default search action
Shun Hattori
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Komei Arasawa, Shun Matsukawa, Nobuyuki Sugio, Hirofumi Sanada, Madoka Takahara, Shun Hattori:
A Study on Forecasting Post-enrollment Grades of Students Using Gradient Boosting Decision Tree. HCI (8) 2024: 16-32 - [c24]Shun Hattori, Shohei Miyamoto, Wataru Sunayama, Madoka Takahara:
A Study on Input Methods of User Preference for Personalized Fashion Coordinate Recommendations. HCI (8) 2024: 178-196 - [c23]Madoka Takahara, Shunsuke Nishimura, Shun Hattori:
A Study to Prevent People from Using a Smartphones at Bedtime with ASMR. HCI (6) 2024: 279-288 - 2023
- [c22]Madoka Takahara, Shun Hattori:
A Study on HCI of a Collaborated Nurture Game for Sleep Education with Child and Parent. HCI (5) 2023: 169-181 - [c21]Shun Hattori, Madoka Takahara:
A Study on Human-Computer Interaction with Text-to/from-Image Game AIs for Diversity Education. HCI (5) 2023: 471-486 - 2022
- [c20]Shun Hattori, Kizuku Aiba, Madoka Takahara:
R2-B2: A Metric of Synthesized Image's Photorealism by Regression Analysis based on Recognized Objects' Bounding Box. SCIS/ISIS 2022: 1-8
2010 – 2019
- 2018
- [c19]Kazuhiko Sato, Yosuke Kobayashi, Takeshi Shibata, Hidetsugu Suto, Shinya Watanabe, Shun Hattori, Sato Saga:
A Practice for Training IT Engineers by Combining Two Different Types of PBL. ACIIDS (2) 2018: 159-168 - [c18]Komei Arasawa, Shun Hattori, Yasuo Kudo:
Investigations of Interests that are Induced by Remarkers and Their Remarks for Item Advertisements Based on Influencer's Recommendation. SCIS&ISIS 2018: 789-795 - 2017
- [j2]Komei Arasawa, Shun Hattori:
Automatic Baseball Video Tagging Based on Voice Pattern Prioritization and Recursive Model Localization. J. Adv. Comput. Intell. Intell. Informatics 21(7): 1262-1279 (2017) - 2016
- [c17]Komei Arasawa, Shun Hattori:
Comparative Experiments on Models for Automatic Baseball Video Tagging. SCIS&ISIS 2016: 678-685 - 2013
- [c16]Kyohei Yoshida, Shun Hattori:
Web Self-Controller: A Filtering Browser for Self-Control. IIAI-AAI 2013: 26-31 - 2012
- [c15]Shun Hattori:
Spatio-Temporal Web Sensors by Social Network Analysis. ASONAM 2012: 988-995 - [c14]Shun Hattori:
Ability-based expression control for secure spaces. SCIS&ISIS 2012: 1298-1303 - 2011
- [c13]Shun Hattori:
Linearly-Combined Web Sensors for Spatio-temporal Data Extraction from the Web. ICDM Workshops 2011: 897-904 - 2010
- [c12]Shun Hattori:
Peculiar image search by Web-extracted appearance descriptions. SoCPaR 2010: 127-132
2000 – 2009
- 2009
- [c11]Shun Hattori, Katsumi Tanaka:
Object-name search by visual appearance and spatio-temporal descriptions. ICUIMC 2009: 63-70 - 2008
- [c10]Shun Hattori, Hiroaki Ohshima, Satoshi Oyama, Katsumi Tanaka:
Mining the Web for Hyponymy Relations Based on Property Inheritance. APWeb 2008: 99-110 - [c9]Shun Hattori, Katsumi Tanaka:
Extracting Concept Hierarchy Knowledge from the Web Based on Property Inheritance and Aggregation. Web Intelligence 2008: 432-437 - 2007
- [j1]Shun Hattori, Katsumi Tanaka:
Towards Building Secure Smart Spaces for Information Security in the Physical World. J. Adv. Comput. Intell. Intell. Informatics 11(8): 1023-1029 (2007) - [c8]Shun Hattori, Taro Tezuka, Hiroaki Ohshima, Satoshi Oyama, Junpei Kawamoto, Keishi Tajima, Katsumi Tanaka:
ReCQ: Real-World Context-Aware Querying. CONTEXT 2007: 248-262 - [c7]Shun Hattori, Taro Tezuka, Katsumi Tanaka:
Mining the Web for Appearance Description. DEXA 2007: 790-800 - [c6]Shun Hattori, Katsumi Tanaka:
Secure Spaces: Protecting Freedom of Information Access in Public Places. ICOST 2007: 99-109 - [c5]Hiroshi Kori, Shun Hattori, Taro Tezuka, Katsumi Tanaka:
Automatic Generation of Multimedia Tour Guide from Local Blogs. MMM (1) 2007: 690-699 - [c4]Shun Hattori, Taro Tezuka, Katsumi Tanaka:
Context-Aware Query Refinement for Mobile Web Search. SAINT Workshops 2007: 15 - 2006
- [c3]Shun Hattori, Taro Tezuka, Katsumi Tanaka:
Activity-Based Query Refinement for Context-Aware Information Retrieval. ICADL 2006: 474-477 - [c2]Shun Hattori, Taro Tezuka, Katsumi Tanaka:
Query Modification Based on Real-World Contexts for Mobile and Ubiquitous Computing Environments. MDM 2006: 77 - [c1]Shun Hattori, Taro Tezuka, Katsumi Tanaka:
Content-Based Entry Control for Secure Spaces. MDM 2006: 98
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-13 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint