Yuji Yamaoka

Learn More
To enculturate conversational interfaces it is indespensable to gain insights in culture specific differences of interaction patterns. Information found in the literature is often very general or more of an anecdotal character. In this paper we present a corpus of culture specific interaction patterns that was collected under standardized conditions in(More)
Threat trees are notable tools in the security analysis process called "threat modeling"'. The trees are used to identify how and under what condition threats can be realized, which will help proper estimation of risks and planning of countermeasures. However, it is difficult for an average analyst to construct adequate trees, because security expertise,(More)
We have developed a mechanism which prevents abuse of trusted Java applets, such as digitally signed applets. A signed applet is usually permitted by a user to perform certain functions. However, an attacker may improperly recompose the signed applet to include malicious components and harm the user by abusing such functions of a signed applet. In this(More)
The development of the GPS has recently increased the demand for the beneficial services from the mobile users' location data. If the location data are collected from various organizations, more beneficial services will be provided. However, the organizations are never able to share their location data, because they must avoid their users' privacy(More)
EDITORIAL In this digital age, Multimodal Interfaces are extending and replacing mechanical and electrical instruments. Impressive results have been achieved and new challenging applications are foreseen in fields like medicine, assistance to disabled persons, communication, design, performing arts, games, and many other types of human activity involving(More)
Data anonymization is required before a big-data business can run effectively without compromising the privacy of personal information it uses. It is not trivial to choose the best algorithm to anonymize some given data securely for a given purpose. In accurately assessing the risk of data being compromised, there needs to be a balance between utility and(More)