The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nobukazu Yoshioka: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fuyuki Ishikawa, Nobukazu Yoshioka, Yasuyuki Tahara, Shinichi Honiden
    Mobile and Cooperative Compounds of Multimedia Services. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:129-138 [Conf]
  2. Nobukazu Yoshioka, Akihiko Ohsuga, Shinichi Honiden
    Mobeet: A Multi-agent Framework for Ubiquitous Information Systems. [Citation Graph (0, 0)][DBLP]
    AOIS, 2004, pp:19-35 [Conf]
  3. Nobukazu Yoshioka, Yasuyuki Tahara, Akihiko Ohsuga, Shinichi Honiden
    Security for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    AOSE, 2000, pp:223-234 [Conf]
  4. Fuyuki Ishikawa, Yasuyuki Tahara, Nobukazu Yoshioka, Shinichi Honiden
    Agent synthesis: partnership and agreement in cooperative mobile agents. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2005, pp:1267-1268 [Conf]
  5. Fuyuki Ishikawa, Nobukazu Yoshioka, Shinichi Honiden
    Service-oriented and autonomous distribution and provision of multimedia contents. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2006, pp:949-951 [Conf]
  6. Nobukazu Yoshioka, Shinichi Honiden, Anthony Finkelstein
    Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems. [Citation Graph (0, 0)][DBLP]
    EDOC, 2004, pp:84-97 [Conf]
  7. Fuyuki Ishikawa, Nobukazu Yoshioka, Yasuyuki Tahara, Shinichi Honiden
    Framework for Hierarchical Mobile Agents: Toward Service-Oriented Agent Compound. [Citation Graph (0, 0)][DBLP]
    ICEIS (4), 2005, pp:275-282 [Conf]
  8. Shinichi Honiden, Yasuyuki Tahara, Nobukazu Yoshioka, Kenji Taguchi, Hironori Washizaki
    Top SE: Educating Superarchitects Who Can Apply Software Engineering Tools to Practical Development in Japan. [Citation Graph (0, 0)][DBLP]
    ICSE, 2007, pp:708-718 [Conf]
  9. Fuyuki Ishikawa, Nobukazu Yoshioka, Yasuyuki Tahara, Shinichi Honiden
    Behavior Descriptions of Mobile Agents for Web Services Integration. [Citation Graph (0, 0)][DBLP]
    ICWS, 2004, pp:342-349 [Conf]
  10. Fuyuki Ishikawa, Nobukazu Yoshioka, Yasuyuki Tahara, Shinichi Honiden
    Mobile Agent System for Web Services Integration in Pervasive Networks. [Citation Graph (0, 0)][DBLP]
    IWUC, 2004, pp:38-47 [Conf]
  11. Kazutaka Matsuzaki, Nobukazu Yoshioka, Shinichi Honiden
    Ubiquitous Application Development using a Mobile Agent-based System. [Citation Graph (0, 0)][DBLP]
    IWUC, 2004, pp:204-212 [Conf]
  12. Kazutaka Matsuzaki, Nobukazu Yoshioka, Shinichi Honiden
    Development Methodology for Location-Aware Mobile Agent. [Citation Graph (0, 0)][DBLP]
    MATA, 2004, pp:13-26 [Conf]
  13. Yasuyuki Tahara, Nobukazu Yoshioka, Shinichi Honiden
    A Formal Model of Active Contents Based on the Ambient Calculus. [Citation Graph (0, 0)][DBLP]
    MATA, 2003, pp:132-141 [Conf]
  14. Nobukazu Yoshioka, Shinichi Honiden
    A Pattern Oriented Mobile Agent Framework for Mobile Computing. [Citation Graph (0, 0)][DBLP]
    MATA, 2004, pp:369-380 [Conf]
  15. Kenji Tei, Yoshiaki Fukazawa, Shinichi Honiden, Nobukazu Yoshioka
    Geographically Bound Mobile Agent in MANET. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:516-518 [Conf]
  16. Kazutaka Matsuzaki, Nobukazu Yoshioka, Shinichi Honiden
    Flexible and Maintainable Contents Activities in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2005, pp:14-15 [Conf]
  17. Heisuke Kaneko, Yoshiaki Fukazawa, Fumihiro Kumeno, Nobukazu Yoshioka, Shinichi Honiden
    Mobile Agent Based Evacuation System When The Battery Runs Out: EASTER. [Citation Graph (0, 0)][DBLP]
    PerCom, 2003, pp:460-0 [Conf]
  18. Takou Doi, Nobukazu Yoshioka, Yasuyuki Tahara, Shinichi Honiden
    Bridging the Gap Between AUML and Implementation Using IOM/T. [Citation Graph (0, 0)][DBLP]
    PROMAS, 2004, pp:147-162 [Conf]
  19. Fuyuki Ishikawa, Nobukazu Yoshioka, Shinichi Honiden
    Smartive: Agreement-based Mobile Composite Agents for Multimedia Services. [Citation Graph (0, 0)][DBLP]
    CIMCA/IAWTIC, 2006, pp:19- [Conf]
  20. Fuyuki Ishikawa, Nobukazu Yoshioka, Shinichi Honiden
    Incorporating Agreements on Service Options into BPEL-based Services. [Citation Graph (0, 0)][DBLP]
    CIMCA/IAWTIC, 2005, pp:796-803 [Conf]
  21. Fuyuki Ishikawa, Nobukazu Yoshioka, Shinichi Honiden
    Mobile agent system for Web service integration in pervasive network. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2005, v:36, n:11, pp:34-48 [Journal]
  22. Fuyuki Ishikawa, Nobukazu Yoshioka, Shinichi Honiden
    Policy-based Runtime Partner Management in ProcessBased Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:1191-1194 [Conf]
  23. Fuyuki Ishikawa, Nobukazu Yoshioka, Shinichi Honiden
    Agreements and Policies in Cooperative Mobile Agents: Formalization and Implementation. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (1), 2007, pp:683-700 [Conf]

  24. Modeling Misuse Patterns. [Citation Graph (, )][DBLP]


  25. Model-Driven Security Patterns Application Based on Dependences among Patterns. [Citation Graph (, )][DBLP]


  26. Measuring the Level of Security Introduced by Security Patterns. [Citation Graph (, )][DBLP]


  27. 1st International Workshop on Software Patterns and Quality (SPAQu'07). [Citation Graph (, )][DBLP]


  28. Classifying Security Patterns. [Citation Graph (, )][DBLP]


  29. Enforcing a security pattern in stakeholder goal models. [Citation Graph (, )][DBLP]


  30. Incorporating Database Systems into a Secure Software Development Methodology. [Citation Graph (, )][DBLP]


  31. Improving the Classification of Security Patterns. [Citation Graph (, )][DBLP]


  32. Overview of the 3rd international workshop on software patterns and quality ((SPAQu'09). [Citation Graph (, )][DBLP]


  33. What Top-Level Software Engineers Tackle after Learning Formal Methods: Experiences from the Top SE Project. [Citation Graph (, )][DBLP]


  34. Misuse Cases + Assets + Security Goals. [Citation Graph (, )][DBLP]


  35. Developing Consistent Contractual Policies in Service Composition. [Citation Graph (, )][DBLP]


  36. Aligning Security Requirements and Security Assurance Using the Common Criteria. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002