The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yuichi Goto: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kazuhiko Miki, David Boerstler, Eskinder Hailu, Jieming Qi, Sarah Pettengill, Yuichi Goto
    A new test and characterization scheme for 10+ GHz low jitter wide band PLL. [Citation Graph (0, 0)][DBLP]
    ASP-DAC, 2006, pp:856-859 [Conf]
  2. Jingde Cheng, Yuichi Goto
    Representing and Reasoning About Spatial Knowledge Based on Spatial Relevant Logic. [Citation Graph (0, 0)][DBLP]
    ER (Workshops), 2004, pp:114-126 [Conf]
  3. Takumi Endo, Junichi Miura, Koichi Nanashima, Shoichi Morimoto, Yuichi Goto, Jingde Cheng
    Security in Persistently Reactive Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:874-883 [Conf]
  4. Shinsuke Nara, Takashi Omi, Yuichi Goto, Jingde Cheng
    A General-Purpose Forward Deduction Engine for Modal Logics. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:739-745 [Conf]
  5. Mohammad Reza Selim, Takumi Endo, Yuichi Goto, Jingde Cheng
    A Comparative Study Between Soft System Bus and Traditional Middlewares. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (2), 2006, pp:1264-1273 [Conf]
  6. Yuichi Goto, Jingde Cheng
    A quantitative analysis of implicational paradoxes in classical mathematical logic. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:42-43 [Conf]
  7. Shoichi Morimoto, Shinjiro Shigematsu, Yuichi Goto, Jingde Cheng
    A security specification verification technique based on the international standard ISO/IEC 15408. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1802-1803 [Conf]
  8. K. H. S. Sabaragamu Koralalage, Mohammad Reza Selim, Junichi Miura, Yuichi Goto, Jingde Cheng
    POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:270-275 [Conf]
  9. Shoichi Morimoto, Shinjiro Shigematsu, Yuichi Goto, Jingde Cheng
    Formal verification of security specifications with common criteria. [Citation Graph (0, 0)][DBLP]
    SAC, 2007, pp:1506-1512 [Conf]
  10. Jingde Cheng, Shinsuke Nara, Takahiro Koh, Yuichi Goto
    The Theory Grid and Grid Theorists. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:32- [Conf]
  11. Yuichi Goto, Jingde Cheng
    A Quantitative Analysis of Implicational Paradoxes in Classical Mathematical Logic. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:169, n:, pp:87-97 [Journal]
  12. Isao Takahashi, Shinsuke Nara, Yuichi Goto, Jingde Cheng
    EPLAS: An Epistemic Programming Language for All Scientists. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (1), 2007, pp:406-413 [Conf]
  13. Jingde Cheng, Yuichi Goto, Shinsuke Nara, Takahiro Koh
    A Cooperative Grid Computing Approach to Automated Theorem Finding and Automated Problem Proposing. [Citation Graph (0, 0)][DBLP]
    KES (2), 2007, pp:840-851 [Conf]
  14. Jingde Cheng, Shinsuke Nara, Yuichi Goto
    FreeEnCal: A Forward Reasoning Engine with General-Purpose. [Citation Graph (0, 0)][DBLP]
    KES (2), 2007, pp:444-452 [Conf]

  15. A New Model of Software Life Cycle Processes for Consistent Design, Development, Management, and Maintenance of Secure Information Systems. [Citation Graph (, )][DBLP]


  16. ISEDS: An Information Security Engineering Database System Based on ISO Standards. [Citation Graph (, )][DBLP]


  17. Fast Qualitative Reasoning about Actions for Computing Anticipatory Systems. [Citation Graph (, )][DBLP]


  18. An Improvement of REM: A Replication Oriented Event-Based Middleware. [Citation Graph (, )][DBLP]


  19. FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408. [Citation Graph (, )][DBLP]


  20. A Fast Duplication Checking Algorithm for Forward Reasoning Engines. [Citation Graph (, )][DBLP]


  21. A General Forward Reasoning Algorithm for Various Logic Systems with Different Formalizations. [Citation Graph (, )][DBLP]


  22. A replication oriented approach to event based middleware over structured peer to peer networks. [Citation Graph (, )][DBLP]


  23. ISEE: An Information Security Engineering Environment. [Citation Graph (, )][DBLP]


  24. Measuring Reactability of Persistent Computing Systems. [Citation Graph (, )][DBLP]


  25. Classification, Formalization and Verification of Security Functional Requirements. [Citation Graph (, )][DBLP]


  26. Distributed hash table based design of Soft System Buses. [Citation Graph (, )][DBLP]


  27. Development of a Decision-Maker in an Anticipatory Reasoning-Reacting System for Terminal Radar Control. [Citation Graph (, )][DBLP]


  28. ENQUETE-BAISE: A General-Purpose E-Questionnaire Server for Ubiquitous Questionnaire. [Citation Graph (, )][DBLP]


  29. Ensuring Reliability and Availability of Soft System Bus. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002