The SCEAS System
Navigation Menu

Search the dblp DataBase


Kenji Taguchi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Juliana Küster Filipe, Kung-Kiu Lau, Mario Ornaghi, Kenji Taguchi, Hirokazu Yatsu, Alan Wills
    Formal specification of Catalysis frameworks. [Citation Graph (0, 0)][DBLP]
    APSEC, 2000, pp:180-187 [Conf]
  2. Kenji Taguchi, Keijiro Araki
    Extending Z with State Transition Constraints. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1996, pp:246-260 [Conf]
  3. Kenji Taguchi, Jin Song Dong, Gabriel Ciobanu
    Relating pi-calculus to Object-Z. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2004, pp:97-106 [Conf]
  4. Miao Kang, Kenji Taguchi
    Modelling Mobile Agent Applications by Extended UML Activity Diagram. [Citation Graph (0, 0)][DBLP]
    ICEIS (4), 2004, pp:519-522 [Conf]
  5. Kenji Taguchi, Keijiro Araki
    The State-Based CCS Semantics for Concurrent Z Specification. [Citation Graph (0, 0)][DBLP]
    ICFEM, 1997, pp:283-292 [Conf]
  6. Kenji Taguchi, Keijiro Araki
    A Calculus Based on the Agent-Place Model. [Citation Graph (0, 0)][DBLP]
    ICFEM, 1998, pp:56-63 [Conf]
  7. Kenji Taguchi, Jin Song Dong
    An Overview of Mobile Object-Z. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2002, pp:144-155 [Conf]
  8. Shinichi Honiden, Yasuyuki Tahara, Nobukazu Yoshioka, Kenji Taguchi, Hironori Washizaki
    Top SE: Educating Superarchitects Who Can Apply Software Engineering Tools to Practical Development in Japan. [Citation Graph (0, 0)][DBLP]
    ICSE, 2007, pp:708-718 [Conf]

  9. Specifying and Verifying Sensor Networks: An Experiment of Formal Methods. [Citation Graph (, )][DBLP]

  10. Formal specification generator for KAOS: model transformation approach to generate formal specifications from KAOS requirements models. [Citation Graph (, )][DBLP]

  11. What Top-Level Software Engineers Tackle after Learning Formal Methods: Experiences from the Top SE Project. [Citation Graph (, )][DBLP]

  12. Misuse Cases + Assets + Security Goals. [Citation Graph (, )][DBLP]

  13. Aligning Security Requirements and Security Assurance Using the Common Criteria. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002