Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Yoichi SatoProfessor, Institute of Industrial Science, The University of TokyoVerified email at iis.u-tokyo.ac.jp
- Andreas BullingProfessor of Computer Science, University of StuttgartVerified email at vis.uni-stuttgart.de
- Xucong ZhangAssistant Professor, Delft University of TechnologyVerified email at tudelft.nl
- Yasuyuki MatsushitaOsaka UniversityVerified email at ist.osaka-u.ac.jp
- Takahiro OkabeKyushu Institute of TechnologyVerified email at ai.kyutech.ac.jp
- Feng LuProfessor, Beihang UniversityVerified email at buaa.edu.cn
- Mario FritzFaculty CISPA Helmholtz Center for Information Security; Professor Saarland UniversityVerified email at cispa.de
- Akihiro SugimotoNational Institute of InformaticsVerified email at nii.ac.jp
- Yifei HuangThe University of TokyoVerified email at ut-vision.org
- Julian SteilRobert Bosch GmbHVerified email at de.bosch.com
- Masaki SamejimaVerified email at datastax.com
- Hiroaki SantoOsaka UniversityVerified email at ist.osaka-u.ac.jp
- Tadas Baltru¹aitisScientist, MicrosoftVerified email at microsoft.com
- Erroll WoodGoogleVerified email at google.com
- Peter RobinsonProfessor of Computer Technology, University of CambridgeVerified email at cam.ac.uk
- Hideki KoikeTokyo Institute of TechnologyVerified email at c.titech.ac.jp
- Kazuo Hiraki 開 一夫The University of TokyoVerified email at idea.c.u-tokyo.ac.jp
- Keisuke OGAKIM3, Inc.Verified email at dwango.co.jp
- Boxin ShiPeking UniversityVerified email at pku.edu.cn
- Daisuke SugimuraAssociate Professor, Tokyo Metropolitan UniversityVerified email at tsuda.ac.jp
Follow
Yusuke Sugano
Institute of Industrial Science, The University of Tokyo
Verified email at iis.u-tokyo.ac.jp - Homepage