Ken Nakayama

According to our database1, Ken Nakayama authored at least 25 papers between 1992 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Predicting Driver Attention in Critical Situations.
Proceedings of the Computer Vision - ACCV 2018, 2018

2017
Training a network to attend like human drivers saves it from common but misleading loss functions.
CoRR, 2017

Incremental Annotate-Generalize-Search Framework for Interactive Source Code Comprehension.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2015
Visual Awareness Is Limited by the Representational Architecture of the Visual System.
J. Cogn. Neurosci., 2015

TELLab: An Experiential Learning Tool for Psychology.
Proceedings of the Second ACM Conference on Learning @ Scale, 2015

2014
Perceptual Annotation: Measuring Human Vision to Improve Computer Vision.
IEEE Trans. Pattern Anal. Mach. Intell., 2014

Interactive Characterization of A Code Pattern.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2014

2013
Nonthermal plasma hybrid process for preparation of organic electroluminescence fluoropolymer film devices.
Proceedings of the 2013 IEEE Industry Applications Society Annual Meeting, 2013

2012
Simple augmented reality system for 3D ultrasonic image by see-through HMD and single camera and marker combination.
Proceedings of 2012 IEEE-EMBS International Conference on Biomedical and Health Informatics, 2012

2010
ONTOMO: web-based ontology building system: ---instance recommendation using bootstrapping---.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Human Activity Mining Using Conditional Radom Fields and Self-Supervised Learning.
Proceedings of the Intelligent Information and Database Systems, 2010

2009
ONTOMO: Development of Ontology Building Service.
Proceedings of the Principles of Practice in Multi-Agent Systems, 2009

2008
Java Mobile Code Dynamic Verification by Bytecode Modification for Host Confidentiality.
Int. J. Netw. Secur., 2008

2007
Java Bytecode Dependence Analysis for Secure Information Flow.
Int. J. Netw. Secur., 2007

The Design of e-Learning Environment Oriented for Personalized Adaptability.
Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies, 2007

2005
Dissociations of Face and Object Recognition in Developmental Prosopagnosia.
J. Cogn. Neurosci., 2005

A Development of Learning Management System for the Practice of E-Learning in Higher Education.
Proceedings of the Cognition and Exploratory Learning in Digital Age, 2005

2004
Analyzing Invariant Condition of Running Java Program.
Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2004), 2004

Perception and Recognition of Faces - Human Capacities of Possible Relevance for Artificial Systems.
Proceedings of the ICVGIP 2004, 2004

Identifying candidate invariant conditions of running program.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

Java mobile code security by bytecode behavior analysis.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

1997
Psychological Studies of Visual Perception.
Proceedings of the Advances in Neural Information Processing Systems 10, 1997

I-Regular Expression: Regular Expression with Continuous Interval Constraints.
Proceedings of the Sixth International Conference on Information and Knowledge Management (CIKM'97), 1997

1994
Repeat and predict - two keys to efficient text editing.
Proceedings of the Conference on Human Factors in Computing Systems, 1994

1992
Creating Visual Objects by Direct Manipulation.
Proceedings of the 1992 IEEE Workshop on Visual Languages, 1992


  Loading...