The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kenichi Yoshida: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kenichi Yoshida, Hiroshi Motoda, Nitin Indurkhya
    Unifying Learning Methods by Colored Digraphs. [Citation Graph (1, 0)][DBLP]
    ALT, 1993, pp:342-355 [Conf]
  2. Hiroshi Motoda, Naoyuki Yamada, Kenichi Yoshida
    A Knowledge based System for Plant Diagnosis. [Citation Graph (0, 0)][DBLP]
    FGCS, 1984, pp:582-588 [Conf]
  3. Kenichi Yoshida, Yasuhiro Kobayashi, Yoshikatsu Ueda, Hideo Tanaka, Shouichi Muto, Junichi Yoshizawa
    A Knowledge-Based Layout Design System for Industrial Plants. [Citation Graph (0, 0)][DBLP]
    FJCC, 1986, pp:216-221 [Conf]
  4. Kenichi Yoshida
    User Modeling by Graph-Based Induction. [Citation Graph (0, 0)][DBLP]
    HCI (2), 1997, pp:23-26 [Conf]
  5. Kenichi Yoshida
    User Command Prediction by Graph-Based Induction. [Citation Graph (0, 0)][DBLP]
    ICTAI, 1994, pp:732-735 [Conf]
  6. Hiroshi Motoda, Kenichi Yoshida
    Machine Learning Techniques to Make Computers Easier to Use. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1997, pp:1622-1631 [Conf]
  7. Kiminori Sugauchi, Satoshi Miyazaki, Kenichi Yoshida, Keiichi Nakane, Stefan Covaci, Tianning Zhang
    Flexible Network Management using Active Network Framework. [Citation Graph (0, 0)][DBLP]
    IWAN, 1999, pp:241-248 [Conf]
  8. Kenichi Yoshida
    Sampling-Based Stream Mining for Network Risk Management. [Citation Graph (0, 0)][DBLP]
    JSAI, 2006, pp:374-386 [Conf]
  9. Kenichi Yoshida, Fuminori Adachi, Takashi Washio, Hiroshi Motoda, Teruaki Homma, Akihiro Nakashima, Hiromitsu Fujikawa, Katsuyuki Yamazaki
    Density-based spam detector. [Citation Graph (0, 0)][DBLP]
    KDD, 2004, pp:486-493 [Conf]
  10. Yoshikatsu Fujita, Jun Yoshida, Kenichi Yoshida, Kazuhiko Tsuda
    Network Information Mining for Content Delivery Route Control in P2P Network. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:516-522 [Conf]
  11. Kenichi Yoshida, Hiroshi Motoda
    Tables, Graphs and Logic for Induction. [Citation Graph (0, 0)][DBLP]
    Machine Intelligence 15, 1995, pp:298-311 [Conf]
  12. Hiroshi Uehara, Kenichi Yoshida
    Annotating TV Drama based on Viewer Dialogue - Analysis of Viewers' Attention Generated on an Internet Bulletin Board -. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:334-340 [Conf]
  13. Kenichi Yoshida, Fuminori Adachi, Takashi Washio, Hiroshi Motoda, Teruaki Homma, Akihiro Nakashima, Hiromitsu Fujikawa, Katsuyuki Yamazaki
    Memory Management of Density-Based Spam Detector. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:370-376 [Conf]
  14. Kenichi Yoshida, Kazuo Hashimoto
    AI application of the Internet - Backgrounds and Issues. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2003, pp:273-275 [Conf]
  15. Byeong Ho Kang, Kenichi Yoshida, Hiroshi Motoda, Paul Compton
    Help Desk System with Intelligent Interface. [Citation Graph (0, 0)][DBLP]
    Applied Artificial Intelligence, 1997, v:11, n:7-8, pp:611-631 [Journal]
  16. Hiroshi Motoda, Kenichi Yoshida
    Machine Learning Techniques to Make Computers Easier to Use. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 1998, v:103, n:1-2, pp:295-321 [Journal]
  17. Kenichi Yoshida, Hiroshi Motoda
    CLIP: Concept Learning from Inference Patterns. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 1995, v:75, n:1, pp:63-92 [Journal]
  18. Norifumi Nishikawa, Takafumi Hosokawa, Yasuhide Mori, Kenichi Yoshida, Hiroshi Tsuji
    Memory-Based Architecture for Distributed WWW Caching Proxy. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1998, v:30, n:1-7, pp:205-214 [Journal]
  19. Koji Sato, Isao Isshiki, Akihiro Ohoka, Kenichi Yoshida, Kokichi Tanaka, Shinichi Tamura
    Hand-scan OCR with a one-dimensional image sensor. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1983, v:16, n:5, pp:459-467 [Journal]
  20. Shigeo Takahashi, Kenichi Yoshida, Kenji Shimada, Tomoyuki Nishita
    Occlusion-Free Animation of Driving Routes for Car Navigation Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Vis. Comput. Graph., 2006, v:12, n:5, pp:1141-1148 [Journal]
  21. Takeshi Aimoto, Takeki Yazaki, Takashi Isobe, Yoshihiko Sakata, Kenichi Yoshida
    Evaluation of a Hierarchical Shaper as a Policy Execution Point. [Citation Graph (0, 0)][DBLP]
    KES (2), 2007, pp:1346-1353 [Conf]
  22. Hiroshi Tsuji, Akito Sakurai, Kenichi Yoshida, Amrit Tiwana, Ashley Bush
    Questionnaire-Based Risk Assessment Scheme for Japanese Offshore Software Outsourcing. [Citation Graph (0, 0)][DBLP]
    SEAFOOD, 2007, pp:114-127 [Conf]

  23. Input Text Repairing for Multi-lingual Chat System. [Citation Graph (, )][DBLP]


  24. Tiny LSH for Content-Based Copied Video Detection. [Citation Graph (, )][DBLP]


  25. Group-Based Image Retrieval Method for Video Annotation. [Citation Graph (, )][DBLP]


  26. Automatic Blending of Multiple Perspective Views for Aesthetic Composition. [Citation Graph (, )][DBLP]


  27. Acquiring Marketing Knowledge from Internet Bulletin Boards. [Citation Graph (, )][DBLP]


  28. Preliminary Analysis for Risk Finding in Offshore Software Outsourcing from Vendor's Viewpoint. [Citation Graph (, )][DBLP]


  29. Designing nonperspective projection through screen-space manipulation. [Citation Graph (, )][DBLP]


  30. Integrated management architecture based on CORBA. [Citation Graph (, )][DBLP]


  31. Graph-based induction as a unified learning framework. [Citation Graph (, )][DBLP]


  32. Myths and paradoxes in Japanese IT offshoring. [Citation Graph (, )][DBLP]


  33. Profiling of molecular pathways regulated by microRNA 601. [Citation Graph (, )][DBLP]


  34. Spectral-Based Group Formation Control. [Citation Graph (, )][DBLP]


Search in 0.090secs, Finished in 0.092secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002