Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Workflow Extraction for Service Operation Using Multiple Unstructured Trouble Tickets., , , , , , , and . IEICE Trans. Inf. Syst., 101-D (4): 1030-1041 (2018)Workflow extraction for service operation using multiple unstructured trouble tickets., , , , , , and . NOMS, page 652-658. IEEE, (2016)Network Event Extraction from Log Data with Nonnegative Tensor Factorization., , , , , , , , and . IEICE Trans. Commun., 100-B (10): 1865-1878 (2017)Proactive Failure Detection Learning Generation Patterns of Large-Scale Network Logs., , , and . IEICE Trans. Commun., 102-B (2): 306-316 (2019)Reconstruction of Human Trajectories Based on Anonymous Sensor Data for Estimating Infection Route., , , and . GLOBECOM, page 1996-2001. IEEE, (2022)Detecting mass-mailing worm infected hosts by mining DNS traffic data., , , , , and . MineNet, page 159-164. ACM, (2005)Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries., , , and . LEET, USENIX Association, (2010)FieldCast: Peer-to-Peer Presence Information Exchange in Ubiquitous Computing Environment., , , and . IEICE Trans. Inf. Syst., 87-D (12): 2610-2617 (2004)Extending Black Domain Name List by Using Co-occurrence Relation between DNS Queries., , , , and . IEICE Trans. Commun., 95-B (3): 794-802 (2012)Recovery Process Visualization based on Automaton Construction., , , and . IM, page 10-18. IEEE, (2021)