default search action
Takashi Katoh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Ziyad Oulhaj, Yoshiyuki Ishii, Kento Ohga, Kimihiro Yamazaki, Mutsuyo Wada, Yuhei Umeda, Takashi Katoh, Yuichiro Wada, Hiroaki Kurihara:
Deep Mapper: Efficient Visualization of Plausible Conformational Pathways. ECAI 2024: 2701-2708 - 2023
- [c29]Kimihiro Yamazaki, Yuichiro Wada, Atsushi Tokuhisa, Mutsuyo Wada, Takashi Katoh, Yuhei Umeda, Yasushi Okuno, Akira Nakagawa:
An Auto-Encoder to Reconstruct Structure with Cryo-EM Images via Theoretically Guaranteed Isometric Latent Space, and Its Application for Automatically Computing the Conformational Pathway. MICCAI (1) 2023: 394-404 - 2022
- [j4]Akira Sakai, Taro Sunagawa, Spandan Madan, Kanata Suzuki, Takashi Katoh, Hiromichi Kobashi, Hanspeter Pfister, Pawan Sinha, Xavier Boix, Tomotake Sasaki:
Three approaches to facilitate invariant neurons and generalization to out-of-distribution orientations and illuminations. Neural Networks 155: 119-143 (2022) - [j3]Takashi Katoh, Keisuke Goto:
In-place initializable arrays. Theor. Comput. Sci. 916: 62-69 (2022) - 2021
- [c28]Kanata Suzuki, Taro Sunagawa, Tomotake Sasaki, Takashi Katoh:
Annotation Cost Reduction of Stream-based Active Learning by Automated Weak Labeling using a Robot Arm. IROS 2021: 9000-9007 - [i5]Kanata Suzuki, Taro Sunagawa, Tomotake Sasaki, Takashi Katoh:
Annotation Cost Reduction of Stream-based Active Learning by Automated Weak Labeling using a Robot Arm. CoRR abs/2110.00947 (2021) - [i4]Akira Sakai, Taro Sunagawa, Spandan Madan, Kanata Suzuki, Takashi Katoh, Hiromichi Kobashi, Hanspeter Pfister, Pawan Sinha, Xavier Boix, Tomotake Sasaki:
Three approaches to facilitate DNN generalization to objects in out-of-distribution orientations and illuminations: late-stopping, tuning batch normalization and invariance loss. CoRR abs/2111.00131 (2021) - 2020
- [i3]Tomohiro Hayase, Suguru Yasutomi, Takashi Katoh:
Selective Forgetting of Deep Networks at a Finer Level than Samples. CoRR abs/2012.11849 (2020)
2010 – 2019
- 2018
- [i2]Mark Kozdoba, Edward Moroshko, Lior Shani, Takuya Takagi, Takashi Katoh, Shie Mannor, Koby Crammer:
Multi Instance Learning For Unbalanced Data. CoRR abs/1812.07010 (2018) - 2017
- [i1]Takashi Katoh, Keisuke Goto:
In-Place Initializable Arrays. CoRR abs/1709.08900 (2017) - 2013
- [c27]Takashi Katoh, Shin-ichiro Tago, Tatsuya Asai, Hiroaki Morikawa, Junichi Shigezumi, Hiroya Inakoshi:
Mining Frequent Partite Episodes with Partwise Constraints. NFMCP 2013: 117-131 - 2012
- [c26]Shin-ichiro Tago, Tatsuya Asai, Takashi Katoh, Hiroaki Morikawa, Hiroya Inakoshi:
EVIS: A Fast and Scalable Episode Matching Engine for Massively Parallel Data Streams. DASFAA (2) 2012: 213-223 - 2011
- [c25]Masaki Narita, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace. AINA Workshops 2011: 341-348 - [c24]Jumpei Fujikawa, Takuya Kida, Takashi Katoh:
Extracting refrained phrases from music signals using a frequent episode pattern mining algorithm. GrC 2011: 199-202 - 2010
- [j2]Takashi Katoh, Hiroki Arimura, Kouichi Hirata:
An Efficient Depth-first Search Algorithm for Extracting Frequent Diamond Episodes from Event Sequences. Inf. Media Technol. 5(2): 459-470 (2010) - [c23]Yuji Wada, Yuta Watanabe, Keisuke Syoubu, Jun Sawamoto, Takashi Katoh:
Virtual Database Technology for Distributed Database. AINA Workshops 2010: 214-219 - [c22]Masayuki Fukumitsu, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System. AINA 2010: 438-445 - [c21]Yuji Wada, Yuta Watanabe, Keisuke Syoubu, Jun Sawamoto, Takashi Katoh:
Virtualization Technology for Ubiquitous Databases. CISIS 2010: 555-560 - [c20]Hirotaka Tazawa, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A user authenticaion scheme using multiple passphrases and its arrangement. ISITA 2010: 554-559 - [c19]Takuya Sasaki, Jun Sawamoto, Takashi Katoh, Yuji Wada, Norihisa Segawa, Eiji Sugino:
A Proposal of P2P Content Retrieval System Using Access-Based Grouping Technique. KES (3) 2010: 455-463
2000 – 2009
- 2009
- [c18]Takashi Katoh, Hiroki Arimura, Kouichi Hirata:
Mining Frequent Bipartite Episode from Event Sequences. Discovery Science 2009: 136-151 - [c17]Takashi Katoh, Hiroki Arimura, Kouichi Hirata:
Mining Frequent k-Partite Episodes from Event Sequences. JSAI-isAI Workshops 2009: 331-344 - [c16]Masaki Narita, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents. MATES 2009: 91-102 - [c15]Takashi Katoh, Hiroki Arimura, Kouichi Hirata:
A Polynomial-Delay Polynomial-Space Algorithm for Extracting Frequent Diamond Episodes from Event Sequences. PAKDD 2009: 172-183 - 2008
- [c14]Takashi Katoh, Kouichi Hirata:
A Simple Characterization on Serially Constructible Episodes. PAKDD 2008: 600-607 - 2007
- [c13]Yuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
A New Approach to Early Detection of an Unknown Worm. AINA Workshops (1) 2007: 194-198 - [c12]Takashi Katoh, Kouichi Hirata, Masateru Harao:
Mining Frequent Diamond Episodes from Event Sequences. MDAI 2007: 477-488 - [c11]Michitaka Yoshimoto, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study. NBiS 2007: 127-136 - 2006
- [c10]Tsuyoshi Chiba, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
DoS Packet Filter Using DNS Information. AINA (1) 2006: 116-131 - [c9]Atsumu Watanabe, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
On a Watermarking Scheme for MusicXML. AINA (2) 2006: 894-898 - [c8]Takashi Katoh, Hiroki Kuzuno, Takuya Kawahara, Atsumu Watanabe, Yushi Nakai, Bhed Bahadur Bista, Toyoo Takata:
AWide Area Log Analyzing System Based on Mobile Agents. CIMCA/IAWTIC 2006: 26 - [c7]Takashi Hamma, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata:
An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks. DEXA Workshops 2006: 66-70 - [c6]Takashi Katoh, Kouichi Hirata, Masateru Harao:
Mining Sectorial Episodes from Event Sequences. Discovery Science 2006: 137-148 - 2005
- [c5]Takashi Katoh, Kensaku Hoshi, Norio Shiratori:
Cooperative Behavior of Agents Based on Potential Field. CEEMAS 2005: 236-245 - 2004
- [c4]Takashi Katoh, Kensaku Hoshi, Norio Shiratori:
On Agents' Cooperative Behavior Based on Potential Field. AINA (2) 2004: 149-154 - 2003
- [j1]Takashi Katoh, Tetsuo Kinoshita, Norio Shiratori:
Analyzing dynamic behavior of multiagents' task allocation based on subjective cooperative relations. Syst. Comput. Jpn. 34(9): 93-104 (2003) - 2002
- [c3]Takashi Katoh, Tetsuo Kinoshita, Norio Shiratori:
Dynamic Behavior of Multiagents with Subjective Cooperative Relations. ICOIN (2) 2002: 634-643 - [c2]Takahiro Uchiya, Takashi Katoh, Takuo Suganuma, Tetsuo Kinoshita, Norio Shiratori:
An Architecture of Agent Repository for Adaptive Multiagent System. ICOIN (2) 2002: 802-813 - 2000
- [c1]Takashi Katoh, Tetsuo Kinoshita, Norio Shiratori:
Dynamic Properties of Multiagents Based on a Mechanism of Loose Coalition. PRIMA 2000: 16-30
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 20:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint