default search action
Koji Hasebe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Koji Noshiro, Koji Hasebe:
Counterexamples and amendments to the termination and optimality of ADOPT-based algorithms. Artif. Intell. 329: 104083 (2024) - 2023
- [c33]Takuma Oishi, Koji Hasebe:
Strategy Analysis for Competitive Bilateral Multi-Issue Negotiation. ICAART (1) 2023: 404-411 - [c32]Eiji Sakurai, Koji Hasebe:
Decision-Making in Hearthstone Based on Evolutionary Algorithm. ICAART (3) 2023: 845-852 - [c31]Keisuke Tomoda, Koji Hasebe:
Playstyle Generation for Geister With Genetic Algorithm and Clustering. ICAART (3) 2023: 916-922 - [c30]Koji Noshiro, Koji Hasebe:
Flaws of Termination and Optimality in ADOPT-based Algorithms. IJCAI 2023: 1996-2003 - 2022
- [j6]Fumio Machida, Koji Hasebe, Hirotake Abe, Kazuhiko Kato:
Analysis of Optimal File Placement for Energy-Efficient File-Sharing Cloud Storage System. IEEE Trans. Sustain. Comput. 7(1): 75-86 (2022) - [c29]Yu Iwasaki, Koji Hasebe:
A Framework for Generating Playstyles of Game AI with Clustering of Play Logs. ICAART (3) 2022: 605-612 - 2021
- [c28]Yu Iwasaki, Koji Hasebe:
Identifying Playstyles in Games with NEAT and Clustering. CoG 2021: 1-4 - [c27]Keisuke Tomoda, Koji Hasebe:
Playing Geister by Estimating Hidden Information with Deep Reinforcement Learning. CoG 2021: 1-4 - [c26]Mitsuhiro Mabuchi, Koji Hasebe:
C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments. SECRYPT 2021: 819-826 - [c25]Yu Iwasaki, Koji Hasebe:
Ant Colony Optimization for K-Independent Average Traveling Salesman Problem. ICSI (1) 2021: 333-344 - [c24]Haruki Nishimura, Koji Hasebe:
Compositional Object Synthesis in Game of Life Cellular Automata Using SAT Solver. ICSI (2) 2021: 543-552 - 2020
- [c23]Horleang Choeng, Koji Hasebe, Hirotake Abe, Kazuhiko Kato:
Multi-tier Power-Saving Method in Cloud Storage Systems for Content Sharing Services. GECON 2020: 142-154 - [c22]Kosei Fujishiro, Koji Hasebe:
Robustness and Failure Detection in Epistemic Gossip Protocols. ICFEM 2020: 20-35
2010 – 2019
- 2018
- [c21]Koji Hasebe, Sho Takai, Kazuhiko Kato:
A Flexible Data Migration Strategy for Power Savings in Distributed Storage Systems. SMARTGREENS 2018: 352-357 - [c20]Koji Hasebe, Shohei Sasaki, Kazuhiko Kato:
Fault Tolerance in the Traffic Management System of a Last-mile Transportation Service. VEHITS 2018: 552-557 - 2017
- [c19]Koji Hasebe, Mitsuaki Tsuji, Kazuhiko Kato:
Deadlock Detection in the Scheduling of Last-Mile Transportation Using Model Checking. DASC/PiCom/DataCom/CyberSciTech 2017: 423-430 - 2016
- [j5]Koji Hasebe, Takumi Sawada, Kazuhiko Kato:
A Game Theoretic Approach to Power Reduction in Distributed Storage Systems. J. Inf. Process. 24(1): 173-181 (2016) - [i3]Juan Carlos Polanco Aguilar, Koji Hasebe, Manuel Mazzara, Kazuhiko Kato:
Model Checking of BPMN Models for Reconfigurable Workflows. CoRR abs/1607.00478 (2016) - 2015
- [j4]Koji Hasebe, Jumpei Okoshi, Kazuhiko Kato:
Power-Saving in Storage Systems for Cloud Data Sharing Services with Data Access Prediction. IEICE Trans. Inf. Syst. 98-D(10): 1744-1754 (2015) - 2014
- [c18]Koji Hasebe, Naofumi Nishita, Kazuhiko Kato:
Highly Available Primary-Backup Mechanism for Internet Services with Optimistic Consensus. IC2E 2014: 410-416 - [c17]Koji Hasebe, Takumi Sawada, Kazuhiko Kato:
Using a Potential Game for Power Reduction in Distributed Storage Systems. IC2E 2014: 550-555 - 2013
