Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DDoS Attack and Source Detection System for ISP Network., , and . Communications, Internet, and Information Technology, page 118-123. IASTED/ACTA Press, (2002)Multipath Support for Name-based Information Dissemination in Fragmented Networks., , , , , and . ICN, page 201-202. ACM, (2015)Demo: panoramic streaming using named tiles., , , and . ICN, page 204-205. ACM, (2017)Empirically modeling how a multicore software ICN router and an ICN network consume power., , , , , and . ICN, page 157-166. ACM, (2014)AS alliance: cooperatively improving resilience of intra-alliance communication., , , , and . CoNEXT, page 76. ACM, (2008)Mathematically Designing a Local Interaction Algorithm for Decentralized Network Systems., , and . IEICE Trans. Commun., 95-B (5): 1547-1557 (2012)NDN-Based Message Delivery with Collaborative Communication for Reducing Base Station Power Consumption in Disasters., , , and . IEICE Trans. Commun., 99-B (12): 2541-2549 (2016)IP Network Failure Identification Based on the Detailed Analysis of OSPF LSA Flooding., , , and . IEICE Trans. Commun., 91-B (5): 1320-1330 (2008)Routing-Based Mobility Architecture for Future 5G Cellular Networks., , , , , and . IEICE Trans. Commun., 100-B (10): 1789-1797 (2017)Welcome message from general co-chairs., , and . LANMAN, page 1-2. IEEE, (2017)