The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kenichi Watanabe: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido, S. Misbah Deen
    Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:42-49 [Conf]
  2. Keiji Ozaki, Kenichi Watanabe, Satoshi Itaya, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa
    A Fault-Tolerant Model forWireless Sensor-Actor System. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:303-307 [Conf]
  3. Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa, Kane Kim
    Charge-Based Flooding Algorithm for Detecting Multimedia Objects in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:165-170 [Conf]
  4. Kenichi Watanabe, Yoshio Nakajima, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido, S. Misbah Deen
    Service Oriented Trustworthiness of Acquaintances in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:3-8 [Conf]
  5. Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa
    Distributed Multimedia Objects in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2004, pp:337-341 [Conf]
  6. Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa, Kane Kim
    Acquaintance-Based Protocol for Manipulating Multimedia Objects in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:771-775 [Conf]
  7. Kenichi Watanabe, Yoshio Nakajima, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa, S. Misbah Deen
    Trustworthiness of Peers Based on Access Control in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2006, pp:74- [Conf]
  8. Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa, Kane Kim
    Charge-based Flooding Algorithm for Looking Up Multimedia Objects in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2005, pp:481-487 [Conf]
  9. Keiji Ozaki, Kenichi Watanabe, Satoshi Itaya, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa
    A Fault-Tolerant Model ofWireless Sensor-Actor Network. [Citation Graph (0, 0)][DBLP]
    ISORC, 2006, pp:186-193 [Conf]
  10. Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa, Kane Kim
    Acquaintance-based Protocol for Detecting Multimedia Objects in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    ISORC, 2005, pp:245-252 [Conf]
  11. Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa, S. Misbah Deen
    Trustworthiness in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:86-93 [Conf]
  12. Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa
    A Model for Manipulating Multimedia Objects in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    Wissensmanagement, 2005, pp:222-227 [Conf]
  13. Kojiro Taguchi, Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa
    Causally ordered delivery in a hierarchical group of peer processes. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:11, pp:1337-1347 [Journal]
  14. Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa
    Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks. [Citation Graph (0, 0)][DBLP]
    Information Systems Frontiers, 2006, v:8, n:4, pp:271-284 [Journal]
  15. Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa
    Cbf: Look-up Protocol for Distributed Multimedia Objects in Peer-to-peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Interconnection Networks, 2005, v:6, n:3, pp:323-344 [Journal]
  16. Kenichi Watanabe, Yosuke Sugiyama, Tomoya Enokido, Makoto Takizawa
    Moderate Concurrency Control In Distributed Object Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Interconnection Networks, 2004, v:5, n:2, pp:181-191 [Journal]
  17. Yoshio Nakajima, Kenichi Watanabe, Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa
    Trustworthiness of Acquaintance peers on Access Control Models. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2007, pp:784-788 [Conf]
  18. Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa
    Performance Analysis of the Superpeer-based Two-layer P2P Overlay Network with the CBF Strategy. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2007, pp:32- [Conf]
  19. Kenichi Watanabe, Yoshio Nakajima, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa
    Confidence-based Trustworthiness of Acquaintance Peers in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2007, pp:30- [Conf]
  20. Kiyohiro Morita, Keiji Ozaki, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa
    Sensor-Actuator Communication Protocols in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:11-19 [Conf]
  21. Kenichi Watanabe, Yoshio Nakajima, Tomoya Enokido, Makoto Takizawa
    Ranking factors in peer-to-peer overlay networks. [Citation Graph (0, 0)][DBLP]
    TAAS, 2007, v:2, n:3, pp:- [Journal]

  22. Cooperation of Trustworthy Peers in P2P Overlay Networks. [Citation Graph (, )][DBLP]


  23. Efficient Data Transmission in a Lossy and Resource Limited Wireless Sensor-Actuator Network. [Citation Graph (, )][DBLP]


  24. An Inter-peer Trustworthiness Based on Access Control in Peer-to-Peer Overlay Networks. [Citation Graph (, )][DBLP]


  25. A Superpeer-Based Two-Layer P2P Overlay Network with the CBF Strategy. [Citation Graph (, )][DBLP]


  26. An Efficient Data Transmission Protocol in a Wireless Sensor-Actuator Network. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002