default search action
Motoi Iwashita
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Motoi Iwashita, Hirotaka Sugita:
Framework of Measuring Engagement with Access Logs Under Tracking Prevention for Affiliate Services. IEICE Trans. Inf. Syst. 106(9): 1452-1460 (2023) - [c62]Hiroaki Tsukamoto, Motoi Iwashita:
Tourist Route Recommendation Framework with Potential Travel Purposes. BCD 2023: 14-19 - [c61]Kohki Inaba, Motoi Iwashita:
A Consideration on countermeasure for avoiding congestion at tourist sites. BCD 2023: 20-25 - [c60]Takuya Iwami, Motoi Iwashita:
A Consideration of Trust Evaluation for Individual System Developers. BCD 2023: 102-107 - [c59]Masaki Shibuya, Motoi Iwashita, Ken Nishimatsu:
A Framework of feature extraction of influencers. IIAI-AAI 2023: 633-638 - 2022
- [j13]Yutaka Iwakami, Hironori Takuma, Motoi Iwashita:
Solving a restriction of Bayesian network in giving domain knowledge by introducing factor nodes. Int. J. Bus. Intell. Data Min. 20(4): 377-393 (2022) - [c58]Motoi Iwashita, Naoko Nomoto:
Using SNS for loan review at the bank. IIAI-AAI 2022: 555-560 - 2020
- [j12]Yutaka Iwakami, Hironori Takuma, Motoi Iwashita:
Properly initialized Bayesian Network for decision making leveraging random forest. Artif. Intell. Res. 9(1): 36- (2020) - [j11]Motoi Iwashita, Shigeaki Tanimoto, Kana Tsuchiya:
Highly Secure Transaction Mechanism for Video Affiliate Services. Rev. Socionetwork Strateg. 14(1): 77-91 (2020) - [j10]Yutaka Iwakami, Hironori Takuma, Motoi Iwashita:
Improving Matching Process with Expanding and Classifying Criterial Keywords leveraging Word Embedding and Hierarchical Clustering Methods. Rev. Socionetwork Strateg. 14(2): 193-204 (2020) - [j9]Motoi Iwashita:
A Framework of Matching Algorithm for Influencer Marketing. Rev. Socionetwork Strateg. 14(2): 227-246 (2020)
2010 – 2019
- 2019
- [j8]Motoi Iwashita:
Transitional Method for Identifying Improvements in Video Distribution Services. Int. J. Networked Distributed Comput. 7(4): 141-148 (2019) - [c57]Tenzin Kunga, Masataka Sano, Motoi Iwashita:
Improving the Quality of the Clinical Trial System through Comparative Study & Requirements Modeling Approaches. BCD 2019: 5-10 - [c56]Ken Nishimatsu, Akiya Inoue, Miiru Saito, Motoi Iwashita:
Choice Behavior Analysis of Internet Access Services Using Supervised Learning Models. BCD (selected papers) 2019: 99-114 - [c55]Motoi Iwashita:
Transitional Approach to Evaluate Customer Satisfaction for Video Distribution Services. BCD 2019: 106-111 - [c54]Akiya Inoue, Ayako Satoh, Ken Nishimatsu, Motoi Iwashita:
Mobile-Carrier & Mobile-Phone Choice Behavior Analysis Using Supervised Learning Models. BCD 2019: 160-165 - [c53]Shigeaki Tanimoto, Satomu Toriyama, Motoi Iwashita, Teruo Endo, Prajak Chertchom:
Secure Operation of Biometric Authentication Based on User's Viewpoint. BCD 2019: 166-171 - [c52]Prajak Chertchom, Shigeaki Tanimoto, Tsutomu Konosu, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Data Management Portfolio for Improvement of Privacy in Fog-to-cloud Computing Systems. IIAI-AAI 2019: 884-889 - [c51]Prajak Chertchom, Shigeaki Tanimoto, Tsutomu Konosu, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Edge Computing Platform Management: Design for F2C and F2F for Small Businesses to Reduce Costs. IIAI-AAI 2019: 890-895 - [c50]Motoi Iwashita:
