Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ken-ichi KawarabayashiNational Institute of Informatics, The University of TokyoVerified email at nii.ac.jp
Yusuke KOBAYASHIKyoto UniversityVerified email at kurims.kyoto-u.ac.jp
Yoshio OkamotoUniversity of Electro-CommunicationsVerified email at uec.ac.jp
Takuro FukunagaChuo UniversityVerified email at g.chuo-u.ac.jp
Shinji ItoThe University of TokyoVerified email at mist.i.u-tokyo.ac.jp
Yuni IwamasaKyoto UniversityVerified email at i.kyoto-u.ac.jp
Yuichi YoshidaNational Institute of InformaticsVerified email at nii.ac.jp
Satoru IwataUniversity of TokyoVerified email at mist.i.u-tokyo.ac.jp
Tasuku SomaThe Institute of Statistical MathematicsVerified email at ism.ac.jp
Kazuhiro InabaGoogleVerified email at google.com
Vorapong SuppakitpaisarnThe University of TokyoVerified email at is.s.u-tokyo.ac.jp
Atsushi MiyauchiCENTAI InstituteVerified email at centai.eu
Charalampos E. TsourakakisBoston UniversityVerified email at bu.edu
Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Kei KimuraKyushu UniversityVerified email at inf.kyushu-u.ac.jp
Yutaro YamaguchiOsaka UniversityVerified email at ist.osaka-u.ac.jp
Tianyi ChenPhD, Boston UniversityVerified email at bu.edu
Simon MaurasINRIAVerified email at inria.fr
Laura SanitàAssociate Professor, Bocconi University of MilanVerified email at unibocconi.it
Friedrich EisenbrandEPFLVerified email at epfl.ch