Search results for: Kenji Kono
Macromolecular Bioscience > 19 > 4 > n/a - n/a
Polymer International > 67 > 7 > 840 - 852
Biomaterials > 2017 > 141 > C > 272-283
Translational Research > 2017 > 185 > C > 24-33
Colloids and Surfaces B: Biointerfaces > 2017 > 155 > C > 449-458
Biomaterials > 2017 > 120 > C > 32-45
IEEE Transactions on Computers > 2016 > 65 > 9 > 2752 - 2766
Angewandte Chemie > 128 > 36 > 10770 - 10773
Angewandte Chemie International Edition > 55 > 36 > 10612 - 10615
Angewandte Chemie International Edition > 55 > 22 > 6476 - 6481
Angewandte Chemie > 128 > 22 > 6586 - 6591
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Emulation-Based Detection > 68-87
Lecture Notes in Computer Science > Software Security — Theories and Systems > Securing Programs by Rewriting and Sandboxing > 172-184
Lecture Notes in Computer Science > Advances in Computing Science – ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation > 18-32
Translational Research > 2015 > 166 > 6 > 660-673.e1
Journal of Controlled Release > 2015 > 216 > Complete > 69-77