Author of the publication

Separating Oblivious and Non-oblivious BPs.

, , and . COCOON, volume 2108 of Lecture Notes in Computer Science, page 28-38. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mixed Integer Programming Solution for Network Optimization Under Tunneling-Based Traffic Engineering Schemes., , and . COMPSAC (2), page 769-776. IEEE Computer Society, (2018)978-1-5386-2667-2.Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents., , and . COMPSAC, page 717-722. IEEE, (2023)Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach., , , , and . J. Inf. Process., 22 (3): 464-471 (2014)Identifying Link Layer Home Network Topologies Using HTIP., , , , and . IEICE Trans. Inf. Syst., 103-D (3): 566-577 (2020)A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data., , , , , and . IEICE Trans. Inf. Syst., 93-D (9): 2544-2554 (2010)Pipelined Parallelization in HPF Programs on the Earth Simulator., and . ISHPC, volume 4759 of Lecture Notes in Computer Science, page 365-373. Springer, (2005)A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts., , , , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 247-253. Springer, (2007)Parallel Computational Complexity of Logic Programs and Alternating Turing Machines., and . FGCS, page 356-363. OHMSHA Ltd. Tokyo and Springer-Verlag, (1988)Identifying link layer home network topologies using HTIP., , , , and . CCNC, page 891-898. IEEE, (2017)A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System., , , , and . IEICE Trans. Inf. Syst., 91-D (5): 1282-1291 (2008)