|
Search the dblp DataBase
Kenichi Yamazaki:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yasunori Harada, Kenichi Yamazaki, Richard Potter
CCC: User-Defined Object Structure in C. [Citation Graph (0, 0)][DBLP] ECOOP, 2001, pp:118-129 [Conf]
- Tatsuo Takahashi, Satoshi Tanaka, Kenichi Yamazaki, Tadanori Mizuno
Thin Client Based User Terminal Architecture for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:111-120 [Conf]
- Naoharu Yamada, Kenji Sakamoto, Goro Kunito, Kenichi Yamazaki, Satoshi Tanaka
Human Activity Recognition Based on Surrounding Things. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:1-10 [Conf]
- Keiji Hirata, Kenichi Yamazaki
Declarative Priority in a Concurrent Logic Language ON. [Citation Graph (0, 0)][DBLP] ICLP, 1999, pp:215-229 [Conf]
- Kenichi Yamazaki, Yoshiji Amagai, Masaharu Yoshida, Ikuo Takeuchi
TAO: An Object-Orientation Kernel. [Citation Graph (0, 0)][DBLP] ISOTAS, 1993, pp:61-76 [Conf]
- Toshiki Iso, Kenichi Yamazaki
Gait analyzer based on a cell phone with a single three-axis accelerometer. [Citation Graph (0, 0)][DBLP] Mobile HCI, 2006, pp:141-144 [Conf]
- Daisuke Ochi, Kenichi Yamazaki
Twin Agents: Network-Assisted Disconnected Operation and Distributed Processing for Mobile Communication. [Citation Graph (0, 0)][DBLP] SAINT, 2004, pp:31-42 [Conf]
- Daisuke Ochi, Kenichi Yamazaki
The Demonstration of Network-Assisted Disconnected Operation for Mobile Communication. [Citation Graph (0, 0)][DBLP] SAINT Workshops, 2004, pp:299-303 [Conf]
- Kenichi Yamazaki
Research Directions for Ubiquitous Services. [Citation Graph (0, 0)][DBLP] SAINT, 2004, pp:12-14 [Conf]
- Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi
An Efficient and Secure RFID Security Method with Ownership Transfer. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:778-787 [Conf]
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. [Citation Graph (, )][DBLP]
Flight size auto tuning for broadband wireless networks. [Citation Graph (, )][DBLP]
Extracting Personal User Context with a Three-Axis Sensor Mounted on a Freely Carried Cell Phone. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|