default search action
Kilho Shin
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Kilho Shin 0001 — Gakushuin University, Computer Centre, Japan (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j9]Kilho Shin, Liliana Pérez-Nordtvedt:
Knowledge acquisition efficiency, strategic renewal frequency and firm performance in high velocity environments. J. Knowl. Manag. 24(9): 2035-2055 (2020) - 2018
- [j8]Tianyu Zhang, Qian Zhao, Kilho Shin, Yukikazu Nakamoto:
Bayesian-Optimization-Based Peak Searching Algorithm for Clustering in Wireless Sensor Networks. J. Sens. Actuator Networks 7(1): 2 (2018) - 2017
- [j7]Kilho Shin:
On Infinite Divisibility of Convolution and Mapping Kernels. Fundam. Informaticae 152(1): 87-105 (2017) - 2016
- [j6]Kilho Shin, Seiya Miyazaki:
A Fast and Accurate Feature Selection Algorithm Based on Binary Consistency Measure. Comput. Intell. 32(4): 646-667 (2016) - 2015
- [j5]Twe Ta Oo, Takao Onoye, Kilho Shin:
Partial Encryption Method That Enhances MP3 Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(8): 1760-1768 (2015) - [j4]Kilho Shin:
Tree Edit Distance and Maximum Agreement Subtree. Inf. Process. Lett. 115(1): 69-73 (2015) - 2014
- [j3]Kilho Shin:
Alignment Kernels Based on a Generalization of Alignments. IEICE Trans. Inf. Syst. 97-D(1): 1-10 (2014) - 2007
- [j2]Kilho Shin, Koji Takeda, Masahiro Taguchi, Hiroshi Yasuda, Terumasa Aoki:
Bridge layer for content distribution. Syst. Comput. Jpn. 38(2): 46-56 (2007) - 2006
- [j1]Kilho Shin, Hiroshi Yasuda:
Practical Anonymous Access Control Protocols for Ubiquitous Computing. J. Comput. 1(8): 1-12 (2006)
Conference and Workshop Papers
- 2024
- [c16]Kilho Shin, Takenobu Seito, Chris Liu:
Towards Federated Learning by Kernels. ICMRE 2024: 317-323 - 2019
- [c15]Shusuke Morimoto, Hajime Kawamukai, Kilho Shin:
Prediction of Crime Occurrence using Information Propagation Model and Gaussian Process. AsiaJCIS 2019: 80-87 - [c14]Tianyu Zhang, Lei Zhu, Qian Zhao, Kilho Shin:
Neural Networks Weights Quantization: Target None-retraining Ternary (TNT). EMC2@NeurIPS 2019: 62-65 - 2018
- [c13]Kilho Shin, Taichi Ishikawa:
Linear-time algorithms for the subpath kernel. CPM 2018: 22:1-22:13 - [c12]Kilho Shin, Taro Niiyama:
The Mapping Distance - a Generalization of the Edit Distance - and its Application to Trees. ICAART (2) 2018: 266-275 - 2013
- [c11]Kilho Shin:
A New Frontier of Kernel Design for Structured Data. ICML (1) 2013: 401-409 - 2011
- [c10]Kilho Shin:
Partitionable Kernels for Mapping Kernels. ICDM 2011: 645-654 - [c9]Kilho Shin, Danny Fernandes, Seiya Miyazaki:
Consistency Measures for Feature Selection: A Formal Definition, Relative Sensitivity Comparison, and a Fast Algorithm. IJCAI 2011: 1491-1497 - [c8]Kilho Shin:
Mapping kernels for infinite mapping systems. ACML 2011: 367-382 - 2009
- [c7]Kilho Shin, Xian Ming Xu:
Consistency-Based Feature Selection. KES (1) 2009: 342-350 - [c6]Kilho Shin, Xian Ming Xu:
A Consistency-Constrained Feature Selection Algorithm with the Steepest Descent Method. MDAI 2009: 338-350 - 2007
- [c5]Kilho Shin, Justin Zhan:
A Verification Scheme for Data Aggregation in Data Mining. GrC 2007: 374-379 - [c4]Kilho Shin:
Position-Aware String Kernels with Weighted Shifts and a General Framework to Apply String Kernels to Other Structured Data. IDEAL 2007: 316-325 - 2006
- [c3]Kilho Shin, Hiroshi Yasuda:
Provably Secure Anonymous Access Control for Heterogeneous Trusts. ARES 2006: 24-33 - 2005
- [c2]Yukihisa Ishimura, Kilho Shin, Noriyuki Kamibayashi:
Graph-Theoretic Nature of Local Web-Spaces. DEXA Workshops 2005: 22-26 - 1999
- [c1]Kilho Shin:
Secure and Efficient Schemes to Entrust the Use of Private Keys. WETICE 1999: 174-177
Informal and Other Publications
- 2019
- [i1]Tianyu Zhang, Lei Zhu, Qian Zhao, Kilho Shin:
Neural Networks Weights Quantization: Target None-retraining Ternary (TNT). CoRR abs/1912.09236 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-06 00:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint