default search action
Kenichi Watanabe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j12]Winfried Kockelmann, Triestino Minniti, Daniel E. Pooley, Genoveva Burca, Ranggi S. Ramadhan, Freddie A. Akeroyd, Gareth D. Howells, Chris Moreton-Smith, David P. Keymer, Joe F. Kelleher, Saurabh Kabra, Tung Lik Lee, Ralf Ziesche, Anthony Reid, Giuseppe Vitucci, Giuseppe Gorini, Davide Micieli, Raffaele G. Agostino, Vincenzo Formoso, Francesco Aliotta, Rosa Ponterio, Sebastiano Trusso, Gabriele Salvato, Cirino Vasi, Francesco Grazzi, Kenichi Watanabe, Jason W. L. Lee, Anton S. Tremsin, Jason B. McPhate, Daniel Nixon, Nick Draper, William Halcrow, Jim Nightingale:
Time-of-Flight Neutron Imaging on IMAT@ISIS: A New User Facility for Materials Science. J. Imaging 4(3): 47 (2018) - 2015
- [j11]Daisuke Fukuda, Kenichi Watanabe, Yuji Kanazawa, Masanori Hashimoto:
Modeling the Effect of Global Layout Pattern on Wire Width Variation for On-the-Fly Etching Process Modification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(7): 1467-1474 (2015) - 2014
- [j10]Daisuke Fukuda, Kenichi Watanabe, Naoki Idani, Yuji Kanazawa, Masanori Hashimoto:
Edge-over-Erosion Error Prediction Method Based on Multi-Level Machine Learning Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(12): 2373-2382 (2014) - 2012
- [c23]Shuai Xun Chen, Hoay Beng Gooi, Tham Tzen Woo, Thi Ha Yushein, Kenichi Watanabe:
Investigation on solar PV and battery system penetration in Singapore distribution power networks. A-SSCC 2012: 48-53
2000 – 2009
- 2009
- [j9]Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa:
Trustworthiness of acquaintances in Peer-to-Peer overlay networks. Int. J. High Perform. Comput. Netw. 6(2): 160-171 (2009) - 2008
- [j8]Keiji Ozaki, Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa:
A Fault-Tolerant Model of Wireless Sensor-Actuator Network. Int. J. Distributed Sens. Networks 4(2): 110-128 (2008) - 2007
- [j7]Kenichi Watanabe, Yoshio Nakajima, Tomoya Enokido, Makoto Takizawa:
Ranking factors in peer-to-peer overlay networks. ACM Trans. Auton. Adapt. Syst. 2(3): 11 (2007) - [c22]Kiyohiro Morita, Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa:
An Efficient Data Transmission Protocol in a Wireless Sensor-Actuator Network. CISIS 2007: 11-18 - [c21]Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa:
A Superpeer-Based Two-Layer P2P Overlay Network with the CBF Strategy. CISIS 2007: 111-118 - [c20]Yoshio Nakajima, Kenichi Watanabe, Valbona Barolli, Tomoya Enokido, Makoto Takizawa:
An Inter-peer Trustworthiness Based on Access Control in Peer-to-Peer Overlay Networks. CISIS 2007: 163-170 - [c19]Yoshio Nakajima, Kenichi Watanabe, Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa:
Trustworthiness of Acquaintance peers on Access Control Models. DEXA Workshops 2007: 784-788 - [c18]Kenichi Watanabe, Yoshio Nakajima, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa:
Confidence-based Trustworthiness of Acquaintance Peers in Peer-to-Peer Overlay Networks. ICDCS Workshops 2007: 30 - [c17]Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa:
Performance Analysis of the Superpeer-based Two-layer P2P Overlay Network with the CBF Strategy. ICDCS Workshops 2007: 32 - [c16]Yoshio Nakajima, Kenichi Watanabe, Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa, S. Misbah Deen:
Cooperation of Trustworthy Peers in P2P Overlay Networks. ICPP Workshops 2007: 4 - [c15]K. H. (Kane) Kim, Keizo Fujiwara, Moon-Cheol Kim, Liangchen Zheng, Kenichi Watanabe, Makoto Takizawa:
A TTF-Based Programming Model and a Support Kernel Running on a Communicating Sensor Platform. ISADS 2007: 368-376 - [c14]Kiyohiro Morita, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa:
Efficient Data Transmission in a Lossy and Resource Limited Wireless Sensor-Actuator Network. ISORC 2007: 156-163 - [c13]Kiyohiro Morita, Keiji Ozaki, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa:
Sensor-Actuator Communication Protocols in Wireless Networks. NBiS 2007: 11-19 - 2006
- [j6]Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa:
Satisfiability and trustworthiness of acquaintances in peer-to-peer overlay networks. Inf. Syst. Frontiers 8(4): 271-284 (2006) - [j5]Kenichi Watanabe, Makoto Takizawa:
Service Oriented Cooperation among Trustworthy Peers. J. Interconnect. Networks 7(4): 507-533 (2006) - [c12]Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido, S. Misbah Deen:
Satisfiability and Trustworthiness of Peers in Peer-to-Peer Overlay Networks. ARES 2006: 42-49 - [c11]Kenichi Watanabe, Yoshio Nakajima, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido, S. Misbah Deen:
Service Oriented Trustworthiness of Acquaintances in Peer-to-Peer Overlay Networks. AINA (1) 2006: 3-8 - [c10]Keiji Ozaki, Kenichi Watanabe, Satoshi Itaya, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa:
A Fault-Tolerant Model forWireless Sensor-Actor System. AINA (2) 2006: 303-307 - [c9]Kenichi Watanabe, Yoshio Nakajima, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa, S. Misbah Deen:
Trustworthiness of Peers Based on Access Control in Peer-to-Peer Overlay Networks. ICDCS Workshops 2006: 74 - [c8]Keiji Ozaki, Kenichi Watanabe, Satoshi Itaya, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa:
A Fault-Tolerant Model ofWireless Sensor-Actor Network. ISORC 2006: 186-193 - [c7]Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa, S. Misbah Deen:
Trustworthiness in Peer-to-Peer Overlay Networks. SUTC (1) 2006: 86-93 - 2005
- [j4]Kojiro Taguchi, Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa:
Causally ordered delivery in a hierarchical group of peer processes. Comput. Commun. 28(11): 1337-1347 (2005) - [j3]Kenichi Watanabe, Naohiro Hayashibara, Makoto Takizawa:
Cbf: Look-up Protocol for Distributed Multimedia Objects in Peer-to-peer Overlay Networks. J. Interconnect. Networks 6(3): 323-344 (2005) - [c6]Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa, K. H. (Kane) Kim:
Charge-Based Flooding Algorithm for Detecting Multimedia Objects in Peer-to-Peer Overlay Networks. AINA 2005: 165-170 - [c5]Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa, K. H. (Kane) Kim:
Acquaintance-Based Protocol for Manipulating Multimedia Objects in Peer-to-Peer Overlay Networks. DEXA Workshops 2005: 771-775 - [c4]Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa, K. H. (Kane) Kim:
Charge-based Flooding Algorithm for Looking Up Multimedia Objects in Peer-to-Peer Overlay Networks. ICPADS (1) 2005: 481-487 - [c3]Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa, K. H. (Kane) Kim:
Acquaintance-based Protocol for Detecting Multimedia Objects in Peer-to-Peer Overlay Networks. ISORC 2005: 245-252 - [c2]Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa:
A Model for Manipulating Multimedia Objects in Peer-to-Peer Overlay Networks. Wissensmanagement 2005: 222-227 - 2004
- [j2]Kenichi Watanabe, Yosuke Sugiyama, Tomoya Enokido, Makoto Takizawa:
Moderate Concurrency Control In Distributed Object Systems. J. Interconnect. Networks 5(2): 181-191 (2004) - [c1]Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa:
Distributed Multimedia Objects in Peer-to-Peer Networks. DEXA Workshops 2004: 337-341
1990 – 1999
- 1998
- [j1]Yoshiyuki Sankai, Kiyoshi Fujiwara, Kenichi Watanabe, Hisashi Moriyama:
HOJO-brain for motion control of robots and biological systems. Artif. Life Robotics 2(4): 162-169 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint