default search action
Ushio Sumita
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j20]Kazuki Fujiwara, Maiko Shigeno, Ushio Sumita:
A New Approach for Developing Segmentation Algorithms for Strongly Imbalanced Data. IEEE Access 7: 82970-82977 (2019) - 2016
- [c6]Shan Yu, Ryohei Kubota, Masaki Shobu, Ushio Sumita:
Development and Analysis of Markov Chain Model for Optimally Allocating Operators at Call Centers. IIAI-AAI 2016: 462-467 - [c5]Xinlong Hu, Shan Yu, Masaki Shobu, Ushio Sumita:
Development of Recommendation Engines for Enhancing Sales of DIY (Do It Yourself) Stores. IIAI-AAI 2016: 468-473 - [c4]Ryohei Kubota, Xinlong Hu, Masaki Shobu, Ushio Sumita:
Development of Segmentation Algorithm for Identifying VOCs (Voice of Customers) with Sales Potential and Those with Negative Attitude at Call Centers. IIAI-AAI 2016: 478-481 - 2015
- [j19]Jia-Ping Huang, Ushio Sumita:
Development of computational algorithms for pricing European bond options under the influence of macro-economic conditions. Appl. Math. Comput. 251: 453-468 (2015) - 2013
- [c3]Ushio Sumita, Jun Yoshii:
How to Equip Students with Methodologies and Tools for Capturing Rapidly Changing Environments through Computer Supported Education. CSEDU 2013: 493-496 - 2012
- [c2]Sumika Arima, Ushio Sumita, Jun Yoshii:
Development of Sequential Association Rules for Preventing Minor-stoppages in Semi-conductor Manufacturing. ICORES 2012: 349-354 - 2011
- [j18]Hideyuki Takada, Ushio Sumita:
Credit risk model with contagious default dependencies affected by macro-economic condition. Eur. J. Oper. Res. 214(2): 365-379 (2011) - 2010
- [j17]Ushio Sumita, Jun Yoshii:
Enhancement of e-commerce via mobile accesses to the Internet. Electron. Commer. Res. Appl. 9(3): 217-227 (2010) - [j16]Ushio Sumita, Jinshui Zuo:
The impact of mobile access to the internet on information search completion time and customer conversion. Electron. Commer. Res. Appl. 9(5): 410-417 (2010)
2000 – 2009
- 2009
- [j15]Ushio Sumita, Jia-Ping Huang:
Dynamic Analysis of a Unified Multivariate Counting Process and Its Asymptotic Behavior. Int. J. Math. Math. Sci. 2009: 219532:1-219532:43 (2009) - 2008
- [j14]Makoto Mizuno, Akira Saji, Ushio Sumita, Hideo Suzuki:
Optimal threshold analysis of segmentation methods for identifying target customers. Eur. J. Oper. Res. 186(1): 358-379 (2008) - 2001
- [j13]Ushio Sumita, Yasushi Masuda, Shigetaka Yamakawa:
Optimal internal pricing and capacity planning for service facility with finite buffer. Eur. J. Oper. Res. 128(1): 192-205 (2001)
1990 – 1999
- 1998
- [j12]K. Cheng Hsing, Marshall L. Freimer, William B. Richmond, Ushio Sumita:
Optimal repair of degrading computers under asymmetric information and incentive incompatibility. Comput. Oper. Res. 25(9): 719-728 (1998) - 1995
- [j11]Paulo B. Góes, Ushio Sumita:
Stochastic Models for Performance Analysis of Database Recovery Control. IEEE Trans. Computers 44(4): 561-576 (1995) - 1992
- [j10]Qiu-Sheng Liu, Katsuhisa Ohno, Ushio Sumita:
Structural properties of optimal tool replacement policy in a machining center. Oper. Res. Lett. 11(3): 179-185 (1992) - [j9]Ushio Sumita, Yasushi Masuda:
Analysis of multivariate Markov modulated Poisson processes. Oper. Res. Lett. 12(1): 37-45 (1992) - [j8]Paulo B. Góes, Hironao Kawashima, Ushio Sumita:
Analysis of a new thruway communication system with discrete minimal zones. IEEE Trans. Commun. 40(4): 754-764 (1992) - 1991
- [j7]Paul J. Schweitzer, Ushio Sumita, Katsuhisa Ohno:
Replacement process decomposition for discounted Markov renewal programming. Ann. Oper. Res. 29(1): 631-645 (1991) - [j6]Yasushi Masuda, Ushio Sumita:
Numerical analysis of gracefully degrading fault-tolerant computer systems: Semi-markov and laguerre transform approach. Comput. Oper. Res. 18(8): 695-707 (1991)
1980 – 1989
- 1989
- [j5]Ushio Sumita, Naoto Kaio, Paulo B. Góes:
Analysis of Effective Service Time with Age Dependent Interruptions and Its Application to Optimal Rollback Policy for Database Management. Queueing Syst. Theory Appl. 4(3): 193-212 (1989) - 1988
- [j4]Ushio Sumita, Olivia R. Liu Sheng:
Analysis of Query Processing in Distributed Database Systems with Fully Replicated Files: A Hierarchical Approach. Perform. Evaluation 8(3): 223-238 (1988) - [j3]Bezalel Gavish, Ushio Sumita:
Analysis of Channel and Disk Subsystems in Computer Systems. Queueing Syst. Theory Appl. 3(1): 1-23 (1988) - [c1]Ushio Sumita, Peter Kubat:
Ent-to-end delay of a database transfer over unreliable communication network. ICCC 1988: 579 - 1986
- [j2]Ushio Sumita, Yasushi Masuda:
Analysis of Software Availability/Reliability Under the Influence of Hardware Failures. IEEE Trans. Software Eng. 12(1): 32-41 (1986) - 1984
- [j1]Ushio Sumita:
The Laguerre Transform and a Family of Functions with Nonnegative Laguerre Coefficients. Math. Oper. Res. 9(4): 510-521 (1984)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint