Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Koichi TakedaNational Institute of InformaticsVerified email at nii.ac.jp
Hiroya TAKAMURAProfessor, Tokyo Institute of TechnologyVerified email at pi.titech.ac.jp
Sadao KurohashiKyoto UniversityVerified email at i.kyoto-u.ac.jp
Kosuke YamadaCyberagent Inc.Verified email at cyberagent.co.jp
Daisuke KawaharaWaseda UniversityVerified email at waseda.jp
Hayato TsukagoshiGraduate School of Informatics, Nagoya UniversityVerified email at s.mail.nagoya-u.ac.jp
Yuta KikuchiPreferred Networks, Inc.Verified email at preferred.jp
Thai-Hoang PhamOhio State UniversityVerified email at osu.edu
Satoshi SekineRIKEN, AIPVerified email at riken.jp
Graham NeubigCarnegie Mellon University, All Hands AIVerified email at cs.cmu.edu
Hajime MoritaFujitsu Laboratories LtdVerified email at jp.fujitsu.com
Hongkuan ZhangNagoya UniversityVerified email at a.mbox.nagoya-u.ac.jp
Tsutomu HiraoKanazawa universityVerified email at se.kanazawa-u.ac.jp
Danushka BollegalaProfessor, The University of Liverpool, DMML, Amazon.comVerified email at amazon.com
Mitsumasa Kubo株式会社GunosyVerified email at gunosy.com
Kevin DuhJohns Hopkins UniversityVerified email at cs.jhu.edu
Shinji WatanabeCarnegie Mellon UniversityVerified email at cmu.edu
Kentaro InuiMBZUAI, Tohoku University, RIKENVerified email at mbzuai.ac.ae
Akihiko WatanabeTokyo Institute of TechnologyVerified email at lr.pi.titech.ac.jp
Masaaki NagataNTT CorporationVerified email at hco.ntt.co.jp
Follow