Yoshinobu Kawabe

According to our database1, Yoshinobu Kawabe authored at least 33 papers between 1995 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers.
Proceedings of the Advances in Networked-Based Information Systems, 2021

2019
On Trust Confusional, Trust Ignorant, and Trust Transitions.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

DiReCT: Disaster Response Coordination with Trusted Volunteers.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019

2017
Assessment of BAR: Breakdown Agent Replacement Algorithm for SCRAM.
Int. J. Softw. Innov., 2017

On Computer-Assisted Verification of Timed Anonymity of Multi-Agent Systems.
Proceedings of the 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, 2017

Problem Solving with Interactive-Theorem Proving - A Case Study.
Proceedings of the 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, 2017

An Evaluation of BAR: Breakdown Agent Replacement Algorithm for SCRAM.
Proceedings of the 4th Intl Conf on Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, 2017

2016
Foreword.
IEICE Trans. Inf. Syst., 2016

A Algorithm with Expected Value: Path Planning That Avoids Stochastic Traffic Obstacles.
Proceedings of the IEEE International Conference on Agents, 2016

On backward-style verification for timed anonymity of security protocols.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

2015
Developing Compiler for Nihongo Programming Language PEN.
Proceedings of the 3rd International Conference on Applied Computing and Information Technology, 2015

BAR: Breakdown Agent Replacement Algorithm for SCRAM.
Proceedings of the 3rd International Conference on Applied Computing and Information Technology, 2015

Verifying ignition timing of gasoline direct injection engine's PCM.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

Robust location tracking method for mixed reality robots using a rotation search method.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

2014
Toward Formal Verification of ECU for Gasoline Direct Injection Engines.
Proceedings of the IIAI 3rd International Conference on Advanced Applied Informatics, 2014

2013
Automated proof for equivalence of telephone systems.
Proceedings of the 2013 IEEE/ACIS 12th International Conference on Computer and Information Science, 2013

On embedded programming education with a tiny Lisp.
Proceedings of the 2013 IEEE/ACIS 12th International Conference on Computer and Information Science, 2013

2010
Anonymity, Privacy, Onymity, and Identity: A Modal Logic Approach.
Trans. Data Priv., 2010

Probabilistic anonymity via coalgebraic simulations.
Theor. Comput. Sci., 2010

Role Interchange for Anonymity and Privacy of Voting.
J. Log. Comput., 2010

On Formal Modeling of TOPPERS Embedded Software.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

2008
An Adversary Model for Simulation-Based Anonymity Proof.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

On Backward-Style Anonymity Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Theorem-proving anonymity of infinite-state systems.
Inf. Process. Lett., 2007

A Formal Approach to Designing Anonymous Software.
Proceedings of the 5th ACIS International Conference on Software Engineering Research, 2007

Probabilistic Anonymity Via Coalgebraic Simulations.
Proceedings of the Programming Languages and Systems, 2007

2005
Name creation implements restriction in the pi-calculus.
Syst. Comput. Jpn., 2005

Verifying Trace Equivalence of a Shared-Memory-Style Communication System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2004
Name-passing style GUI programming in the <i>pi</i>-calculus-based language Nepi.
Proceedings of the 6th AMAST Workshop on Real-Time Systems, 2004

The Nepi Network Programming System: A Programming Environment for Distributed Systems.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

2000
The Nepi<sup>2</sup> Programming System: A pi-Calculus-Based Approach to Agent-Based Programming.
Proceedings of the Formal Approaches to Agent-Based Systems, First International Workshop, 2000

1997
On Modularity of the Completeness in Order-Sorted Term Rewriting Systems.
Proceedings of the Computing and Combinatorics, Third Annual International Conference, 1997

1995
Currying of Order-Sorted Term Rewriting Systems.
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995


  Loading...