Kenji Takahashi

Orcid: 0000-0002-5420-7168

According to our database1, Kenji Takahashi authored at least 57 papers between 1988 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Detection of osteochondritis dissecans using convolutional neural networks for computer-aided diagnosis of baseball elbow.
Proceedings of the 53rd IEEE International Symposium on Multiple-Valued Logic, 2023

2022
Zero Botnets: An Observe-Pursue-Counter Approach.
CoRR, 2022

Detection of osteochondritis dissecans in ultrasound images for computer-aided diagnosis of baseball elbow.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

Balanced Score Propagation for Botnet Detection.
Proceedings of the IEEE International Conference on Communications, 2022

RP2A: Rare Process-Pattern Analysis - Identifying Potential Problem Process-Patterns by Analyzing System Execution Data.
Proceedings of the 29th Asia-Pacific Software Engineering Conference, 2022

2021
SamE: Sampling-based Embedding for Learning Representations of the Internet.
Proceedings of the IEEE Global Communications Conference, 2021

Multi-hop Graph Embedding for Botnet Detection.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Large-Scale Network-Traffic-Identification Method with Domain Adaptation.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

SILU: Strategy Involving Large-scale Unlabeled Logs for Improving Malware Detector.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Piper: A Unified Machine Learning Pipeline for Internet-scale Traffic Analysis.
Proceedings of the IEEE Global Communications Conference, 2020

Is stateful packrat parsing really linear in practice? a counter-example, an improved grammar, and its parsing algorithms.
Proceedings of the CC '20: 29th International Conference on Compiler Construction, 2020

2019
Validation of Noninvasive Ultrasound Temperature Measurement System Through Experiments Using Resonant Cavity Applicator.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

Alchemy: Stochastic Feature Regeneration for Malicious Network Traffic Classification.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Evaluation of Deep Thermal Rehabilitation System Using Resonant Cavity Applicator During Knee Experiments.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

2015
Throughput improvement method exploiting capture effect in densely placed WLANs.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

Message from the IWSC 2015 Workshop Organizers.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Estimating 3-D Point-of-Regard in a Real Environment Using a Head-Mounted Eye-Tracking System.
IEEE Trans. Hum. Mach. Syst., 2014

Tracking requirements evolution by using issue tickets: a case study of a document management and approval system.
Proceedings of the 36th International Conference on Software Engineering, 2014

2013
High-Performance Inverter Based on Shaft Acceleration Torque for AC Drives.
IEEE Trans. Ind. Electron., 2013

An experience report for software quality evaluation in highly iterative development methodology using traditional metrics.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Heating properties of resonant cavity applicator for treating rheumatoid arthritis by using 3-D FEM knee model.
Proceedings of the 7th International Symposium on Medical Information and Communication Technology, 2013

2012
Metric-Based Quality Evaluations for Iterative Software Development Approaches Like Agile.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

Acceleration control of AC servo motor considering cogging torque at low velocities for haptics.
Proceedings of the 21st IEEE International Symposium on Industrial Electronics, 2012

2011
Privacy in the Cloud.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Web Contents Collaborative Method in Call-to-Web Session Linkage System.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Demonstration of Web Contents Collaborative System for Call Parties.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Single inductor DC-DC converter with bipolar outputs using charge pump.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2010

2009
Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems.
Computer, 2009

Video stabilization and motion deblurring on GPU.
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2009

Proposal of Delegation Using Electronic Certificates on Single Sign-On System with SAML-Protocol.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Soramame: what you see is what you control access control user interface.
Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2009

2008
Symmetric identity federation for fixed-mobile convergence.
Proceedings of the 4th Workshop on Digital Identity Management, 2008

2007
Certificate-less user authentication with consent.
Proceedings of the 2007 Workshop on Digital Identity Management, 2007

Implementing identity provider on mobile phone.
Proceedings of the 2007 Workshop on Digital Identity Management, 2007

2006
A Survey on Identity Management Protocols and Standards.
IEICE Trans. Inf. Syst., 2006

Trusted-link: web-link enhancement for integrity and trustworthiness.
Proceedings of the 2006 Workshop on Digital Identity Management, 2006

2005
Authentication using multiple communication channels.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

Federated identity management for protecting users from ID theft.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005

A new remote configurable firewall system for home-use gateways.
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005

A detachable IPsec device for secure consumer communication.
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005

2004
FieldCast: Peer-to-Peer Presence Information Exchange in Ubiquitous Computing Environment.
IEICE Trans. Inf. Syst., 2004

Fieldcast2: Flexible P2P architecture for presence information sharing.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

2003
Ultra-high-density interconnection technology of three-dimensional packaging.
Microelectron. Reliab., 2003

2000
A Hypermedia Environment for Global Collaboration.
IEEE Multim., 2000

System development using application services over the Net (tutorial session).
Proceedings of the 22nd International Conference on on Software Engineering, 2000

1999
An Architecture of Distributed Media Servers for Supporting Guaranteed QoS and Media Indexing.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

1998
Metalevel Links: More Power to Your Links.
Commun. ACM, 1998

1997
Analysis and Design of Web-based Information Systems.
Comput. Networks, 1997

1996
Workshop on Requirements Engineering.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

Multimedia Architecture to Support Requirements Analysis.
Proceedings of the Interactive Distributed Multimedia Systems and Services, 1996

Hypermedia Support for Collaboration in Requirements Analysis.
Proceedings of the 2nd International Conference on Requirements Engineering, 1996

1995
A comparative study of structured and text-oriented analysis and design methodologies.
J. Syst. Softw., 1995

An Analysis of Traceability in Requirements Documents.
IEICE Trans. Inf. Syst., 1995

An evaluation of inquiry-based requirements analysis for an Internet service.
Proceedings of the Second IEEE International Symposium on Requirements Engineering, March 27, 1995

1994
Inquiry-Based Requirements Analysis.
IEEE Softw., 1994

1993
An Active Hypertext Model for System Requirements.
Proceedings of the 7th International Workshop on Software Specification and Design, 1993

1988
Pattern Recognition Of 3-d Objects Using A Hand Eye System.
Proceedings of the IEEE International Workshop on Intelligent Robots and Systems '88, Proceedings. IROS 1988, Tokyo, Japan, October 31, 1988


  Loading...