default search action
Kenji Takahashi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2014
- [j12]Kentaro Takemura, Kenji Takahashi, Jun Takamatsu, Tsukasa Ogasawara:
Estimating 3-D Point-of-Regard in a Real Environment Using a Head-Mounted Eye-Tracking System. IEEE Trans. Hum. Mach. Syst. 44(4): 531-536 (2014) - 2013
- [j11]Kenji Takahashi, Kiyoshi Ohishi, Toshiyuki Kanmachi:
High-Performance Inverter Based on Shaft Acceleration Torque for AC Drives. IEEE Trans. Ind. Electron. 60(1): 66-77 (2013) - 2009
- [j10]Piotr Pacyna, Anthony M. Rutkowski, Amardeo Sarma, Kenji Takahashi:
Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems. Computer 42(5): 30-32 (2009) - 2006
- [j9]Teruko Miyata, Yuzo Koga, Paul Madsen, Shin-ichi Adachi, Yoshitsugu Tsuchiya, Yasuhisa Sakamoto, Kenji Takahashi:
A Survey on Identity Management Protocols and Standards. IEICE Trans. Inf. Syst. 89-D(1): 112-123 (2006) - 2004
- [j8]Katsunori Matsuura, Yoshitsugu Tsuchiya, Tsuyoshi Toyono, Kenji Takahashi:
FieldCast: Peer-to-Peer Presence Information Exchange in Ubiquitous Computing Environment. IEICE Trans. Inf. Syst. 87-D(12): 2610-2617 (2004) - 2003
- [j7]Kenji Takahashi, Mitsuo Umemoto, Naotaka Tanaka, Kazumasa Tanida, Yoshihiko Nemoto, Yoshihiro Tomita, Masamoto Tago, Manabu Bonkohara:
Ultra-high-density interconnection technology of three-dimensional packaging. Microelectron. Reliab. 43(8): 1267-1279 (2003) - 2000
- [j6]Kenji Takahashi, Eiji Yana:
A Hypermedia Environment for Global Collaboration. IEEE Multim. 7(4): 36-47 (2000) - 1998
- [j5]Kenji Takahashi:
Metalevel Links: More Power to Your Links. Commun. ACM 41(7): 103-105 (1998) - 1997
- [j4]Kenji Takahashi, Eugene Liang:
Analysis and Design of Web-based Information Systems. Comput. Networks 29(8-13): 1167-1180 (1997) - 1995
- [j3]Kenji Takahashi, Shuichiro Yamamoto:
An Analysis of Traceability in Requirements Documents. IEICE Trans. Inf. Syst. 78-D(4): 394-402 (1995) - [j2]Kenji Takahashi, Atsuko Oka, Shuichiro Yamamoto, Sadahiro Isoda:
A comparative study of structured and text-oriented analysis and design methodologies. J. Syst. Softw. 28(1): 69-75 (1995) - 1994
- [j1]Colin Potts, Kenji Takahashi, Annie I. Antón:
Inquiry-Based Requirements Analysis. IEEE Softw. 11(2): 21-32 (1994)
Conference and Workshop Papers
- 2023
- [c44]Kenta Sasaki, Daisuke Fujita, Kenta Takatsuji, Yoshihiro Kotoura, Tsuyoshi Sukenari, Masataka Minami, Yusuke Kobayashi, Yoshikazu Kida, Kenji Takahashi, Syoji Kobashi:
Detection of osteochondritis dissecans using convolutional neural networks for computer-aided diagnosis of baseball elbow. ISMVL 2023: 59-63 - 2022
- [c43]Shinobu Saito, Kenji Takahashi, Yasuyuki Hamada, Jan Vermeulen:
RP2A: Rare Process-Pattern Analysis - Identifying Potential Problem Process-Patterns by Analyzing System Execution Data. APSEC 2022: 432-436 - [c42]Shosuke Oba, Bo Hu, Kazunori Kamiya, Kenji Takahashi:
Balanced Score Propagation for Botnet Detection. ICC 2022: 2357-2362 - [c41]Kenta Sasaki, Daisuke Fujita, Kenta Takatsuji, Yoshihiro Kotoura, Masataka Minami, Yusuke Kobayashi, Tsuyoshi Sukenari, Yoshikazu Kida, Kenji Takahashi, Syoji Kobashi:
Detection of osteochondritis dissecans in ultrasound images for computer-aided diagnosis of baseball elbow. SMC 2022: 1537-1542 - 2021
- [c40]Bo Hu, Kazunori Kamiya, Kenji Takahashi, Akihiro Nakao:
Multi-hop Graph Embedding for Botnet Detection. GLOBECOM 2021: 1-6 - [c39]Bo Hu, Kazunori Kamiya, Kenji Takahashi, Akihiro Nakao:
SamE: Sampling-based Embedding for Learning Representations of the Internet. GLOBECOM 2021: 1-6 - 2020
- [c38]Nariyoshi Chida, Yuhei Kawakoya, Dai Ikarashi, Kenji Takahashi, Koushik Sen:
Is stateful packrat parsing really linear in practice? a counter-example, an improved grammar, and its parsing algorithms. CC 2020: 155-166 - [c37]Bo Hu, Kazunori Kamiya, Kenji Takahashi, Akihiro Nakao:
Piper: A Unified Machine Learning Pipeline for Internet-scale Traffic Analysis. GLOBECOM 2020: 1-6 - [c36]Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya, Kenji Takahashi:
SILU: Strategy Involving Large-scale Unlabeled Logs for Improving Malware Detector. ISCC 2020: 1-7 - [c35]Shun Tobiyama, Bo Hu, Kazunori Kamiya, Kenji Takahashi:
Large-Scale Network-Traffic-Identification Method with Domain Adaptation. WWW (Companion Volume) 2020: 109-110 - 2019
- [c34]Bo Hu, Atsutoshi Kumagai, Kazunori Kamiya, Kenji Takahashi, Daniel Dalek, Ola Söderström, Kazuya Okada, Yuji Sekiya, Akihiro Nakao:
Alchemy: Stochastic Feature Regeneration for Malicious Network Traffic Classification. COMPSAC (1) 2019: 346-351 - [c33]Yasuhiro Shindo, Kazuo Kato, Futoshi Ikuta, Kenji Takahashi:
Validation of Noninvasive Ultrasound Temperature Measurement System Through Experiments Using Resonant Cavity Applicator. EMBC 2019: 2521-2524 - 2018
- [c32]Yasuhiro Shindo, Yasuhiro X. Kato, Yasuhito Ichishima, Yuya Iseki, Ryo Tokutake, Futoshi Ikuta, Kenji Takahashi:
Evaluation of Deep Thermal Rehabilitation System Using Resonant Cavity Applicator During Knee Experiments. EMBC 2018: 3220-3223 - 2015
- [c31]Stephen S. Yau, Wei-Tek Tsai, Kenji Takahashi, Xiaoying Bai, Helen D. Karatza:
Message from the IWSC 2015 Workshop Organizers. COMPSAC Workshops 2015: 453 - [c30]Kenji Takahashi, Hiroyasu Obata, Tutomu Murase, Kenji Ishida:
Throughput improvement method exploiting capture effect in densely placed WLANs. IMCOM 2015: 36:1-36:6 - 2014
- [c29]Shinobu Saito, Yukako Iimura, Kenji Takahashi, Aaron K. Massey, Annie I. Antón:
Tracking requirements evolution by using issue tickets: a case study of a document management and approval system. ICSE Companion 2014: 245-254 - 2013
- [c28]Kazuki Watanabe, Hiromasa Kurosaki, Mitsunori Kubo, Kenji Takahashi, Kazuo Kato, Yasuhiro Shindo:
Heating properties of resonant cavity applicator for treating rheumatoid arthritis by using 3-D FEM knee model. ISMICT 2013: 238-241 - [c27]Kumi Jinzenji, Takashi Hoshino, Laurie A. Williams, Kenji Takahashi:
An experience report for software quality evaluation in highly iterative development methodology using traditional metrics. ISSRE 2013: 310-319 - 2012
- [c26]Toshio Hiraide, Kenji Takahashi, Manuel Nandayapa, Kiyoshi Ohishi:
Acceleration control of AC servo motor considering cogging torque at low velocities for haptics. ISIE 2012: 1668-1673 - [c25]Kumi Jinzenji, Takashi Hoshino, Laurie A. Williams, Kenji Takahashi:
Metric-Based Quality Evaluations for Iterative Software Development Approaches Like Agile. ISSRE Workshops 2012: 54-63 - 2011
- [c24]Kenji Takahashi:
Privacy in the Cloud. COMPSAC 2011: 372 - 2010
- [c23]Kenji Takahashi, Hajime Yokoo, Shyunsuke Miwa, Kengo Tsushida, Hiroyuki Iwase, Kazuki Murakami, Nobukazu Takai, Haruo Kobayashi, Takahiro Odaguchi, Shigeki Takayama, Isao Fukai, Jun-Ichi Matsuda:
Single inductor DC-DC converter with bipolar outputs using charge pump. APCCAS 2010: 460-463 - [c22]Haruno Kataoka, Masashi Toyama, Yoshiko Sueda, Osamu Mizuno, Kenji Takahashi:
Demonstration of Web Contents Collaborative System for Call Parties. CCNC 2010: 1-2 - [c21]Haruno Kataoka, Masashi Toyama, Yoshiko Sueda, Osamu Mizuno, Kenji Takahashi:
Web Contents Collaborative Method in Call-to-Web Session Linkage System. CCNC 2010: 1-3 - 2009
- [c20]Nachi Ueno, Ryota Hashimoto, Michio Shimomura, Kenji Takahashi:
Soramame: what you see is what you control access control user interface. CHIMIT 2009 - [c19]Takaaki Komura, Yasuhiro Nagai, Shoichi Hashimoto, Makiko Aoyagi, Kenji Takahashi:
Proposal of Delegation Using Electronic Certificates on Single Sign-On System with SAML-Protocol. SAINT 2009: 235-238 - [c18]Kenji Takahashi, Kenjiro T. Miura:
Video stabilization and motion deblurring on GPU. SIGGRAPH ASIA Posters 2009: 49:1 - 2008
- [c17]Makiko Aoyagi, Tsuyoshi Abe, Kenji Takahashi:
Symmetric identity federation for fixed-mobile convergence. Digital Identity Management 2008: 33-40 - 2007
- [c16]Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi:
Certificate-less user authentication with consent. Digital Identity Management 2007: 11-16 - [c15]Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi:
Implementing identity provider on mobile phone. Digital Identity Management 2007: 46-52 - 2006
- [c14]Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi:
Trusted-link: web-link enhancement for integrity and trustworthiness. Digital Identity Management 2006: 17-24 - 2005
- [c13]Shintaro Mizuno, Katsunori Matsuura, Kohji Yamada, Kenji Takahashi:
A new remote configurable firewall system for home-use gateways. CCNC 2005: 599-601 - [c12]Kei Karasawa, Yusuke Kira, Yoshitsugu Tsuchiya, Kohji Yamada, Kenji Takahashi:
A detachable IPsec device for secure consumer communication. CCNC 2005: 608-610 - [c11]Shintaro Mizuno, Kohji Yamada, Kenji Takahashi:
Authentication using multiple communication channels. Digital Identity Management 2005: 54-62 - [c10]Paul Madsen, Yuzo Koga, Kenji Takahashi:
Federated identity management for protecting users from ID theft. Digital Identity Management 2005: 77-83 - 2004
- [c9]Akira Kanamaru, Yoshitsugu Tsuchiya, Tomohiro Fujisaki, Kenji Takahashi:
Fieldcast2: Flexible P2P architecture for presence information sharing. PerCom Workshops 2004: 98-103 - 2000
- [c8]Kenji Takahashi, Wolfgang Emmerich, Anthony Finkelstein, Sofia Guerra:
System development using application services over the Net (tutorial session). ICSE 2000: 830 - 1999
- [c7]Feng Cao, Jeffrey D. Smith, Kenji Takahashi:
An Architecture of Distributed Media Servers for Supporting Guaranteed QoS and Media Indexing. ICMCS, Vol. 2 1999: 1-5 - 1996
- [c6]Kenji Takahashi, Colin Potts, Vinay Kumar, Kenji Ota, Jeffrey D. Smith:
Hypermedia Support for Collaboration in Requirements Analysis. ICRE 1996: 31-41 - [c5]Jeffrey D. Smith, Kenji Takahashi:
Multimedia Architecture to Support Requirements Analysis. IDMS 1996: 15-31 - [c4]Kenji Takahashi:
Workshop on Requirements Engineering. WETICE 1996: 207 - 1995
- [c3]Colin Potts, Kenji Takahashi, Jeffrey D. Smith, Kenji Ota:
An evaluation of inquiry-based requirements analysis for an Internet service. RE 1995: 172-180 - 1993
- [c2]Colin Potts, Kenji Takahashi:
An Active Hypertext Model for System Requirements. IWSSD 1993: 62-68 - 1988
- [c1]Tohru Watanabe, Keiji Nakajima, Kenji Takahashi:
Pattern Recognition Of 3-d Objects Using A Hand Eye System. IROS 1988: 297-302
Editorship
- 2010
- [e3]Thomas Groß, Kenji Takahashi:
Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010. ACM 2010, ISBN 978-1-4503-0090-2 [contents] - 2009
- [e2]Elisa Bertino, Thomas Groß, Kenji Takahashi:
Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009. ACM 2009, ISBN 978-1-60558-786-8 [contents] - 2008
- [e1]Elisa Bertino, Kenji Takahashi:
Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-294-8 [contents]
Informal and Other Publications
- 2022
- [i1]Jeremy Kepner, Jonathan Bernays, Stephen Buckley, Kenjiro Cho, Cary Conrad, Leslie Daigle, Keeley Erhardt, Vijay Gadepally, Barry Greene, Michael Jones, Robert Knake, Bruce M. Maggs, Peter Michaleas, Chad R. Meiners, Andrew Morris, Alex Pentland, Sandeep Pisharody, Sarah Powazek, Andrew Prout, Philip Reiner, Koichi Suzuki, Kenji Takahashi, Tony Tauber, Leah Walker, Doug Stetson:
Zero Botnets: An Observe-Pursue-Counter Approach. CoRR abs/2201.06068 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint