Author of the publication

Construction of a Sensor Network to Forecast Landslide Disasters - Sensor Terminal Development and On-Site Experiments.

, , , , , , , , and . WWIC, volume 7889 of Lecture Notes in Computer Science, page 180-191. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Classification of Quantitative Data from DNS Cache Servers into Stationary and Non-Stationary States Based on Clustering., and . DATA, page 319-326. SCITEPRESS, (2023)Realization of a Safe and Secure Society using ICT in Shiojiri-City, Nagano Prefecture, Japan., , , , , , , , and . ICT-DM, page 186-192. IEEE, (2015)Man-machine Cooperative Monitoring System to Support Detection of DoS/DDoS Attacks Through Continuous SOM Diagram Generation., , , and . NaNA, page 558-567. IEEE, (2023)Development of a High-Speed Simulator for Sensor Network Protocols Using GPGPU., , , and . MASS, page 511-512. IEEE Computer Society, (2014)Construction of a Sensor Network to Forecast Landslide Disasters - Sensor Terminal Development and On-Site Experiments., , , , , , , , and . WWIC, volume 7889 of Lecture Notes in Computer Science, page 180-191. Springer, (2013)A Pseudo-TDMA MAC Protocol Using Randomly Determined Transmission Times for Landslide Prediction Wireless Sensor Networks., , , , and . IEICE Trans. Commun., 97-B (7): 1449-1456 (2014)Proposal and Realistic Evaluation of a New Routing Algorithm for a Regional Protection System., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (8): 1667-1670 (2015)Construction and evaluation of a regional protection system employing power-saving wireless terminals without using GPS modules., , , and . GLOBECOM Workshops, page 824-828. IEEE, (2012)Banach Algebra of Bounded Functionals., , and . Formaliz. Math., 16 (1-4): 115-122 (2008)Virtual Environment for Analysis and Evaluation of DDoS Attacks., , , and . AINA (3), volume 227 of Lecture Notes in Networks and Systems, page 459-468. Springer, (2021)