default search action
Mariko Hagita
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Takayuki Itoh, Asuka Nakabayashi, Mariko Hagita:
Multidimensional data visualization applying a variety-oriented scatterplot selection technique. J. Vis. 26(1): 199-210 (2023) - 2021
- [c4]Takayuki Itoh, Asuka Nakabayashi, Mariko Hagita:
Scatterplot Selection Applying a Graph Coloring Algorithm. VINCI 2021: 2:1-2:6 - 2020
- [i2]Takayuki Itoh, Asuka Nakabayashi, Mariko Hagita:
Scatterplot Selection Applying a Graph Coloring Problem. CoRR abs/2009.07342 (2020)
2010 – 2019
- 2017
- [c3]Erika Gomi, Yuri Saito, Takayuki Itoh, Mariko Hagita, Masahiro Takatsuka:
A Technique for Ranking and Visualization of Crowd-Powered Subjective Evaluations. IV 2017: 52-56
2000 – 2009
- 2008
- [j9]Mariko Hagita, Makoto Matsumoto, Fumio Natsu, Yuki Ohtsuka:
Error Correcting Sequence and Projective De Bruijn Graph. Graphs Comb. 24(3): 185-194 (2008) - [c2]Yuki Ohtsuka, Makoto Matsumoto, Mariko Hagita:
Projective de Bruijn Sequences. SETA 2008: 167-174 - [p1]Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita:
CryptMT3 Stream Cipher. The eSTREAM Finalists 2008: 7-19 - 2007
- [c1]Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita:
A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software. Selected Areas in Cryptography 2007: 246-263 - 2005
- [i1]Makoto Matsumoto, Takuji Nishimura, Mariko Hagita, Mutsuo Saito:
CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER. IACR Cryptol. ePrint Arch. 2005: 165 (2005) - 2003
- [j8]Kiyoshi Ando, Mariko Hagita, Atsushi Kaneko, Mikio Kano, Ken-ichi Kawarabayashi, Akira Saito:
Cycles having the same modularity and removable edges in 2-connected graphs. Discret. Math. 265(1-3): 23-30 (2003) - [j7]Yoshimi Egawa, Mariko Hagita, Ken-ichi Kawarabayashi, Hong Wang:
Covering vertices of a graph by k disjoint cycles. Discret. Math. 270(1-3): 114-124 (2003) - [j6]Mariko Hagita, André Kündgen, Douglas B. West:
Probabilistic Methods for Decomposition Dimension of Graphs. Graphs Comb. 19(4): 493-503 (2003) - 2002
- [j5]Mariko Hagita, Yoshiaki Oda, Katsuhiro Ota:
The Diameters of Some Transition Graphs Constructed from Hamilton Cycles. Graphs Comb. 18(1): 105-117 (2002) - 2001
- [j4]Mariko Hagita, Bernhard Schmidt:
Bijections Between Group Rings Preserving Character Sums. Des. Codes Cryptogr. 24(3): 243-254 (2001) - 2000
- [j3]Hikoe Enomoto, Mariko Hagita:
Toughness and the existence of k-factors. IV. Discret. Math. 216(1-3): 111-120 (2000)
1990 – 1999
- 1999
- [j2]Mariko Hagita:
Foldings of Difference Sets in Abelian Groups. Graphs Comb. 15(2): 187-193 (1999) - 1998
- [j1]Hikoe Enomoto, Mariko Hagita, Makoto Matsumoto:
A Note on Difference Sets. J. Comb. Theory A 84(2): 133-144 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint