The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kenichi Takahashi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. K. Takahashi, R. Sakai, H. Ueda, T. Miyanhara
    Learning Formations in Simulated Soccer by a Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    Artificial Intelligence and Soft Computing, 2000, pp:58-64 [Conf]
  2. Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya, Tsunenori Mine, Makoto Amamiya
    KODAMA project. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2002, pp:43-44 [Conf]
  3. Katsushi Inata, Tetsuhiro Miyahara, Hiroaki Ueda, Kenichi Takahashi
    Evolution of Characteristic Tree Structured Patterns from Semistructured Documents. [Citation Graph (0, 0)][DBLP]
    Australian Conference on Artificial Intelligence, 2006, pp:1201-1207 [Conf]
  4. Tadashige Iwao, Satoshi Amamiya, Kenichi Takahashi, Guoqiang Zhong, Tatsuya Kainuma, Lusheng Ji, Makoto Amamiya
    An Information Notification Model with VPC on KODAMA in an Ubiquitous Computing Environment, and Its Experiment. [Citation Graph (0, 0)][DBLP]
    CIA, 2003, pp:30-45 [Conf]
  5. Kenichi Takahashi, Kouichi Sakurai
    A Framework for the User-Oriented Personal Information Protection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:12-19 [Conf]
  6. Kenichi Takahashi, Satoshi Amamiya, Makoto Amamiya
    A Model for Flexible Service Use and Secure Resource Management. [Citation Graph (0, 0)][DBLP]
    EGC, 2005, pp:1143-1153 [Conf]
  7. Guoqiang Zhong, Satoshi Amamiya, Kenichi Takahashi, Tadashige Iwao, Kazuya Kawashima, Takayuki Ishiguro, Tatsuya Kainuma, Makoto Amamiya
    You've Got Mail From Your Agent: A Location and Context Sensitive Agent System. [Citation Graph (0, 0)][DBLP]
    ESAW, 2003, pp:392-409 [Conf]
  8. Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya
    A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:433-442 [Conf]
  9. Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya, Daisuke Matsuno, Tsunenori Mine, Makoto Amamiya
    From Computer Networks to Agent Networks. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:85- [Conf]
  10. Hirokae Oeda, Noaki Hanada, Hideaki Kimoto, Takeshi Naraki, Kenichi Takahashi, Tetsuhiro Miyahara
    Fuzzy Q-Learning with the Modified ART Neural Network. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:308-305 [Conf]
  11. Kenichi Takahashi, Hiroaki Ueda, Tetsuhiro Miyahara
    A Student Agent in a CAI System. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:686-689 [Conf]
  12. Masayuki Kushida, Kenichi Takahashi, Hiroaki Ueda, Tetsuhiro Miyahara
    A Comparative Study of Parallel Reinforcement Learning Methods with a PC Cluster System. [Citation Graph (0, 0)][DBLP]
    IAT, 2006, pp:416-419 [Conf]
  13. Hiroaki Ueda, Takeshi Naraki, Yo Nasu, Kenichi Takahashi, Tetsuhiro Miyahara
    State Space Segmentation for Acquisition of Agent Behavior. [Citation Graph (0, 0)][DBLP]
    IAT, 2006, pp:440-446 [Conf]
  14. Guoqiang Zhong, Satoshi Amamiya, Kenichi Takahashi, Makoto Amamiya
    The KODAMA Methodology: An Agent-Based Distributed Approach. [Citation Graph (0, 0)][DBLP]
    ICESS, 2004, pp:94-102 [Conf]
  15. Tetsuhiro Miyahara, Takayoshi Shoudai, Tomoyuki Uchida, Tetsuji Kuboyama, Kenichi Takahashi, Hiroaki Ueda
    Discovering New Knowledge from Graph Data Using Inductive Logic Programming. [Citation Graph (0, 0)][DBLP]
    ILP, 1999, pp:222-233 [Conf]
  16. Kenichi Takahashi, Satoshi Amamiya, Tadashige Iwao, Guoqiang Zhong, Makoto Amamiya
    Testing of Multi-agent-based System in Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    KES, 2004, pp:124-130 [Conf]
  17. Tetsuhiro Miyahara, Yusuke Suzuki, Takayoshi Shoudai, Tomoyuki Uchida, Sachio Hirokawa, Kenichi Takahashi, Hiroaki Ueda
    Extraction of Tag Tree Patterns with Contractible Variables from Irregular Semistructured Data. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2003, pp:430-436 [Conf]
  18. Tetsuhiro Miyahara, Yusuke Suzuki, Takayoshi Shoudai, Tomoyuki Uchida, Kenichi Takahashi, Hiroaki Ueda
    Discovery of Frequent Tag Tree Patterns in Semistructured Web Documents. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2002, pp:341-355 [Conf]
  19. Tetsuhiro Miyahara, Yusuke Suzuki, Takayoshi Shoudai, Tomoyuki Uchida, Kenichi Takahashi, Hiroaki Ueda
    Discovery of Maximally Frequent Tag Tree Patterns with Contractible Variables from Semistructured Documents. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2004, pp:133-144 [Conf]
  20. Tetsuhiro Miyahara, Takayoshi Shoudai, Tomoyuki Uchida, Kenichi Takahashi, Hiroaki Ueda
    Polynomial Time Matching Algorithms for Tree-Like Structured Patterns in Knowledge Discovery. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2000, pp:5-16 [Conf]
  21. Tetsuhiro Miyahara, Takayoshi Shoudai, Tomoyuki Uchida, Kenichi Takahashi, Hiroaki Ueda
    Discovery of Frequent Tree Structured Patterns in Semistructured Web Documents. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2001, pp:47-52 [Conf]
  22. Tetsuhiro Miyahara, Tomoyuki Uchida, Tetsuji Kuboyama, Tasuya Yamamoto, Kenichi Takahashi, Hiroaki Ueda
    KD-FGS: A Knowledge Discovery System from Graph Data Using Formal Graph System. [Citation Graph (0, 0)][DBLP]
    PAKDD, 1999, pp:438-442 [Conf]
  23. Hiroaki Ueda, Daisuke Ouchi, Kenichi Takahashi, Tetsuhiro Miyahara
    A Co-evolving Timeslot/Room Assignment Genetic Algorithm Technique for University Timetabling. [Citation Graph (0, 0)][DBLP]
    PATAT, 2000, pp:48-63 [Conf]
  24. Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai
    An Approach of Program Analysis Prevention for Information Protection. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:35-40 [Conf]
  25. Hiroaki Ueda, Hideaki Kimoto, Takeshi Naraki, Kenichi Takahashi, Tetsuhiro Miyahara
    Categorization of continuous numeric percepts by modified fuzzy art with Q-learning. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2006, v:20, n:2, pp:113-127 [Journal]
  26. Hiroaki Ueda, Daisuke Ouchi, Kenichi Takahashi, Tetsuhiro Miyahara
    Comparisons of genetic algorithms for timetabling problems. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2004, v:35, n:7, pp:1-12 [Journal]
  27. Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya
    An Approach of Trusted Program Generation for User-Responsible Privacy. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:1159-1170 [Conf]

  28. Agent-community-network-based business matching and collaboration support system. [Citation Graph (, )][DBLP]


  29. Evolution of Multiple Tree Structured Patterns from Tree-Structured Data Using Clustering. [Citation Graph (, )][DBLP]


  30. A Genetic Programming Approach to Extraction of Glycan Motifs Using Tree Structured Patterns. [Citation Graph (, )][DBLP]


  31. Online Classifier Considering the Importance of Attributes. [Citation Graph (, )][DBLP]


  32. Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System. [Citation Graph (, )][DBLP]


  33. Resilience evaluation of digital watermarking methods based on orthogonal transforms. [Citation Graph (, )][DBLP]


  34. Acquiring classification rules by using adaptive resonance theory. [Citation Graph (, )][DBLP]


  35. A Dance Synthesis System Using Motion Capture Data. [Citation Graph (, )][DBLP]


  36. Cooperative Learning of BDI Elevator Agents. [Citation Graph (, )][DBLP]


  37. Invalidation of Mailing List Address to Block Spam Mails. [Citation Graph (, )][DBLP]


Search in 0.023secs, Finished in 0.025secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002