A Proposal of Matching Algorithm for New Type of Advertisement Business Model. KES 2019: 1966-1975 - [c49]Motoi Iwashita:
Trend of Influencer Marketing and Future Required Functions. SNPD 2019: 2 - [e1]Motoi Iwashita, Atsushi Shimoda, Prajak Chertchom:
2019 IEEE International Conference on Big Data, Cloud Computing, Data Science & Engineering, BCD 2019, Honolulu, HI, USA, May 29-31, 2019. IEEE 2019, ISBN 978-1-7281-0886-5 [contents] - 2018
- [c48]Tenzin Kunga, Masataka Sano, Motoi Iwashita:
A Directional Comparative Analysis to Find Novel Approaches for Improving the Quality of the Clinical Trial System. IIAI-AAI 2018: 811-816 - [c47]Shigeaki Tanimoto, Chise Nakamura, Motoi Iwashita, Shinsuke Matsui, Takashi Hatashima, Hitoshi Fuji, Kazuhiko Ohkubo, Junichi Egawa, Yohsuke Kinouchi:
Proposal of Secure Business Architecture by Visible Light Communication System. IIAI-AAI 2018: 817-822 - [c46]Akiya Inoue, Ayako Satoh, Kenichi Kitahara, Motoi Iwashita:
Mobile-Carrier Choice Behavior Analysis Using Supervised Learning Models. IIAI-AAI 2018: 829-834 - [c45]Motoi Iwashita, Shigeaki Tanimoto, Kana Tsuchiya:
Framework of highly secure transaction management for affiliate services of video advertising. KES 2018: 1802-1809 - [c44]Shigeaki Tanimoto, Chise Nakamura, Motoi Iwashita, Shinsuke Matsui, Takashi Hatashima, Hitoshi Fuji, Kazuhiko Ohkubo, Junichi Egawa, Yohsuke Kinouchi:
Secure Visible Light Communication Business Architecture Based on Federation of ID Management. NBiS 2018: 578-589 - 2017
- [c43]Motoi Iwashita:
A Key Factor of ICT-related New Service Design. ACIT/CSII/BCD 2017: 41-46 - [c42]Motoi Iwashita, Yutaka Shirai:
A Consideration of System Architecture for Tour Planning Support. IIAI-AAI 2017: 269-274 - [c41]Shigeaki Tanimoto, Shun Totsuka, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:
Risk Assessment for Privacy Protection of Information Literacy Beginners in Big Data Era. NBiS 2017: 737-749 - [c40]Akiya Inoue, Kenichi Kitahara, Motoi Iwashita:
Mobile-carrier choice behavior analysis between three major mobile-carriers and mobile virtual network operators. SNPD 2017: 501-506 - [c39]Motoi Iwashita:
Transitional approach to evaluate customer satisfaction for e-Books. SNPD 2017: 513-518 - 2016
- [j7]Motoi Iwashita, Akiya Inoue, Takeshi Kurosawa, Ken Nishimatsu:
Efficient microarea selection algorithm for infrastructure installation of broadband services. Int. J. Comput. Intell. Stud. 5(3/4): 219-236 (2016) - [j6]Motoi Iwashita, Shigeaki Tanimoto:
Service and Billing Management Method for ICT Services. Int. J. Softw. Innov. 4(2): 1-16 (2016) - [c38]Akiya Inoue, Motoi Iwashita, Kenichi Kitahara:
Behavior analysis on mobile-carrier choice considering Mobile Virtual Network Operators. ICIS 2016: 1-6 - [c37]Motoi Iwashita, Shinichi Kato:
Local revitalization model based on soft systems methodology. ICIS 2016: 1-6 - [c36]Shigeaki Tanimoto, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:
Risk assessment quantification of social-media utilization in enterprise. ICIS 2016: 1-6 - [c35]Motoi Iwashita, Shigeaki Tanimoto:
Highly secure transaction system for affiliate marketing. GCCE 2016: 1-3 - [c34]Shigeaki Tanimoto, Susumu Yamada, Motoi Iwashita, Toru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Risk assessment of BYOD: Bring your own device. GCCE 2016: 1-4 - [c33]Motoi Iwashita:
Evaluating Customer Satisfaction with e-Books. IIAI-AAI 2016: 1114-1119 - [c32]Shigeaki Tanimoto, Rei Kinno, Motoi Iwashita, Tohru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Risk Assessment of Home Gateway/Smart Meter in Smart Grid Service. IIAI-AAI 2016: 1126-1131 - [c31]Shigeaki Tanimoto, Shunsuke Shiraki, Motoi Iwashita, Tohru Kobayashi, Hiroyuki Sato, Atsushi Kanai:
Risk Assessment Based on User's Viewpoint for Mobile Ad Hoc Network. NBiS 2016: 280-285 - 2015
- [c30]Akiya Inoue, Mizuki Saito, Motoi Iwashita:
Behavior Analysis on Mobile-Carrier Choice & Mobile-Phone Purchase. ACIT-CSI 2015: 422-427 - [c29]Motoi Iwashita, Shigeaki Tanimoto:
Consideration of Highly Secure Transaction System in E-Commerce. ACIT-CSI 2015: 432-437 - [c28]Motoi Iwashita, Akiya Inoue, Takeshi Kurosawa, Ken Nishimatsu:
Efficient Method to Determine Microarea with High Potential Demand for Broadband Services. KES 2015: 1728-1737 - [c27]Motoi Iwashita, Shigeaki Tanimoto:
Service and billing management method of interactive communication services. SNPD 2015: 549-554 - [c26]Shigeaki Tanimoto, Kenichi Ohata, Shoichi Yoneda, Motoi Iwashita, Hiroyuki Sato, Yoshiaki Seki, Atsushi Kanai:
Risk assessment of social-media utilization in an enterprise. SNPD 2015: 577-580 - [c25]Motoi Iwashita, Shigeaki Tanimoto:
A method for service and billing management using connection paths. SNPD 2015: 632-638 - 2014
- [c24]Shigeaki Tanimoto, Ryota Sato, Kazuhiko Kato, Motoi Iwashita, Yoshiaki Seki, Hiroyuki Sato, Atsushi Kanai:
A Study of Risk Assessment Quantification in Cloud Computing. NBiS 2014: 426-431 - [c23]Motoi Iwashita, Takeshi Kurosawa, Akiya Inoue, Ken Nishimatsu:
An improvement of micro area selection technique for the diffusion of ICT infrastructure. SNPD 2014: 1-6 - [c22]Shigeaki Tanimoto, Ken Takahashi, Taro Yabuki, Kazuhiko Kato, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai:
Risk assessment quantification in life log service. SNPD 2014: 1-6 - 2013
- [c21]Shigeaki Tanimoto, Yosiaki Seki, Motoi Iwashita, Shinsuke Matsui, Yoshimasa Kimura, Yohsuke Kinouchi:
A study of requirement definition in user-oriented virtual network architecture. ICIS 2013: 4-9 - [c20]Motoi Iwashita, Shigeaki Tanimoto, Yuga Fujinoki:
Approaches to analyze requirements of billing management for cloud computing services. ICIS 2013: 17-22 - [c19]Shigeaki Tanimoto, Yorihiro Sakurada, Yosiaki Seki, Motoi Iwashita, Shinsuke Matsui, Hiroyuki Sato, Atsushi Kanai:
A Study of Data Management in Hybrid Cloud Configuration. SNPD 2013: 381-386 - [c18]Motoi Iwashita, Shigeaki Tanimoto:
Consideration of Billing Management Method for Cloud Computing Services. SNPD 2013: 394-399 - [c17]Akiya Inoue, Motoi Iwashita, Takeshi Kurosawa, Ken Nishimatsu:
Mobile-Carrier Choice Behavior Analysis Around Smart Phone Market. SNPD 2013: 400-405 - 2012
- [j5]Akiya Inoue, Yuuki Takano, Takeshi Kurosawa, Motoi Iwashita, Ken Nishimastu:
Mobile-carrier Choice Modeling Framework Under Competitive Conditions. Inf. Media Technol. 7(3): 1259-1265 (2012) - [j4]Akiya Inoue, Yuuki Takano, Takeshi Kurosawa, Motoi Iwashita, Ken Nishimatsu:
Mobile-carrier Choice Modeling Framework Under Competitive Conditions. J. Inf. Process. 20(3): 585-591 (2012) - [c16]Motoi Iwashita:
A Framework of Time-Series Analysis Method for ICT Service Diffusion using Textual Data. KES 2012: 2070-2079 - [c15]Motoi Iwashita:
A Consideration of Micro Area Selection Technique for the Diffusion of ICT Infrastructure. SNPD 2012: 735-739 - [c14]Satoshi Nakano, Akiya Inoue, Kiyotaka Otsuka, Takeshi Kurosawa, Motoi Iwashita, Ken Nishimatsu:
Mobile-Carrier Churning Behavior Modeling Based on Customer Satisfaction. SNPD 2012: 760-765 - [c13]Akiya Inoue, Ryouhei Nagahata, Yuuta Ishii, Masaya Dobashi, Rei Kaku, Motoi Iwashita:
Mobile Internet-Access Behavior Analysis. SNPD 2012: 766-770 - [c12]Shigeaki Tanimoto, Daisuke Sakurai, Yosiaki Seki, Motoi Iwashita, Hiroyuki Sato, Atsushi Kanai:
Risk Management to User Perception of Insecurity in Ambient Service. SNPD 2012: 771-776 - 2011
- [j3]Motoi Iwashita, Shinsuke Shimogawa, Ken Nishimatsu:
Semantic analysis and classification method for customer enquiries in telecommunication services. Eng. Appl. Artif. Intell. 24(8): 1521-1531 (2011) - [j2]Takeshi Kurosawa, Denis Bolduc, Moshe E. Ben-Akiva, Akiya Inoue, Ken Nishimatsu, Motoi Iwashita:
Demand Analysis by Modeling Choice of Internet Access and IP Telephony. Int. J. Inf. Syst. Serv. Sect. 3(3): 1-26 (2011) - [c11]Motoi Iwashita:
A Consideration of an Area Classification Method for ICT Service Diffusion. KES (3) 2011: 256-264 - [c10]Takeshi Kurosawa, Shinsuke Shimogawa, Motoi Iwashita, Shouji Kouno:
An Analysis of the Relationship between a Speed of the Internet Access and Internet Access Line Switching. KES (3) 2011: 275-284 - 2010
- [j1]Motoi Iwashita, Ken Nishimatsu, Takeshi Kurosawa, Shinsuke Shimogawa:
Broadband Demand Analysis for Network Building. Rev. Socionetwork Strateg. 4(1): 17-28 (2010) - [c9]Shinsuke Shimogawa, Motoi Iwashita:
Method for Analyzing Sociodynamics of Telecommunication-Based Services. ACIS-ICIS 2010: 99-104 - [c8]Masatsugu Ichino, Hiroaki Maeda, Takeshi Yamashita, Kentaro Hoshi, Naohisa Komatsu, Kei Takeshita, Masayuki Tsujino, Motoi Iwashita, Hideaki Yoshino:
Internet Traffic Classification Using Score Level Fusion of Multiple Classifier. ACIS-ICIS 2010: 105-110 - [c7]Yuuki Takano, Akiya Inoue, Takeshi Kurosawa, Motoi Iwashita, Ken Nishimatsu:
Customer Segmentation in Mobile Carrier Choice Modeling. ACIS-ICIS 2010: 111-116 - [c6]Takeshi Kurosawa, Hiromichi Kawano, Motoi Iwashita, Shinsuke Shimogawa, Shouji Kouno, Akiya Inoue:
Econometric Approach for Broadband Market in Japan. KES (3) 2010: 225-234 - [p1]Hiroyuki Kitada, Takumi Miyoshi, Akihiro Shiozu, Masayuki Tsujino, Motoi Iwashita, Hideaki Yoshino:
General Flow Characteristics of P2P Streaming Considering Impact to Network Load. Computer and Information Science 2010: 73-83
2000 – 2009
- 2009
- [c5]Motoi Iwashita, Shinsuke Shimogawa, Ken Nishimatsu:
Text Mining for Customer Enquiries in Telecommunication Services. KES (2) 2009: 228-235 - 2008
- [c4]Motoi Iwashita, Ken Nishimatsu, Shinsuke Shimogawa:
Semantic Analysis Method for Unstructured Data in Telecom Services. ICDM Workshops 2008: 789-795 - [c3]Motoi Iwashita, Ken Nishimatsu, Shinsuke Shimogawa:
Using Co-Occurrence to Classify Unstructured Data in Telecommunication Services. ICE-B 2008: 12-17 - [c2]Motoi Iwashita, Ken Nishimatsu, Shinsuke Shimogawa:
Method for Classification of Unstructured Data in Telecommunication Services. ICETE (Selected Papers) 2008: 49-60 - 2007
- [c1]Takeshi Kurosawa, Ken Nishimatsu, Motoi Iwashita, Akiya Inoue:
Customer Behavior Modeling under Several Decision-Making Processes by using EM Algorithm. ICE-B 2007: 339-346
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint