default search action
Yuichi Nakamura 0003
Person information
- affiliation: IBM Japan, Tokyo Research Laboratory, Japan
- affiliation (former): Osaka University, Japan
Other persons with the same name
- Yuichi Nakamura 0001 — Kyoto University, Sakyo, Japan (and 1 more)
- Yuichi Nakamura 0002 — NEC Corp., Kawasaki, Japan (and 1 more)
- Yuichi Nakamura 0004 — SoftBank Corp. (and 2 more)
- Yuichi Nakamura 0005 — Hitachi Solutions Ltd., Japan (and 1 more)
- Yuichi Nakamura 0006 — Anan National College of Technology, Japan (and 1 more)
- Yuichi Nakamura 0007 — Toyohashi University of Technology, Japan
- Yuichi Nakamura 0008 — Yatsushiro National College of Technology, Japan
- Yuichi Nakamura 0009 — Tokai University, Department of Information Media Technology, Hiratsuka, Japan
- Yuichi Nakamura 0010 — University of Tokyo, Institute of Industrial Science, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [c15]Guang-Jie Ren, Yuichi Nakamura, Heiko Ludwig:
Service Value Modeling: A Systematic Method to Unveil the Business Value of Industry Solutions. SRII Global Conference 2014: 82-89
2000 – 2009
- 2008
- [c14]Fumiko Satoh, Nirmal Mukhi, Yuichi Nakamura, Shinichi Hirose:
Pattern-based Policy Configuration for SOA Applications. IEEE SCC (1) 2008: 13-20 - [c13]Fumiko Satoh, Yuichi Nakamura, Nirmal Mukhi, Michiaki Tatsubori, Kouichi Ono:
Methodology and Tools for End-to-End SOA Security Configurations. SERVICES I 2008: 307-314 - 2007
- [c12]Yuichi Nakamura, Fumiko Satoh, Hyen-Vui Chung:
Syntactic Validation of Web Services Security Policies. ICSOC 2007: 319-329 - [c11]Kouichi Ono, Yuichi Nakamura, Fumiko Satoh, Takaaki Tateishi:
Verifying the Consistency of Security Policies by Abstracting into Security Types. ICWS 2007: 497-504 - 2006
- [c10]Fumiko Satoh, Yuichi Nakamura, Koichi Ono:
Adding Authentication to Model Driven Security. ICWS 2006: 585-594 - 2005
- [c9]Yuichi Nakamura, Michiaki Tatsubori, Takeshi Imamura, Koichi Ono:
Model-Driven Security Based on a Web Services Security Architecture. IEEE SCC 2005: 7-15 - [c8]Satoshi Makino, Michiaki Tatsubori, Kent Tamura, Yuichi Nakamura:
Improving WS-Security Performance with a Template-Based Approach. ICWS 2005: 581-588 - [c7]Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamura, Christopher Giblin:
Web services security configuration in a service-oriented architecture. WWW (Special interest tracks and posters) 2005: 1120-1121 - 2004
- [j5]Satoshi Makino, Kent Tamura, Takeshi Imamura, Yuichi Nakamura:
Implementation and Performance of WS-Security. Int. J. Web Serv. Res. 1(1): 58-72 (2004) - [c6]Michiaki Tatsubori, Takeshi Imamura, Yuichi Nakamura:
Best-Practice Patterns and Tool Support for Configuring Secure Web Services Messaging. ICWS 2004: 244-251 - [e3]Kiyoharu Aizawa, Yuichi Nakamura, Shin'ichi Satoh:
Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part I. Lecture Notes in Computer Science 3331, Springer 2004, ISBN 3-540-23974-X [contents] - [e2]Kiyoharu Aizawa, Yuichi Nakamura, Shin'ichi Satoh:
Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part II. Lecture Notes in Computer Science 3332, Springer 2004, ISBN 3-540-23977-4 [contents] - [e1]Kiyoharu Aizawa, Yuichi Nakamura, Shin'ichi Satoh:
Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part III. Lecture Notes in Computer Science 3333, Springer 2004, ISBN 3-540-23985-5 [contents] - 2003
- [c5]Satoshi Makino, Kent Tamura, Takeshi Imamura, Yuichi Nakamura:
Implementation of WS-Security and Its Performance Improvements. ICWS 2003: 256-264
1990 – 1999
- 1999
- [c4]Gaku Yamamoto, Yuichi Nakamura:
Architecture and Performance Evaluation of a Massive Multi-Agent System. Agents 1999: 319-325 - [r1]Yuichi Nakamura, Saburo Muroga:
Logic Synthesis with AND and OR Gates in Multi-levels. The VLSI Handbook 1999 - 1997
- [j4]Danny B. Lange, Yuichi Nakamura:
Object-Oriented Program Tracing and Visualization. Computer 30(5): 63-70 (1997) - 1995
- [j3]Masahiro Hori, Yuichi Nakamura, Hirayuki Satoh, Keiichi Maruyama, Toshiyuki Kama, Seigo Honda, Takashi Takenaka, Fumimaro Sekine:
Knowledge-level analysis for eliciting composable scheduling knowledge. Artif. Intell. Eng. 9(4): 253-264 (1995) - [c3]Danny B. Lange, Yuichi Nakamura:
Program Explorer: A Program Visualizer for C++. COOTS 1995 - [c2]Danny B. Lange, Yuichi Nakamura:
Interactive Visualization of Design Patterns Can Help in Framework Understanding. OOPSLA 1995: 342-357 - 1994
- [j2]Masahiro Hori, Yuichi Nakamura, Toshiyuki Hama:
Configuring problem-solving methods: a CAKE perspective. Knowl. Acquis. 6(4): 461-487 (1994) - 1992
- [j1]Akihiro Kashihara, Tsukasa Hirashima, Jun'ichi Toyoda, Yuichi Nakamura:
Advanced explanation capabilities for intelligent tutoring systems: The explanation structure model (EXSEL). Syst. Comput. Jpn. 23(12): 93-107 (1992)
1980 – 1989
- 1989
- [c1]Yuichi Nakamura, Tsukasa Hirashima, Kuniaki Uehara, Jun'ichi Toyoda:
Providing explanation capability based on individual understanding and domain principles. IEA/AIE (2) 1989: 991-1000
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 01:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint