default search action
Kenichi Yamazaki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Yinliang Diao, Essam A. Rashed, Luca Giaccone, Ilkka Laakso, Congsheng Li, Riccardo Scorretti, Yoichi Sekiba, Kenichi Yamazaki, Akimasa Hirata:
Intercomparison of the Averaged Induced Electric Field in Learning-Based Human Head Models Exposed to Low-Frequency Magnetic Fields. IEEE Access 11: 38739-38752 (2023) - [j6]Yoichi Sekiba, Sachiko Kodera, Kenichi Yamazaki, Akimasa Hirata:
Calculation of Electric Field Induced in the Human Body for Simultaneous Exposure to Spatially Uniform ELF Electric and Magnetic Fields With a Phase Difference. IEEE Access 11: 95455-95466 (2023)
2010 – 2019
- 2019
- [j5]William H. Bailey, Tim Harrington, Akimasa Hirata, Robert Kavet, Jafar Keshvari, Bertram Jon Klauenberg, Alexandre Legros, David P. Maxson, John M. Osepchuk, J. Patrick Reilly, Richard R. I. C. A. Tell, Ralf Bodemann, Artnarong Thansandote, Kenichi Yamazaki, Marvin C. Ziskin, Peter M. Zollman, Jerrold Bushberg, Chung-Kwang Chou, Robert Cleveland, Antonio Faraone, Kenneth R. Foster, Kenneth E. Gettman, Kevin Graf:
Synopsis of IEEE Std C95.1™-2019 "IEEE Standard for Safety Levels With Respect to Human Exposure to Electric, Magnetic, and Electromagnetic Fields, 0 Hz to 300 GHz". IEEE Access 7: 171346-171356 (2019) - 2018
- [j4]Katsuaki Aga, Akimasa Hirata, Ilkka Laakso, Hiroo Tarao, Yinliang Diao, Takahiro Ito, Yoichi Sekiba, Kenichi Yamazaki:
Intercomparison of In Situ Electric Fields in Human Models Exposed to Spatially Uniform Magnetic Fields. IEEE Access 6: 70964-70973 (2018) - 2016
- [c18]Makoto Nakayama, Kenichi Yamazaki, Satoshi Tanaka:
Parallelization of Recursive Preorder Traversal Based on Building and Winding Call Stacks. IPDPS Workshops 2016: 570-579 - 2014
- [c17]Makoto Nakayama, Kenichi Yamazaki, Satoshi Tanaka, Hironori Kasahara:
Parallelization of tree-to-TLV serialization. IPCCC 2014: 1-8 - 2013
- [c16]Makoto Nakayama, Kenichi Yamazaki, Satoshi Tanaka, Hironori Kasahara:
Dynamic Profiling and Feedback Framework for Reduce-Side Join. CSE 2013: 1255-1262
2000 – 2009
- 2009
- [c15]Ken Igarashi, Kenichi Yamazaki:
Flight size auto tuning for broadband wireless networks. IWCMC 2009: 888-893 - 2008
- [j3]Ashiq Khan, Toshihiro Suzuki, Motonari Kobayashi, Wataru Takita, Kenichi Yamazaki:
Packet Size Based Routing for Stable Data Delivery in Mobile Ad-Hoc Networks. IEICE Trans. Commun. 91-B(7): 2244-2254 (2008) - [c14]Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi:
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. ARES 2008: 733-740 - 2007
- [j2]Naoharu Yamada, Kenji Sakamoto, Goro Kunito, Yoshinori Isoda, Kenichi Yamazaki, Satoshi Tanaka:
Applying Ontology and Probabilistic Model to Human Activity Recognition from Surrounding Things. Inf. Media Technol. 2(4): 1286-1297 (2007) - 2006
- [j1]Shoji Kurakake, Kenichi Yamazaki, Kazuo Imai:
Real-world-oriented service platform based on the task model. IEEE Commun. Mag. 44(9): 72-78 (2006) - [c13]Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi:
An Efficient and Secure RFID Security Method with Ownership Transfer. CIS 2006: 778-787 - [c12]Toshiki Iso, Kenichi Yamazaki:
Gait analyzer based on a cell phone with a single three-axis accelerometer. Mobile HCI 2006: 141-144 - [c11]Toshiki Iso, Kenichi Yamazaki:
Extracting Personal User Context with a Three-Axis Sensor Mounted on a Freely Carried Cell Phone. SIGMAP 2006: 224-231 - 2005
- [c10]Naoharu Yamada, Kenji Sakamoto, Goro Kunito, Kenichi Yamazaki, Satoshi Tanaka:
Human Activity Recognition Based on Surrounding Things. EUC Workshops 2005: 1-10 - [c9]Tatsuo Takahashi, Satoshi Tanaka, Kenichi Yamazaki, Tadanori Mizuno:
Thin Client Based User Terminal Architecture for Ubiquitous Computing Environment. EUC Workshops 2005: 111-120 - [c8]Hiroyuki Kasai, Kenichi Yamazaki, Shoji Kurakake:
Adaptive notification system guaranteeing message reachability. ICPS 2005: 208-217 - 2004
- [c7]Kenichi Yamazaki:
Research Directions for Ubiquitous Services. SAINT 2004: 12-14 - [c6]Daisuke Ochi, Kenichi Yamazaki:
Twin Agents: Network-Assisted Disconnected Operation and Distributed Processing for Mobile Communication. SAINT 2004: 31-42 - [c5]Daisuke Ochi, Kenichi Yamazaki:
The Demonstration of Network-Assisted Disconnected Operation for Mobile Communication. SAINT Workshops 2004: 299-303 - 2001
- [c4]Yasunori Harada, Kenichi Yamazaki, Richard Potter:
CCC: User-Defined Object Structure in C. ECOOP 2001: 118-129
1990 – 1999
- 1999
- [c3]Keiji Hirata, Kenichi Yamazaki:
Declarative Priority in a Concurrent Logic Language ON. ICLP 1999: 215-229 - 1993
- [c2]Kenichi Yamazaki, Yoshiji Amagai, Masaharu Yoshida, Ikuo Takeuchi:
TAO: An Object-Orientation Kernel. ISOTAS 1993: 61-76
1980 – 1989
- 1987
- [c1]Ikuo Takeuchi, Hiroshi G. Okuno, Nobuyasu Osato, M. Kamio, Kenichi Yamazaki:
A concurrent multiple-paradigm list processor TAO/ELIS. FJCC 1987: 167-174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-28 23:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint