Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Jun BabaCyberAgent, Inc.Verified email at cyberagent.co.jp
- Junya NakanishiOsaka universityVerified email at irl.sys.es.osaka-u.ac.jp
- Hiroshi IshiguroOsaka UniversityVerified email at sys.es.osaka-u.ac.jp
- Takahiro WadaProfessor at Nara Institute of Science and Technology (NAIST)Verified email at is.naist.jp
- Yasuyoshi YOKOKOHJIKobe UniversityVerified email at mech.kobe-u.ac.jp
- Kohei MatsumuraAssociate Professor of Information Science and Engineering, Ristumeikan UniversityVerified email at acm.org
- Yasunori OzakiOsaka UniversityVerified email at irl.sys.es.osaka-u.ac.jp
- Yuichiro Yoshikawa大阪大学Verified email at irl.sys.es.osaka-u.ac.jp
- Joichiro AmadaRitsumeikan UniversityVerified email at ed.ritsumei.ac.jp
- SONG SichaoCyberAgent Inc., Osaka UniversityVerified email at cyberagent.co.jp
- Callum MoleThe Alan Turing InstituteVerified email at turing.ac.uk
- Richard M. WilkieUniversity of LeedsVerified email at leeds.ac.uk
- Natasha MeratUniversity of LeedsVerified email at its.leeds.ac.uk
- Itaru KuramotoThe University of Fukuchiyama, JapanVerified email at fukuchiyama.ac.jp
- Gustav MarkkulaUniversity of LeedsVerified email at leeds.ac.uk