default search action
Hiroyuki Endo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c7]Hiroyuki Endo, Youji Kohda:
Case Study on Applicability of Artificial Intelligence for IT Service Project Managers with Multi Value Systems in the Digital Transformation Era. AHFE (8) 2020: 278-288
2010 – 2019
- 2018
- [j4]Te Sun Han, Hiroyuki Endo, Masahide Sasaki:
Wiretap Channels With One-Time State Information: Strong Secrecy. IEEE Trans. Inf. Forensics Secur. 13(1): 224-236 (2018) - 2016
- [j3]Hiroyuki Endo, Te Sun Han, Masahide Sasaki:
Error and Secrecy Exponents for Wiretap Channels under Two-Fold Cost Constraints. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(12): 2136-2146 (2016) - [i3]Hiroyuki Endo, Mikio Fujiwara, Mitsuo Kitamura, Toshiyuki Ito, Morio Toyoshima, Yoshihisa Takayama, Hideki Takenaka, Ryosuke Shimizu, Nicola Laurenti, Giuseppe Vallone, Paolo Villoresi, Takao Aoki, Masahide Sasaki:
Free-space optical channel estimation for physical layer security. CoRR abs/1607.07799 (2016) - 2015
- [c6]Hiroyuki Endo, Shinnosuke Furuya, Ken-ichi Okada:
MR Manual and Authoring Tool with Afterimages. AINA 2015: 890-895 - [i2]Hiroyuki Endo, Te Sun Han, Takao Aoki, Masahide Sasaki:
Numerical Study on Secrecy Capacity and Code Length Dependence of the Performances in Optical Wiretap Channels. CoRR abs/1509.04006 (2015) - 2014
- [j2]Te Sun Han, Hiroyuki Endo, Masahide Sasaki:
Reliability and Secrecy Functions of the Wiretap Channel Under Cost Constraint. IEEE Trans. Inf. Theory 60(11): 6819-6843 (2014) - 2013
- [i1]Te Sun Han, Hiroyuki Endo, Masahide Sasaki:
Reliability and Security Functions of the Wiretap Channel under Cost Constraint. CoRR abs/1307.0608 (2013) - 2011
- [c5]Titichaya Thanamitsomboon, Hiroyuki Endo, Xiaodong Lu, Kinji Mori:
Autonomous Heterogeneous Community Technology for Effective Resource Utilization. ISADS 2011: 311-314 - 2010
- [c4]Hiroyuki Endo, Hiroshi Fujimoto:
Short-span seeking control of hard disk drive based on integral type learning PTC. AMC 2010: 554-559
2000 – 2009
- 2007
- [c3]Hiroyuki Endo, Yosuke Sugiyama, Kotaro Hama, Yuuki Nakahara, Kinji Mori:
Autonomous Community Area Construction Technology to Achieve High Assurance. ICDCS Workshops 2007: 57 - [c2]Kotaro Hama, Yuji Horikoshi, Hiroyuki Endo, Benjamin P. Kloester, Xiaodong Lu:
Autonomous Community Integration and Division Technology for High Response Service. ISADS 2007: 437-444
1990 – 1999
- 1990
- [j1]Hideto Ide, Hiroyuki Endo, Shizuaki Takahashi:
Influence of the Unit Number of Intermediate Layers and Networks on Learning Ability. J. Robotics Mechatronics 2(2): 118-122 (1990)
1980 – 1989
- 1985
- [c1]Tadahiro Kitahashi, Hiroyuki Endo:
A New Method of 3-D Motion Analysis Using a Concept of Projective Geometry. IJCAI 1985: 902-904
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint