Takashi Katoh

According to our database1, Takashi Katoh authored at least 35 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Auto-Encoder to Reconstruct Structure with Cryo-EM Images via Theoretically Guaranteed Isometric Latent Space, and Its Application for Automatically Computing the Conformational Pathway.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

2022
In-place initializable arrays.
Theor. Comput. Sci., 2022

Three approaches to facilitate invariant neurons and generalization to out-of-distribution orientations and illuminations.
Neural Networks, 2022

2021
Three approaches to facilitate DNN generalization to objects in out-of-distribution orientations and illuminations: late-stopping, tuning batch normalization and invariance loss.
CoRR, 2021

Annotation Cost Reduction of Stream-based Active Learning by Automated Weak Labeling using a Robot Arm.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021

2020
Selective Forgetting of Deep Networks at a Finer Level than Samples.
CoRR, 2020

2018
Multi Instance Learning For Unbalanced Data.
CoRR, 2018

2013
Mining Frequent Partite Episodes with Partwise Constraints.
Proceedings of the New Frontiers in Mining Complex Patterns, 2013

2012
EVIS: A Fast and Scalable Episode Matching Engine for Massively Parallel Data Streams.
Proceedings of the Database Systems for Advanced Applications, 2012

2011
Extracting refrained phrases from music signals using a frequent episode pattern mining algorithm.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
A Proposal of P2P Content Retrieval System Using Access-Based Grouping Technique.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2010

A user authenticaion scheme using multiple passphrases and its arrangement.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Virtualization Technology for Ubiquitous Databases.
Proceedings of the CISIS 2010, 2010

Virtual Database Technology for Distributed Database.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
A Polynomial-Delay Polynomial-Space Algorithm for Extracting Frequent Diamond Episodes from Event Sequences.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents.
Proceedings of the Multiagent System Technologies, 7th German Conference, 2009

Mining Frequent <i>k</i>-Partite Episodes from Event Sequences.
Proceedings of the New Frontiers in Artificial Intelligence, 2009

Mining Frequent Bipartite Episode from Event Sequences.
Proceedings of the Discovery Science, 12th International Conference, 2009

2008
A Simple Characterization on Serially Constructible Episodes.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008

2007
Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

Mining Frequent Diamond Episodes from Event Sequences.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

A New Approach to Early Detection of an Unknown Worm.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Mining Sectorial Episodes from Event Sequences.
Proceedings of the Discovery Science, 9th International Conference, 2006

An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

AWide Area Log Analyzing System Based on Mobile Agents.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

On a Watermarking Scheme for MusicXML.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

DoS Packet Filter Using DNS Information.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Cooperative Behavior of Agents Based on Potential Field.
Proceedings of the Multi-Agent Systems and Applications IV, 2005

2004
On Agents' Cooperative Behavior Based on Potential Field.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Analyzing dynamic behavior of multiagents' task allocation based on subjective cooperative relations.
Syst. Comput. Jpn., 2003

2002
An Architecture of Agent Repository for Adaptive Multiagent System.
Proceedings of the Information Networking, 2002

Dynamic Behavior of Multiagents with Subjective Cooperative Relations.
Proceedings of the Information Networking, 2002

2000
Dynamic Properties of Multiagents Based on a Mechanism of Loose Coalition.
Proceedings of the Design and Applications of Intelligent Agents, 2000


  Loading...