Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Anomalous Traffic Sources Using Flow Statistics., , , , and . GLOBECOM, page 1509-1513. IEEE, (2008)Optimum profit allocation in coalitional VoD service., , and . Comput. Networks, 57 (15): 3081-3097 (2013)Network Design Methods for Minimizing Number of Links Added to a Network to Alleviate Performance Degradation Following a Link Failure., , , , , and . IEICE Trans. Commun., 94-B (6): 1630-1639 (2011)Elevator Monitoring System to Guide User's Behavior by Visualizing the State of Crowdedness., and . BCD (selected papers), volume 844 of Studies in Computational Intelligence, page 85-98. Springer, (2019)Approach to Nation-Wide Network Simulation Making Virtual Reality for Telecommunication Network Management., and . WSC, page 1374-1379. ACM Press, (1992)Parallel event processing for circuit-switched telecommunication network simulation., and . WSC, page 1361-1362. ACM Press, (1993)Design Method of Smallest Robust Networks Against Performance Deterioration During Failures., , , , , and . INCoS, page 386-391. IEEE Computer Society, (2010)Optimally Designing Capacity and Location of Caches to Reduce P2P Traffic., , , , and . ICC, page 1-6. IEEE, (2010)A Method of Constructing QoS Overlay Network and Its Evaluation., , , , , , and . GLOBECOM, page 1-6. IEEE, (2009)Design Method of Robust Networks against Performance Deterioration during Failures., , , , , and . GLOBECOM, page 1-6. IEEE, (2009)