The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kenichi Yamazaki: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yasunori Harada, Kenichi Yamazaki, Richard Potter
    CCC: User-Defined Object Structure in C. [Citation Graph (0, 0)][DBLP]
    ECOOP, 2001, pp:118-129 [Conf]
  2. Tatsuo Takahashi, Satoshi Tanaka, Kenichi Yamazaki, Tadanori Mizuno
    Thin Client Based User Terminal Architecture for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:111-120 [Conf]
  3. Naoharu Yamada, Kenji Sakamoto, Goro Kunito, Kenichi Yamazaki, Satoshi Tanaka
    Human Activity Recognition Based on Surrounding Things. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1-10 [Conf]
  4. Keiji Hirata, Kenichi Yamazaki
    Declarative Priority in a Concurrent Logic Language ON. [Citation Graph (0, 0)][DBLP]
    ICLP, 1999, pp:215-229 [Conf]
  5. Kenichi Yamazaki, Yoshiji Amagai, Masaharu Yoshida, Ikuo Takeuchi
    TAO: An Object-Orientation Kernel. [Citation Graph (0, 0)][DBLP]
    ISOTAS, 1993, pp:61-76 [Conf]
  6. Toshiki Iso, Kenichi Yamazaki
    Gait analyzer based on a cell phone with a single three-axis accelerometer. [Citation Graph (0, 0)][DBLP]
    Mobile HCI, 2006, pp:141-144 [Conf]
  7. Daisuke Ochi, Kenichi Yamazaki
    Twin Agents: Network-Assisted Disconnected Operation and Distributed Processing for Mobile Communication. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:31-42 [Conf]
  8. Daisuke Ochi, Kenichi Yamazaki
    The Demonstration of Network-Assisted Disconnected Operation for Mobile Communication. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2004, pp:299-303 [Conf]
  9. Kenichi Yamazaki
    Research Directions for Ubiquitous Services. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:12-14 [Conf]
  10. Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi
    An Efficient and Secure RFID Security Method with Ownership Transfer. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:778-787 [Conf]

  11. A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. [Citation Graph (, )][DBLP]


  12. Flight size auto tuning for broadband wireless networks. [Citation Graph (, )][DBLP]


  13. Extracting Personal User Context with a Three-Axis Sensor Mounted on a Freely Carried Cell Phone. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002