Iwashita, Hiroaki
121  Ergebnisse:
Personensuche X
?
1

Rule Mining for Correcting Classification Models:

, In: 2023 IEEE International Conference on Data Mining (ICDM),
Suzuki, Hirofumi ; Iwashita, Hiroaki ; Takagi, Takuya.. - p. 1331-1336 , 2023
 
?
2

ON DYNAMIC PATROLLING SECURITY GAMES:

Kira, Akifumi ; Kamiyama, Naoyuki ; Anai, Hirokazu..
Journal of the Operations Research Society of Japan.  62 (2019)  4 - p. 152-168 , 2019
 
?
3

Frontier-Based Search for Enumerating All Constrained Subgr..:

KAWAHARA, Jun ; INOUE, Takeru ; IWASHITA, Hiroaki.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E100.A (2017)  9 - p. 1773-1784 , 2017
 
?
4

Agent-based simulation analysis for security planning based..:

, In: Proceedings of the 2016 Winter Simulation Conference,
Goto, Akinobu ; Takahashi, Shingo ; Ohori, Kotaro... - p. 3720-3721 , 2016
 
?
5

Simplifying Urban Network Security Games with Cut-Based Gra..:

, In: Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems,
 
?
6

Graphillion: software library for very large sets of labele..:

Inoue, Takeru ; Iwashita, Hiroaki ; Kawahara, Jun.
International Journal on Software Tools for Technology Transfer.  18 (2014)  1 - p. 57-66 , 2014
 
?
8

Formal verification based on assume and guarantee approach ..:

, In: Proceedings of the 2000 Asia and South Pacific Design Automation Conference,
 
?
9

Forward model checking techniques oriented to buggy designs:

, In: Proceedings of the 1997 IEEE/ACM international conference on Computer-aided design,
Iwashita, Hiroaki ; Nakata, Tsuneo - p. 400-404 , 1997
 
?
10

CTL model checking based on forward state traversal:

, In: Proceedings of the 1996 IEEE/ACM international conference on Computer-aided design,
 
?
11

Automatic test program generation for pipelined processors:

, In: Proceedings of the 1994 IEEE/ACM international conference on Computer-aided design,
 
1-15