default search action
Michiharu Kudo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c28]Mohamed F. Ghalwash, Prithwish Chakraborty, Akira Koseki, Hiroki Yanagisawa, Toshiya Iwamori, Ray Tokumasu, Masaki Makino, Ryosuke Yanagiya, Atsushi Suzuki, Michiharu Kudo, Daby Sow:
A Comparative Time-to-Event Analysis Across Health Systems. AMIA 2021
2010 – 2019
- 2018
- [c27]Takayuki Katsuki, Masaki Ono, Akira Koseki, Michiharu Kudo, Kyoichi Haida, Jun Kuroda, Masaki Makino, Ryosuke Yanagiya, Atsushi Suzuki:
Feature Extraction from Electronic Health Records of Diabetic Nephropathy Patients with Convolutioinal Autoencoder. AAAI Workshops 2018: 451-454 - [c26]Takayuki Katsuki, Takayuki Osogami, Akira Koseki, Masaki Ono, Michiharu Kudo, Masaki Makino, Atsushi Suzuki:
Time-Discounting Convolution for Event Sequences with Ambiguous Timestamps. ICDM 2018: 1085-1090 - [c25]Takayuki Katsuki, Masaki Ono, Akira Koseki, Michiharu Kudo, Kyoichi Haida, Jun Kuroda, Masaki Makino, Ryosuke Yanagiya, Atsushi Suzuki:
Risk Prediction of Diabetic Nephropathy via Interpretable Feature Extraction from EHR Using Convolutional Autoencoder. MIE 2018: 106-110 - [c24]Hiroaki Nakamura, Kohtaroh Miyamoto, Michiharu Kudo:
Inter-organizational Business Processes Managed by Blockchain. WISE (1) 2018: 3-17 - [i2]Takayuki Katsuki, Takayuki Osogami, Akira Koseki, Masaki Ono, Michiharu Kudo, Masaki Makino, Atsushi Suzuki:
Time-Discounting Convolution for Event Sequences with Ambiguous Timestamps. CoRR abs/1812.02395 (2018) - 2016
- [c23]Mari Abe, Michiharu Kudo:
Analyzing Business Processes by Automatically Detecting KPI Thresholds. SCC 2016: 187-194 - [c22]Michiharu Kudo, Kumiko Maeda, Fumiko Satoh:
Adaptable Privacy-Preserving Data Curation for Business Process Analysis Services. SCC 2016: 411-418 - 2014
- [c21]Mari Abe, Michiharu Kudo:
Business Monitoring Framework for Process Discovery with Real-Life Logs. BPM 2014: 416-423 - [c20]Michiharu Kudo:
Operational Work Pattern Discovery Based on Human Behavior Analysis. SRII Global Conference 2014: 90-97 - 2013
- [c19]Michiharu Kudo, Ai Ishida, Naoto Sato:
Business Process Discovery by Using Process Skeletonization. SITIS 2013: 976-982 - [c18]Michiharu Kudo, Takahide Nogayama, Ai Ishida, Mari Abe:
Business Process Analysis and Real-world Application Scenarios. SITIS 2013: 983-989 - 2012
- [c17]Jonathan Connell, Etienne Marcheret, Sharath Pankanti, Michiharu Kudo, Risa Nishiyama:
An Extensible Language Interfacefor Robot Manipulation. AGI 2012: 21-30 - [c16]Michiharu Kudo:
Robot-Assisted Healthcare Support for an Aging Society. SRII Global Conference 2012: 258-266
2000 – 2009
- 2009
- [c15]Yasuharu Katsuno, Yuji Watanabe, Michiharu Kudo, Eiji Okamoto:
A Pluggable Domain Management Approach for Building Practical Distributed Coalitions. ARES 2009: 1-8 - 2008
- [j4]Seiji Munetoh, Megumi Nakamura, Sachiko Yoshihama, Michiharu Kudo:
Integrity Management Infrastructure for Trusted Computing. IEICE Trans. Inf. Syst. 91-D(5): 1242-1251 (2008) - [c14]Yasuhito Arimoto, Michiharu Kudo, Yuji Watanabe, Kokichi Futatsugi:
Checking assignments of controls to risks for internal control. ICEGOV 2008: 98-104 - [p3]Naizhen Qi, Michiharu Kudo:
Access Control Policy Languages in XML. Handbook of Database Security 2008: 55-71 - [i1]Vaibhav Gowadia, Csilla Farkas, Michiharu Kudo:
Checking Security Policy Compliance. CoRR abs/0809.5266 (2008) - 2007
- [j3]Michiharu Kudo, Yoshio Araki, Hiroshi Nomiyama, Shin Saito, Yukihiko Sohda:
Best practices and tools for personal information compliance management. IBM Syst. J. 46(2): 235-254 (2007) - [c13]Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudo, Kazuko Oyanagi:
Dynamic Information Flow Control Architecture for Web Applications. ESORICS 2007: 267-282 - [c12]Takuya Mishina, Sachiko Yoshihama, Michiharu Kudo:
Fine-Grained Sticky Provenance Architecture for Office Documents. IWSEC 2007: 336-351 - [c11]Yasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi, Michiharu Kudo:
Chinese-wall process confinement for practical distributed coalitions. SACMAT 2007: 225-234 - [p2]Michiharu Kudo, Naizhen Qi:
Access Control Policy Models for XML. Secure Data Management in Decentralized Systems 2007: 97-126 - 2006
- [j2]Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada:
XML access control using static analysis. ACM Trans. Inf. Syst. Secur. 9(3): 292-324 (2006) - [c10]Yasuharu Katsuno, Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo:
Layering negotiations for flexible attestation. STC 2006: 17-20 - [c9]Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama:
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. ESORICS 2006: 65-80 - 2005
- [c8]Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid Pirahesh:
A function-based access control model for XML databases. CIKM 2005: 115-122 - [c7]Naizhen Qi, Michiharu Kudo:
XML Access Control with Policy Matching Tree. ESORICS 2005: 3-23 - 2004
- [c6]Naizhen Qi, Michiharu Kudo:
Access-Condition-Table-Driven Access Control for XML Databases. ESORICS 2004: 17-32 - 2003
- [c5]Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada:
XML access control using static analysis. CCS 2003: 73-84 - [c4]Manabu Ando, Kanta Matsuura, Michiharu Kudo, Akira Baba:
An Architecture of a Secure Database for Networked Collaborative Activities. ICEIS (1) 2003: 3-10 - [e2]Sushil Jajodia, Michiharu Kudo:
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003. ACM 2003, ISBN 1-58113-777-X [contents] - 2002
- [j1]Michiharu Kudo:
PBAC: Provision-based access control model. Int. J. Inf. Sec. 1(2): 116-130 (2002) - [e1]Michiharu Kudo:
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002. ACM 2002, ISBN 1-58113-632-3 [contents] - 2001
- [p1]Sushil Jajodia, Michiharu Kudo, V. S. Subrahmanian:
Provisional Authorizations. E-Commerce Security and Privacy 2001: 133-159 - 2000
- [c3]Michiharu Kudo, Satoshi Hada:
XML document security based on provisional authorization. CCS 2000: 87-96
1990 – 1999
- 1999
- [c2]Michiharu Kudo, Anish Mathuria:
An Extended Logic for Analyzing Timed-Release Public-Key Protocols. ICICS 1999: 183-198 - 1998
- [c1]Michiharu Kudo:
Electronic Submission Protocol Based on Temporal Accountability. ACSAC 1998: 353-363
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint