default search action
Hideyasu Sasaki
Person information
- affiliation: NICT, Tokyo, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j6]Hideyasu Sasaki:
Emulating Heterogeneity of Individuals and Visualizing Its Influence on Ant Swarm Migration. Appl. Artif. Intell. 36(1) (2022) - 2021
- [e3]Ajith Abraham, Hideyasu Sasaki, Ricardo Rios, Niketa Gandhi, Umang Singh, Kun Ma:
Innovations in Bio-Inspired Computing and Applications - Proceedings of the 11th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2020) held during December 16-18, 2020. Advances in Intelligent Systems and Computing 1372, Springer 2021, ISBN 978-3-030-73602-6 [contents]
2010 – 2019
- 2019
- [c24]Hideyasu Sasaki:
Modeling Ant Nest Relocation at Low Active Ratio by Particle Swarm Optimization. CEC 2019: 594-603 - [c23]Hideyasu Sasaki:
Modeling Fast and Robust Ant Nest Relocation using Particle Swarm Optimization. ALIFE 2019: 626-633 - 2018
- [c22]Hideyasu Sasaki:
A PSO-Based Algorithm Describes Ant Nest Move. SMC 2018: 243-248 - [c21]Hideyasu Sasaki:
Particle Swarm optimization Describes Ant Nest Move at Low Participation Rate. SSCI 2018: 989-996 - 2017
- [c20]Hideyasu Sasaki:
Modeling time-sensitive swarm dynamics. SSCI 2017: 1-8 - 2016
- [c19]Hideyasu Sasaki:
A smartphone app provides preventive care for the elderly with dementia. ICDE Workshops 2016: 50-53 - 2013
- [j5]Hideyasu Sasaki, Ho-fung Leung:
Trail traffic flow prediction by contact frequency among individual ants. Swarm Intell. 7(4): 307-326 (2013) - 2011
- [j4]Kensuke Naoe, Hideyasu Sasaki, Yoshiyasu Takefuji:
Information Hiding by Machine Learning: A Method of Key Generation for Information Extracting Using Neural Network. Int. J. Organ. Collect. Intell. 2(1): 21-48 (2011) - [j3]Hideyasu Sasaki:
A computing theory for collaborative and transparent decision making under time constraint. Inf. Syst. Frontiers 13(2): 207-220 (2011) - [c18]Hideyasu Sasaki:
A non-heuristic model of decision-making based on human perception under time constraints. SMC 2011: 621-626 - [c17]Hideyasu Sasaki:
Including collective intelligence in human-machine interactive decision-making under time constraints. SMC 2011: 1609-1614 - [p2]Hideyasu Sasaki:
Decision Making under Synchronous Time Stress among Bilateral Decision Makers. Next Generation Data Technologies for Collective Computational Intelligence 2011: 251-269 - [e2]Dickson K. W. Chiu, Ladjel Bellatreche, Hideyasu Sasaki, Ho-fung Leung, Shing-Chi Cheung, Haiyang Hu, Jie Shao:
Web Information Systems Engineering - WISE 2010 Workshops - WISE 2010 International Symposium WISS, and International Workshops CISE, MBC, Hong Kong, China, December 12-14, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6724, Springer 2011, ISBN 978-3-642-24395-0 [contents] - 2010
- [j2]Kensuke Naoe, Hideyasu Sasaki, Yoshiyasu Takefuji:
Secure Key Generation for Static Visual Watermarking by Machine Learning in Intelligent Systems and Services. Int. J. Syst. Serv. Oriented Eng. 1(1): 46-61 (2010) - [c16]Hideyasu Sasaki:
A Study on Strategic Points for Decision Making Under Time Constraint. 3PGCIC 2010: 308-313 - [c15]Hideyasu Sasaki:
Decision making under time constraint: From heuristics to strategy. SMC 2010: 2935-2940 - [c14]Hideyasu Sasaki:
Decision making under asynchronous time constraint among bilateral decision makers. SoCPaR 2010: 419-422 - [c13]Hideyasu Sasaki:
Strategic Points to Minimize Time Cost for Decision Making under Asynchronous Time Constraints. WISE Workshops 2010: 1-12
2000 – 2009
- 2009
- [c12]Hideyasu Sasaki:
Collaborative and Transparent Decision Making under Temporary Constraint. ICIW 2009: 602-607 - [c11]Kensuke Naoe, Hideyasu Sasaki, Yoshiyasu Takefuji:
Damageless Digital Watermarking by Machine Learning: A Method of Key Generation for Information Extraction Using Artificial Neural Networks. SoCPaR 2009: 545-550 - [p1]Hideyasu Sasaki:
Patent and Trade Secret in Digital Libraries. Handbook of Research on Digital Libraries 2009: 330-335 - [e1]Mark Perry, Hideyasu Sasaki, Matthias Ehmann, Guadalupe Ortiz, Oana Dini:
Fourth International Conference on Internet and Web Applications and Services, ICIW 2009, 24-28 May 2009, Venice/Mestre, Italy. IEEE Computer Society 2009, ISBN 978-0-7695-3613-2 [contents] - 2008
- [c10]Hideyasu Sasaki:
Flow Diagram Based Formulation for Protecting Patent and Trade Secret in Information Systems. ICIW 2008: 1-6 - [c9]Hideyasu Sasaki:
Strategic decision making on group collaboration under temporary constraints. CSTST 2008: 343-349 - 2007
- [c8]Hideyasu Sasaki, Yasushi Kiyoki:
Frameworks for Intellectual Property Protection on Multimedia Database Systems. EJC 2007: 181-189 - [c7]Hideyasu Sasaki:
Copyright, Patent and Trade Secret on Digital Libraries: Current Issues and Future Trends. ICADL 2007: 206-215 - 2005
- [j1]Hideyasu Sasaki, Yasushi Kiyoki:
A formulation for patenting content-based retrieval processes in digital libraries. Inf. Process. Manag. 41(1): 57-74 (2005) - [c6]Hideyasu Sasaki, Yasushi Kiyoki:
Theory and Implementation on Automatic Adaptive Metadata Generation for Image Retrieval. EJC 2005: 68-82 - [c5]Hideyasu Sasaki, Yasushi Kiyoki:
Automatic Adaptive Metadata Generation for Image Retrieval. SAINT Workshops 2005: 426-429 - 2004
- [c4]Hideyasu Sasaki, Yasushi Kiyoki:
Copyrighting Digital Libraries from Database Designer Perspective. ICADL 2004: 626-629 - [c3]Hideyasu Sasaki, Yasushi Kiyoki:
A Prototype Implementation of Metadata Generation for Image Retrieval. SAINT Workshops 2004: 460-466 - 2003
- [c2]Hideyasu Sasaki, Yasushi Kiyoki:
A Proposal for Digital Library Protection. JCDL 2003: 392 - 2002
- [c1]Hideyasu Sasaki, Yasushi Kiyoki:
Patenting the Processes for Content-Based Retrieval in Digital Libraries. ICADL 2002: 471-482
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint