default search action
Ken Nakayama
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c22]Ye Xia, Danqing Zhang, Jinkyu Kim, Ken Nakayama, Karl Zipser, David Whitney:
Predicting Driver Attention in Critical Situations. ACCV (5) 2018: 658-674 - 2017
- [c21]Ken Nakayama, Shun'ichi Tano, Tomonori Hashiyama, Eko Sakai:
Incremental Annotate-Generalize-Search Framework for Interactive Source Code Comprehension. COMPSAC (1) 2017: 311-316 - [i1]Ye Xia, Danqing Zhang, Alexei Pozdnoukhov, Ken Nakayama, Karl Zipser, David Whitney:
Training a network to attend like human drivers saves it from common but misleading loss functions. CoRR abs/1711.06406 (2017) - 2015
- [j5]Michael A. Cohen, Ken Nakayama, Talia Konkle, Mirta Stantic, George A. Alvarez:
Visual Awareness Is Limited by the Representational Architecture of the Visual System. J. Cogn. Neurosci. 27(11): 2240-2252 (2015) - [c20]Na Li, Krzysztof Z. Gajos, Ken Nakayama, Ryan Enos:
TELLab: An Experiential Learning Tool for Psychology. L@S 2015: 293-297 - 2014
- [j4]Walter J. Scheirer, Samuel E. Anthony, Ken Nakayama, David D. Cox:
Perceptual Annotation: Measuring Human Vision to Improve Computer Vision. IEEE Trans. Pattern Anal. Mach. Intell. 36(8): 1679-1686 (2014) - [c19]Ken Nakayama, Eko Sakai, Michihiro Kobayakawa:
Interactive Characterization of A Code Pattern. SoMeT 2014: 1016-1025 - 2013
- [c18]Tomoyuki Kuroki, Ken Nakayama, Daisuke Nakamura, Takeshi Onji, Yoshiaki Sakurai, Masaaki Okubo:
Nonthermal plasma hybrid process for preparation of organic electroluminescence fluoropolymer film devices. IAS 2013: 1-5 - 2012
- [c17]Shun'ichi Tano, Keisuke Suzuki, Kenji Miki, Natsuko Watanabe, Mitsuru Iwata, Tomohiro Hashiyama, Junko Ichino, Ken Nakayama:
Simple augmented reality system for 3D ultrasonic image by see-through HMD and single camera and marker combination. BHI 2012: 464-467 - 2010
- [c16]Nguyen Minh The, Takahiro Kawamura, Hiroyuki Nakagawa, Ken Nakayama, Yasuyuki Tahara, Akihiko Ohsuga:
Human Activity Mining Using Conditional Radom Fields and Self-Supervised Learning. ACIIDS (1) 2010: 140-149 - [c15]I. Shin, Takahiro Kawamura, Hiroyuki Nakagawa, Ken Nakayama, Yasuyuki Tahara, Akihiko Ohsuga:
ONTOMO: web-based ontology building system: ---instance recommendation using bootstrapping---. SAC 2010: 1442-1443
2000 – 2009
- 2009
- [c14]I. Shin, Takahiro Kawamura, Hiroyuki Nakagawa, Ken Nakayama, Yasuyuki Tahara, Akihiko Ohsuga:
ONTOMO: Development of Ontology Building Service. PRIMA 2009: 143-158 - 2008
- [j3]Dan Lu, Yoshitake Kobayashi, Ken Nakayama, Mamoru Maekawa:
Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality. Int. J. Netw. Secur. 7(3): 416-427 (2008) - 2007
- [j2]Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Mamoru Maekawa:
Java Bytecode Dependence Analysis for Secure Information Flow. Int. J. Netw. Secur. 4(1): 59-68 (2007) - [c13]Toshie Ninomiya, Ken Nakayama, Miyuki Shimizu, Fumihiko Anma, Toshio Okamoto:
The Design of e-Learning Environment Oriented for Personalized Adaptability. ICALT 2007: 728-729 - 2006
- [c12]Wataru Tsukahara, Fumihiko Anma, Ken Nakayama, Toshio Okamoto:
A Development of Learning Management System for the Practice of E-Learning in Higher Education. ITEM 2006: 145-152 - 2005
- [j1]Brad Duchaine, Ken Nakayama:
Dissociations of Face and Object Recognition in Developmental Prosopagnosia. J. Cogn. Neurosci. 17(2): 249-261 (2005) - [c11]Wataru Tsukahara, Ken Nakayama, Fumihiko Anma, Toshio Okamoto:
A Development of Learning Management System for the Practice of E-Learning in Higher Education. CELDA 2005: 477-480 - 2004
- [c10]Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Mamoru Maekawa:
Java mobile code security by bytecode behavior analysis. IASTED Conf. on Software Engineering and Applications 2004: 90-95 - [c9]Theodorus Eric Setiadi, Ken Nakayama, Yoshitake Kobayashi, Mamoru Maekawa:
Identifying candidate invariant conditions of running program. IASTED Conf. on Software Engineering and Applications 2004: 577-582 - [c8]Ken Nakayama:
Perception and Recognition of Faces - Human Capacities of Possible Relevance for Artificial Systems. ICVGIP 2004: 3 - [c7]Theodorus Eric Setiadi, Ken Nakayama, Yoshitake Kobayashi, Mamoru Maekawa:
Analyzing Invariant Condition of Running Java Program. SEKE 2004: 350-353
1990 – 1999
- 1997
- [c6]Ken Nakayama, Kazunori Yamaguchi, Satoru Kawai:
I-Regular Expression: Regular Expression with Continuous Interval Constraints. CIKM 1997: 40-50 - [c5]Ken Nakayama:
Psychological Studies of Visual Perception. NIPS 1997 - 1994
- [c4]Toshiyuki Masui, Ken Nakayama:
Repeat and predict: two keys to efficient text editing. CHI Conference Companion 1994: 31-32 - [c3]Toshiyuki Masui, Ken Nakayama:
Repeat and predict - two keys to efficient text editing. CHI 1994: 118-123 - [c2]Toshiyuki Masui, Ken Nakayama:
Repeat and predict - two keys to efficient text editing. CHI Conference Companion 1994: 207 - 1992
- [c1]Toshio Tonouchi, Ken Nakayama, Satoshi Matsuoka, Satoru Kawai:
Creating Visual Objects by Direct Manipulation. VL 1992: 95-101
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint