Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Tetsuro MorimuraCyberAgent, Inc.Verified email at cyberagent.co.jp
Takayuki OsogamiIBMVerified email at jp.ibm.com
Atsushi SuzukiFujita Health UniversityVerified email at fujita-hu.ac.jp
Michiharu KudoIBMVerified email at jp.ibm.com
Hiroki YanagisawaCyberAgent, Inc.Verified email at cyberagent.co.jp
Itoko ToshinariIBM Research - TokyoVerified email at jp.ibm.com
Tsuyoshi IdeIBM T. J. Watson Research CenterVerified email at us.ibm.com
Kohei MiyaguchiIBM Research TokyoVerified email at ibm.com
Toshiya IwamoriIBMVerified email at jp.ibm.com
Kun ZhaoBoston Consulting Group (Gamma)Verified email at bcg.com
Robert JT MorrisNational University of SingaporeVerified email at nus.edu.sg
Daisuke SatoCarnegie Mellon UniversityVerified email at cmu.edu
Satoshi HaraProfessor, The University of Electro-CommunicationVerified email at uec.ac.jp
L Venkata SubramaniamIBM Research IndiaVerified email at in.ibm.com
A. Cristiano I. MalossiPrincipal Research Scientist and Manager @ IBM Research - ZurichVerified email at zurich.ibm.com
Yasunori YamadaIBM Research - TokyoVerified email at jp.ibm.com
Rudy RaymondJPMorgan ChaseVerified email at jpmchase.com
Roy AssafIBM Research ZurichVerified email at zurich.ibm.com
Thomas FrickPre-Doctoral Researcher, IBM Research ZurichVerified email at zurich.ibm.com
Mattia RigottiResearcher at IBM Research AIVerified email at columbia.edu