Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Parallel Flow Monitoring Technique That Achieves Accurate Delay Measurement., , and . IEICE Trans. Commun., 102-B (4): 865-875 (2019)Effect of locality of node mobility on epidemic broadcasting in DTNs., and . WMNC, page 1-4. IEEE, (2013)Poster: A Tunable Model for Graph Generation Using LSTM and Conditional VAE., , , , and . ICDCS, page 1126-1127. IEEE, (2021)A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework., and . ICC, page 3006-3011. IEEE, (2023)Model-Less Approach of Network Traffic for Accurate Packet Loss Simulations., , and . ICNP, page 251-252. IEEE Computer Society, (2018)Accuracy Improvement of CoMPACT Monitor by Using New Probing Method., , and . APNOMS, volume 5787 of Lecture Notes in Computer Science, page 31-40. Springer, (2009)Intrusiveness-aware Estimation for high quantiles of a packet delay distribution., and . ICC, page 6169-6174. IEEE, (2015)A Proposal of an Efficient Traffic Matrix Estimation Under Packet Drops., , , , , and . ICDCS, page 2636-2637. IEEE Computer Society, (2017)On the search algorithm for the output distribution that achieves the channel capacity., , and . ISITA, page 443-447. IEEE, (2016)Identifying Influential Brokers on Social Media from Social Network Structure., and . CoRR, (2022)