default search action
Yoshikatsu Fujita
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j7]Hiroki Hara, Yoshikatsu Fujita, Kazuhiko Tsuda:
Population estimation using Twitter for a specific space. Data Technol. Appl. 55(3): 430-445 (2021) - [c20]Hiroki Hara, Tomohiko Harada, Yoshikatsu Fujita, Kazuhiko Tsuda:
A Method of Classification Twitter Posting Location for a Specific Space. KES 2021: 2365-2374 - 2020
- [c19]Hiroki Hara, Yoshikatsu Fujita, Kazuhiko Tsuda:
Population estimation by random forest analysis using Social Sensors. KES 2020: 1893-1902
2010 – 2019
- 2019
- [c18]Eiji Kano, Yoshikatsu Fujita, Kazuhiko Tsuda:
A Method of Extracting and Classifying Local Community Problems from Citizen-Report Data using Text Mining. KES 2019: 1347-1356 - 2018
- [c17]Shinji Akatsu, Yoshikatsu Fujita, Takumi Kato, Kazuhiko Tsuda:
Structured analysis of the evaluation process for adopting open-source software. KES 2018: 1578-1586 - 2015
- [j6]Koji Tanaka, Chikako Morimoto, Yoshikatsu Fujita, Kazuhiko Tsuda:
The optimal configuration method of software engineer to IT project. Int. J. Comput. Appl. Technol. 52(2/3): 177-185 (2015) - [j5]Tomohiko Harada, Kazuhiko Tsuda, Nobuo Suzuki, Yoshikatsu Fujita:
The estimate method of the omission of Japanese inquiry texts using an LDA algorithm. Int. J. Comput. Appl. Technol. 52(2/3): 186-195 (2015) - [j4]Takashi Ikoma, Yoshikatsu Fujita, Masakazu Takahashi, Kazuhiko Tsuda:
Towards effects estimation of ethical medicine from the package inserts with text mining. Int. J. Intell. Syst. Technol. Appl. 14(3/4): 188-204 (2015) - [c16]Takashi Ikoma, Yoshikatsu Fujita, Masakazu Takahashi, Kazuhiko Tsuda:
An Efficient Prediction Model for OTC Medicine Effect with the Package Inserts Information. KES 2015: 800-807 - [c15]Hiromi Asano, Koji Tanaka, Yoshikatsu Fujita, Kazuhiko Tsuda:
Study on Hiring Decision: Analyzing Rejected Applicants by Mining Individual Job Placement Data of Public Employment Security Offices. KES 2015: 1156-1163 - [c14]Tsuyoshi Shida, Yoshikatsu Fujita, Kazuhiko Tsuda:
Knowledge Construction for Efficient Man-month Estimation in Software Development. KES 2015: 1738-1744 - 2013
- [j3]Koichi Tsujii, Yoshikatsu Fujita, Kazuhiko Tsuda:
Attention information extraction of the foreign visitors using Text Mining. Int. J. Intell. Syst. Technol. Appl. 12(3/4): 194-206 (2013) - [c13]Koichi Tsujii, Yoshikatsu Fujita, Kazuhiko Tsuda:
The Extraction Method of the Service Improvement Information from Guests' Review. KES 2013: 1303-1310 - [c12]Tomohiko Harada, Yoshikatsu Fujita, Kazuhiko Tsuda:
The Prediction of Ellipses Using Topic Model for Japanese Colloquial Inquiry Text. KES 2013: 1311-1318 - [c11]Takashi Ikoma, Yoshikatsu Fujita, Kazuhiko Tsuda:
Text Mining for the Verification of Scientific Effectiveness of Drugs. SITIS 2013: 944-949 - 2012
- [c10]Nobuo Suzuki, Yoshikatsu Fujita, Kazuhiko Tsuda:
Effective Extraction Method of Loss Aversion Utterances based on the Expected Utility. KES 2012: 833-840 - 2011
- [c9]Nobuo Suzuki, Yoshikatsu Fujita, Kazuhiko Tsuda:
Extraction Method of the Mutual Understanding Gap Based on Egocentrism in Short Dialogues. KES (3) 2011: 378-384
2000 – 2009
- 2009
- [c8]Yoshikatsu Fujita, Yasufumi Saruwatari, Masakazu Takahashi, Kazuhiko Tsuda:
Cover All Query Diffusion Strategy over Unstructured Overlay Network. KES (2) 2009: 278-284 - 2008
- [j2]Yoshikatsu Fujita, Daisuke Mori, Yasufumi Saruwatari, Kazuhiko Tsuda:
Reverse-query diffusion over unstructured overlay network for content delivery. Int. J. Comput. Appl. Technol. 33(2/3): 131-137 (2008) - [j1]Masakazu Takahashi, Satoru Takahashi, Yoshikatsu Fujita:
A development method of UML documents from requirement specifications using NLP. Int. J. Comput. Appl. Technol. 33(2/3): 164-175 (2008) - [c7]Masakazu Takahashi, Satoru Takahashi, Yoshikatsu Fujita:
A Method for Ensuring Consistency of Software Design Information in Retrospective Computer Validation. KES (2) 2008: 994-1001 - 2007
- [c6]Masakazu Takahashi, Satoru Takahashi, Yoshikatsu Fujita:
A Proposal of Adequate and Efficient Designing of UML Documents for Beginners. KES (2) 2007: 1331-1338 - [c5]Yoshikatsu Fujita, Yasufumi Saruwatari, Jun Yoshida, Kazuhiko Tsuda:
Query Message Delivery over Community-Based Overlay Network. KES (2) 2007: 1354-1361 - 2006
- [c4]Yoshikatsu Fujita, Yasufumi Saruwatari, Jun Yoshida, Kazuhiko Tsuda:
Efficient Stream Delivery over Unstructured Overlay Network by Reverse-Query Propagation. KES (2) 2006: 281-288 - 2005
- [c3]Yoshikatsu Fujita, Jun Yoshida, Kazuhiko Tsuda:
Reverse-Query Mechanism for Contents Delivery Management in Distributed Agent Network. KES (4) 2005: 758-764 - 2004
- [c2]Keiichiro Mitani, Yoshikatsu Fujita, Kazuhiko Tsuda:
A Study of a Constructing Automatic Updating System for Government Web Pages. KES 2004: 480-486 - [c1]Yoshikatsu Fujita, Jun Yoshida, Kenichi Yoshida, Kazuhiko Tsuda:
Network Information Mining for Content Delivery Route Control in P2P Network. KES 2004: 516-522
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint