default search action
Ken'ichi Kakizaki
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Jedidah Mwaura, Shunsuke Araki, Ken'ichi Kakizaki:
A Study on DDoS Attacks Detection on IoT Devices Using Machine Learning for Microcontrollers. ICCE 2024: 1-4 - 2023
- [c29]Wanpeng Shao, Ken'ichi Kakizaki, Shunsuke Araki, Tomohisa Mukai:
Reflections Removal Produced by Multiple Transparent and Reflective Glass Objects in TLS Measurements. COMPSAC 2023: 370-379 - [c28]Shihcheng Peng, Shunsuke Araki, Ken'ichi Kakizaki:
A Study on a Full-node Problem of the Domain Name System based on Ethereum. ICCE-Taiwan 2023: 529-530 - [c27]Maki Kawano, Shihcheng Peng, Shunsuke Araki, Ken'ichi Kakizaki:
A Study on Guessing plaintexts by Neural Network against Data Encryption Standard (DES). ICCE-Taiwan 2023: 531-532 - 2022
- [c26]Wanpeng Shao, Ken'ichi Kakizaki, Shunsuke Araki, Tomohisa Mukai:
Automated Two-Stage Approach for Damage Detection of Surface Defects in Historical Buildings. COMPSAC 2022: 1816-1821 - [c25]Wanpeng Shao, Ayumu Sasaki, Ken'ichi Kakizaki, Shunsuke Araki, Tomohisa Mukai:
Inspection Support System for Aging Buildings Using Virtual Reality Technology. ICCE-TW 2022: 47-48 - [c24]Takuya Tsuruta, Shunsuke Araki, Takeru Miyazaki, Satoshi Uehara, Ken'ichi Kakizaki:
A Study on a DDH-Based Keyed Homomorphic Encryption Suitable to Machine Learning in the Cloud. ICCE-TW 2022: 167-168 - [c23]Wanpeng Shao, Ken'ichi Kakizaki, Shunsuke Araki, Tomohisa Mukai:
Identification of Transparent and Specular Reflective Glass Planes in TLS Data with Intensity Values. ICCE-TW 2022: 343-344 - 2021
- [c22]Ayaka Inomata, Shunsuke Araki, Ken'ichi Kakizaki:
A Study on Use of Machine Learning to Evaluate the Security of Common Key Cryptosystem. ICCE-TW 2021: 1-2 - [c21]Gen Osono, Shunsuke Araki, Takeru Miyazaki, Satoshi Uehara, Ken'ichi Kakizaki:
A Study on Control Parameter and Output Sequence of the Logistic Map over Integers for Pseudorandom Number Generation. ICCE-TW 2021: 1-2 - [c20]Wanpeng Shao, Ken'ichi Kakizaki, Shunsuke Araki, Tomohisa Mukai:
Damage Detection of the RC Building in TLS Point Clouds Using 3D Deep Neural Network PointNet++. ISM 2021: 39-42
2010 – 2019
- 2018
- [c19]Shunsuke Araki, Hideyuki Muraoka, Takeru Miyazaki, Satoshi Uehara, Ken'ichi Kakizaki:
A Study on Computational Methods of the Logistic Map over Integers for a Pseudorandom Number Generator. ISITA 2018: 486-490 - 2016
- [c18]Shunsuke Araki, Hideyuki Muraoka, Takeru Miyazaki, Satoshi Uehara, Ken'ichi Kakizaki:
A design guide of renewal of a parameter of the logistic map over integers on pseudorandom number generator. ISITA 2016: 781-785 - [c17]Hideyuki Muraoka, Shunsuke Araki, Takeru Miyazaki, Satoshi Uehara, Ken'ichi Kakizaki:
Occurrence rate per bit for any control parameter on the logistic map over integers. ISITA 2016: 786-790 - 2015
- [c16]Dechen Liu, Yusuke Kitamura, Xin Zeng, Shunsuke Araki, Ken'ichi Kakizaki:
Analysis and Visualization of Traffic Conditions of Road Network by Route Bus Probe Data. BigMM 2015: 248-251 - [c15]Hideyuki Muraoka, Yuma Ouchi, Shunsuke Araki, Ken'ichi Kakizaki:
A terminal authentication with transiting nodes by SymPC on an ad-hoc network. ICCE-TW 2015: 382-383 - 2014
- [c14]Jing Wu, Yuma Oouti, Shunsuke Araki, Ken'ichi Kakizaki:
Image segmentation methods for sanitizable signatures. ICCE-TW 2014: 51-52 - [c13]Shunsuke Araki, Ken'ichi Kakizaki, Takeru Miyazaki, Satoshi Uehara:
Initial values entering into an element zero with period one for logistic maps over integers. ISITA 2014: 709-713 - [c12]Xin Zeng, Shunsuke Araki, Ken'ichi Kakizaki:
An Extracting Method for Individual Building Wall Points from Mobile Mapping System Data. ISM 2014: 167-174 - 2013
- [c11]Shunsuke Araki, Ken'ichi Kakizaki, Takeru Miyazaki, Satoshi Uehara:
A study on distance between two sequences by the logistic map over integers with slightly different parameters. IWSDA 2013: 64-67 - 2012
- [c10]Shunsuke Araki, Takeru Miyazaki, Satoshi Uehara, Ken'ichi Kakizaki:
A study on precision of pseudorandom number generators using the logistic map. ISITA 2012: 740-744 - 2010
- [c9]Shunsuke Araki, Ken'ichi Kakizaki, Takeru Miyazaki, Satoshi Uehara:
Suitable representation of values on the logistic map with finite precision. ISITA 2010: 824-829
2000 – 2009
- 2008
- [j1]Yoshio Inasawa, Shinji Kuroda, Ken'ichi Kakizaki, Hitoshi Nishikawa, Naofumi Yoneda, Shigeru Makino:
Near-Field to Far-Field Transformation for an Outdoor RCS Range. IEICE Trans. Electron. 91-C(9): 1463-1471 (2008)
1990 – 1999
- 1999
- [c8]Akira Abeta, Ken'ichi Kakizaki:
Implementation and Evaluation of an Automatic Personal Workflow Extraction Method. COMPSAC 1999: 206-212 - [c7]Akira Abeta, Kaoru Satoh, Ken'ichi Kakizaki:
Organizing and Visualizing Related Work Events on Personal Information Management Systems. IV 1999: 73-80 - 1998
- [c6]Akira Abeta, Ken'ichi Kakizaki:
Operation Record Based Workflow Extracting Method for Personal Information Management System. APCHI 1998: 224-231 - [c5]Akira Abeta, Ken'ichi Kakizaki:
Operation Record Based Work Events Grouping Method for Personal Information Management System. COMPSAC 1998: 548-555 - [c4]Ken'ichi Kakizaki:
Generating the Animation of a 3D Agent from Explanation Text. ACM Multimedia 1998: 139-144 - [c3]Ken'ichi Kakizaki:
Incremental Scene Graph Distribution Method for Distributed Virtual Environments. Services and Visualization: Towards User-Friendly Design 1998: 61-74 - [c2]Ken'ichi Kakizaki, Masa-Aki Hashimoto, Yuji Imoto, Jiro Kuriyama, Katsuaki Nakagawa:
Database Supported German Language Learning System on the WWW. WebNet 1998
1980 – 1989
- 1986
- [c1]Ken'ichi Kakizaki, Kuniaki Uehara, Jun'ichi Toyoda:
Development of C-Prolog Compiler. LP 1986: 126-136
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint