Author of the publication

Analysis of Security in Blockchain: Case Study in 51%-Attack Detecting.

, , , , and . DSA, page 15-24. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Power Aware Paging Scheme with Power Controlling Each Memory Bank., , and . PDPTA, page 1912-1918. CSREA Press, (2002)Design of a Context-Aware Email Delivery System., , , , and . PDPTA, page 744-750. CSREA Press, (2003)A Context-Aware Middleware Mapping Processes and User-Context Subspaces., , , and . PDPTA, page 1591-1597. CSREA Press, (2003)Evaluation of Caching Algorithm for NetNews., , and . Applied Informatics, page 175-182. IASTED/ACTA Press, (1999)Traceability Link for Product Line with RAS based Representation., , , , , and . Software Engineering Research and Practice, page 105-110. CSREA Press, (2010)Application to glacier observation of high-precision three-dimensional position measurement using cameras., , , , , , , , , and . Humans and Computers, page 195-202. University of Aizu Press / ACM, (2010)A method for analysis and solution of scalability bottleneck in DBMS., and . SoICT, volume 449 of ACM International Conference Proceeding Series, page 139-146. ACM, (2010)Design of Acoustic Vehicle Detector with Steady-Noise Suppression., , , , and . ITSC, page 2848-2853. IEEE, (2019)Collaborative Filtering for Position Estimation Error Correction in WLAN Positioning Systems., , , , and . IEICE Trans. Commun., 94-B (3): 649-657 (2011)An Object-Oriented Framework for Loop Parallelization., , and . J. Supercomput., 13 (1): 57-69 (1999)