The SCEAS System
Navigation Menu

Search the dblp DataBase


Kenji Takahashi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Paul Madsen, Yuzo Koga, Kenji Takahashi
    Federated identity management for protecting users from ID theft. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2005, pp:77-83 [Conf]
  2. Shintaro Mizuno, Kohji Yamada, Kenji Takahashi
    Authentication using multiple communication channels. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2005, pp:54-62 [Conf]
  3. Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi
    Trusted-link: web-link enhancement for integrity and trustworthiness. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2006, pp:17-24 [Conf]
  4. Feng Cao, Jeffrey D. Smith, Kenji Takahashi
    An Architecture of Distributed Media Servers for Supporting Guaranteed QoS and Media Indexing. [Citation Graph (0, 0)][DBLP]
    ICMCS, Vol. 2, 1999, pp:1-5 [Conf]
  5. Kenji Takahashi, Colin Potts, Vinay Kumar, Kenji Ota, Jeffrey D. Smith
    Hypermedia Support for Collaboration in Requirements Analysis. [Citation Graph (0, 0)][DBLP]
    ICRE, 1996, pp:31-41 [Conf]
  6. Kenji Takahashi, Wolfgang Emmerich, Anthony Finkelstein, Sofia Guerra
    System development using application services over the Net (tutorial session). [Citation Graph (0, 0)][DBLP]
    ICSE, 2000, pp:830- [Conf]
  7. Jeffrey D. Smith, Kenji Takahashi
    Multimedia Architecture to Support Requirements Analysis. [Citation Graph (0, 0)][DBLP]
    IDMS, 1996, pp:15-31 [Conf]
  8. Colin Potts, Kenji Takahashi
    An Active Hypertext Model for System Requirements. [Citation Graph (0, 0)][DBLP]
    IWSSD, 1993, pp:62-68 [Conf]
  9. Akira Kanamaru, Yoshitsugu Tsuchiya, Tomohiro Fujisaki, Kenji Takahashi
    Fieldcast2: Flexible P2P architecture for presence information sharing. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:98-103 [Conf]
  10. Colin Potts, Kenji Takahashi, Jeffrey D. Smith, Kenji Ota
    An evaluation of inquiry-based requirements analysis for an Internet service. [Citation Graph (0, 0)][DBLP]
    RE, 1995, pp:172-180 [Conf]
  11. Kenji Takahashi
    Workshop on Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    WETICE, 1996, pp:207- [Conf]
  12. Kenji Takahashi
    Metalevel Links: More Power to Your Links. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:7, pp:103-105 [Journal]
  13. Kenji Takahashi, Eugene Liang
    Analysis and Design of Web-based Information Systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1997, v:29, n:8-13, pp:1167-1180 [Journal]
  14. Kenji Takahashi, Eiji Yana
    A Hypermedia Environment for Global Collaboration. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2000, v:7, n:4, pp:36-47 [Journal]
  15. Kenji Takahashi, Atsuko Oka, Shuichiro Yamamoto, Sadahiro Isoda
    A comparative study of structured and text-oriented analysis and design methodologies. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1995, v:28, n:1, pp:69-75 [Journal]
  16. Colin Potts, Kenji Takahashi, Annie I. Antón
    Inquiry-Based Requirements Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1994, v:11, n:2, pp:21-32 [Journal]
  17. Kenji Takahashi, Mitsuo Umemoto, Naotaka Tanaka, Kazumasa Tanida, Yoshihiko Nemoto, Yoshihiro Tomita, Masamoto Tago, Manabu Bonkohara
    Ultra-high-density interconnection technology of three-dimensional packaging. [Citation Graph (0, 0)][DBLP]
    Microelectronics Reliability, 2003, v:43, n:8, pp:1267-1279 [Journal]

  18. Certificate-less user authentication with consent. [Citation Graph (, )][DBLP]

  19. Implementing identity provider on mobile phone. [Citation Graph (, )][DBLP]

  20. Symmetric identity federation for fixed-mobile convergence. [Citation Graph (, )][DBLP]

  21. Proposal of Delegation Using Electronic Certificates on Single Sign-On System with SAML-Protocol. [Citation Graph (, )][DBLP]

  22. Video stabilization and motion deblurring on GPU. [Citation Graph (, )][DBLP]

  23. Soramame: what you see is what you control access control user interface. [Citation Graph (, )][DBLP]

  24. Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002