na f="k/Kikuchi:Kazuhiko" pid="286/7377">Kazuhiko Kikuchi</na></co>
<co c="1"><na f="k/Kikuchi:Yutaka" pid="35/6851">Yutaka Kikuchi</na></co>
<co c="0"><na f="k/Kiyomoto:Shinsaku" pid="69/3714">Shinsaku Kiyomoto</na></co>
<co c="0"><na f="m/Matsumoto:Kazuyoshi" pid="168/2782">Kazuyoshi Matsumoto</na></co>
<co c="0"><na f="m/Matsumoto:Yuki" pid="86/1585">Yuki Matsumoto</na></co>
<co c="0"><na f="m/Meguro:Ryo" pid="257/7027">Ryo Meguro</na></co>
<co c="2"><na f="m/Miyabayashi:Kazunori" pid="96/1957">Kazunori Miyabayashi</na></co>
<co c="0"><na f="m/Miyanishi:Yohtaro" pid="30/2346">Yohtaro Miyanishi</na></co>
<co c="5"><na f="m/Miyazaki:Masatoshi" pid="88/1791">Masatoshi Miyazaki</na></co>
<co c="0"><na f="m/Moulin:Claude" pid="28/67">Claude Moulin</na></co>
<co c="2"><na f="m/Munetomo:Masaharu" pid="54/4269">Masaharu Munetomo</na></co>
<co c="1"><na f="n/Nakagawa:Ikuo" pid="94/3197">Ikuo Nakagawa</na></co>
<co c="0"><na f="n/Narisada:Shintaro" pid="186/8201">Shintaro Narisada</na></co>
<co c="5"><na f="n/Nunokawa:Hiroshi" pid="83/4123">Hiroshi Nunokawa</na></co>
<co c="2"><na f="o/Okumura:Keigo" pid="00/6848">Keigo Okumura</na></co>
<co c="4"><na f="s/Saito:Kunio" pid="10/11261">Kunio Saito</na></co>
<co c="0"><na f="s/Sasaki:Shoichiro" pid="256/2047">Shoichiro Sasaki</na></co>
<co c="4"><na f="s/Satoshi:Munakata" pid="40/4336">Munakata Satoshi</na></co>
<co c="0"><na f="s/Seki:Yoshinori" pid="168/2803">Yoshinori Seki</na></co>
<co c="1"><na f="s/Shimojo:Shinji" pid="85/6175">Shinji Shimojo</na></co>
<co c="0"><na f="s/Shiratori:Norio" pid="03/5898">Norio Shiratori</na></co>
<co c="0"><na f="s/Suganuma:Takuo" pid="91/6772">Takuo Suganuma</na></co>
<co c="0"><na f="s/Sugawara:Kenji" pid="90/1814">Kenji Sugawara</na></co>
<co c="0"><na f="t/Taki:Yutaro" pid="294/1822">Yutaro Taki</na></co>
<co c="2"><na f="t/Tezuka:Masaru" pid="12/748">Masaru Tezuka</na></co>
<co c="0"><na f="u/Uchibayashi:Toshihiro" pid="95/4525">Toshihiro Uchibayashi</na></co>
</coauthors>
</dblpperson>