- [c16]Gergei Bana, Koji Hasebe, Mitsuhiro Okada:
Computationally complete symbolic attacker and key exchange. CCS 2013: 1231-1246 - [c15]Jumpei Okoshi, Koji Hasebe, Kazuhiko Kato:
Power-saving in storage systems for Internet hosting services with data access prediction. IGCC 2013: 1-10 - 2012
- [c14]Jumpei Okoshi, Koji Hasebe, Kazuhiko Kato:
Power-Aware Autonomous Distributed Storage Systems for Internet Hosting Service Platforms. CloudComp 2012: 52-61 - 2011
- [j3]Takuya Masuzawa, Koji Hasebe:
Iterative information update and stability of strategies. Synth. 179(Supplement-1): 87-102 (2011) - [j2]Takuya Masuzawa, Koji Hasebe:
Erratum to: Iterative information update and stability of strategies. Synth. 183(2): 281 (2011) - [c13]Koji Hasebe, Kei Yamatozaki, Akiyoshi Sugiki, Kazuhiko Kato:
Self-Stabilizing Passive Replication for Internet Service Platforms. NTMS 2011: 1-6 - [c12]Koji Hasebe, Hiroaki Kawamoto, Akira Matsushita, Kiyotaka Kamibayashi, Yoshiyuki Sankai:
Stepwise process of clinical trials in safety-conscious development of human assistive robots. ROBIO 2011: 50-55 - 2010
- [j1]Munetoshi Ishikawa, Koji Hasebe, Akiyoshi Sugiki, Kazuhiko Kato:
Dynamic grid quorum: a reconfigurable grid quorum and its power optimization algorithm. Serv. Oriented Comput. Appl. 4(4): 245-260 (2010) - [c11]Koji Hasebe, Tatsuya Niwa, Akiyoshi Sugiki, Kazuhiko Kato:
Power-Saving in Large-Scale Storage Systems with Data Migration. CloudCom 2010: 266-273 - [c10]Koji Hasebe, Mitsuhiro Mabuchi:
Capability-Role-Based Delegation in Workflow Systems. EUC 2010: 711-717 - [c9]Koji Hasebe, Hiroaki Kawamoto, Akira Matsushita, Kiyotaka Kamibayashi, Yoshiyuki Sankai:
Towards a guideline for clinical trials in the development of human assistive robots. ROBIO 2010: 751-756 - [c8]Mitsuhiro Mabuchi, Yasushi Shinjo, Koji Hasebe, Akira Sato, Kazuhiko Kato:
CapaCon: access control mechanism for inter-device communications through TCP connections. SAC 2010: 706-712 - [c7]Koji Hasebe, Mitsuhiro Mabuchi, Akira Matsushita:
Capability-based delegation model in RBAC. SACMAT 2010: 109-118 - [i2]Gergei Bana, Koji Hasebe, Mitsuhiro Okada:
Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2010: 80 (2010)
2000 – 2009
- 2009
- [c6]Gergei Bana, Koji Hasebe, Mitsuhiro Okada:
Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols. Formal to Practical Security 2009: 33-56 - [c5]Munetoshi Ishikawa, Koji Hasebe, Akiyoshi Sugiki, Kazuhiko Kato:
Dynamic grid quorum: A novel approach for minimizing power consumption without data migration in grid quorums. SOCA 2009: 1-8 - 2007
- [c4]Gergei Bana, Koji Hasebe, Mitsuhiro Okada:
Computational Semantics for Basic Protocol Logic - A Stochastic Approach. ASIAN 2007: 86-94 - [i1]Gergei Bana, Koji Hasebe, Mitsuhiro Okada:
Computational Semantics for Basic Protocol Logic - A Stochastic Approach. IACR Cryptol. ePrint Arch. 2007: 156 (2007) - 2005
- [c3]Koji Hasebe, Mitsuhiro Okada:
Completeness and Counter-Example Generations of a Basic Protocol Logic: (Extended Abstract). RULE@RDP 2005: 73-92 - 2003
- [c2]Koji Hasebe, Mitsuhiro Okada:
Inferences on Honesty in Compositional Logic for Protocol Analysis. ISSS 2003: 65-86 - 2002
- [c1]Koji Hasebe, Mitsuhiro Okada:
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic. ISSS 2002: 417-440
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint