default search action
Keita Yokoyama
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Yudai Suzuki, Keita Yokoyama:
Searching problems above arithmetical transfinite recursion. Ann. Pure Appl. Log. 175(10): 103488 (2024) - [j20]Leszek Aleksander Kolodziejczyk, Tin Lok Wong, Keita Yokoyama:
Ramsey's theorem for pairs, collection, and proof size. J. Math. Log. 24(2): 2350007:1-2350007:40 (2024) - 2023
- [j19]Makoto Fujiwara, Hajime Ishihara, Takako Nemoto, Nobu-Yuki Suzuki, Keita Yokoyama:
Extended Frames and Separations of Logical Principles. Bull. Symb. Log. 29(3): 311-353 (2023) - [j18]Leszek Aleksander Kolodziejczyk, Katarzyna W. Kowalik, Keita Yokoyama:
How Strong is Ramsey's Theorem if infinity can be Weak? J. Symb. Log. 88(2): 620-639 (2023) - 2022
- [c9]Yuan Wang, Shigeki Tanaka, Keita Yokoyama, Hsin-Tai Wu, Yi Fang:
Two-sided Rank Consistent Ordinal Regression for Interpretable Music Key Recommendation. ICTIR 2022: 223-231 - [i4]Yijia Chen, Moritz Müller, Keita Yokoyama:
A parameterized halting problem, Δ0 truth and the MRDP theorem. CoRR abs/2211.06121 (2022) - 2021
- [j17]André Nies, Marcus Anthony Triplett, Keita Yokoyama:
The Reverse Mathematics of theorems of Jordan and Lebesgue. J. Symb. Log. 86(4): 1657-1675 (2021) - [c8]Leszek Aleksander Kolodziejczyk, Keita Yokoyama:
In Search of the First-Order Part of Ramsey's Theorem for Pairs. CiE 2021: 297-307 - [c7]Yuan Wang, Shigeki Tanaka, Keita Yokoyama, Hsin-Tai Wu, Yi Fang:
Karaoke Key Recommendation Via Personalized Competence-Based Rating Prediction. ICASSP 2021: 286-290 - [c6]Keiichi Ochiai, Takuya Chida, Keita Yokoyama, Daisuke Koizumi, Hiroaki Tanaka, Akihiro Kawana:
Memory Efficient Adversarial Attacks on Graphs: A Winning Solution for KDD Cup 2020. ICMU 2021: 1-6 - 2020
- [j16]Caleb Davis, Denis R. Hirschfeldt, Jeffry L. Hirst, Jake Pardo, Arno Pauly, Keita Yokoyama:
Combinatorial principles equivalent to weak induction. Comput. 9(3-4): 219-229 (2020) - [c5]Yuan Wang, Chenwei Wang, Yinan Ling, Keita Yokoyama, Hsin-Tai Wu, Yi Fang:
Leveraging an Efficient and Semantic Location Embedding to Seek New Ports of Bike Share Services. IEEE BigData 2020: 1273-1282 - [i3]Yuan Wang, Chenwei Wang, Yinan Ling, Keita Yokoyama, Hsin-Tai Wu, Yi Fang:
Leveraging an Efficient and Semantic Location Embedding to Seek New Ports of Bike Share Services. CoRR abs/2011.03158 (2020)
2010 – 2019
- 2018
- [j15]Theodore A. Slaman, Keita Yokoyama:
The strength of Ramsey's Theorem for Pairs and arbitrarily Many Colors. J. Symb. Log. 83(4): 1610-1617 (2018) - [j14]Emanuele Frittaion, Florian Pelupessy, Silvia Steila, Keita Yokoyama:
The strength of SCT soundness. J. Log. Comput. 28(6): 1217-1242 (2018) - [c4]Yijia Chen, Moritz Müller, Keita Yokoyama:
A parameterized halting problem, the linear time hierarchy, and the MRDP theorem. LICS 2018: 235-244 - 2017
- [c3]Emanuele Frittaion, Silvia Steila, Keita Yokoyama:
The Strength of the SCT Criterion. TAMC 2017: 260-273 - 2016
- [j13]Silvia Steila, Keita Yokoyama:
Reverse mathematical bounds for the Termination Theorem. Ann. Pure Appl. Log. 167(12): 1213-1241 (2016) - [j12]Alexander P. Kreuzer, Keita Yokoyama:
On principles between ∑1- and ∑2-induction, and monotone enumerations. J. Math. Log. 16(1): 1650004:1-1650004:21 (2016) - [i2]Emanuele Frittaion, Silvia Steila, Keita Yokoyama:
The strength of the SCT criterion. CoRR abs/1611.05176 (2016) - 2015
- [j11]Leszek Aleksander Kolodziejczyk, Keita Yokoyama:
Categorical characterizations of the natural numbers require primitive recursion. Ann. Pure Appl. Log. 166(2): 219-231 (2015) - [i1]Silvia Steila, Keita Yokoyama:
Reverse Mathematical Bounds for the Termination Theorem. CoRR abs/1512.08622 (2015) - 2014
- [j10]Yoshihiro Horihata, Keita Yokoyama:
Nonstandard second-order arithmetic and Riemann's mapping theorem. Ann. Pure Appl. Log. 165(2): 520-551 (2014) - [j9]Kojiro Higuchi, W. M. Phillip Hudelson, Stephen G. Simpson, Keita Yokoyama:
Propagation of partial randomness. Ann. Pure Appl. Log. 165(2): 742-758 (2014) - [c2]Shota Murakami, Takeshi Yamazaki, Keita Yokoyama:
On the Ramseyan Factorization Theorem. CiE 2014: 324-332 - 2013
- [j8]Stephen G. Simpson, Keita Yokoyama:
Reverse mathematics and Peano categoricity. Ann. Pure Appl. Log. 164(3): 284-293 (2013) - [j7]Keita Yokoyama:
On the strength of Ramsey's theorem without Σ1-induction. Math. Log. Q. 59(1-2): 108-111 (2013) - [c1]Makoto Fujiwara, Keita Yokoyama:
A Note on the Sequential Version of Statements. CiE 2013: 171-180 - 2012
- [j6]Sam Sanders, Keita Yokoyama:
The Dirac delta function in two settings of Reverse Mathematics. Arch. Math. Log. 51(1-2): 99-121 (2012) - 2011
- [j5]Stephen G. Simpson, Keita Yokoyama:
A Nonstandard Counterpart of WWKL. Notre Dame J. Formal Log. 52(3): 229-243 (2011) - 2010
- [j4]Keita Yokoyama:
Formalizing non-standard arguments in second-order arithmetic. J. Symb. Log. 75(4): 1199-1210 (2010)
2000 – 2009
- 2007
- [j3]Keita Yokoyama:
Complex analysis in subsystems of second order arithmetic. Arch. Math. Log. 46(1): 15-35 (2007) - [j2]Nobuyuki Sakamoto, Keita Yokoyama:
The Jordan curve theorem and the Schönflies theorem in weak second-order arithmetic. Arch. Math. Log. 46(5-6): 465-480 (2007) - [j1]Keita Yokoyama:
Non-standard analysis in ACA0 and Riemann mapping theorem. Math. Log. Q. 53(2): 132-146 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint