Author of the publication

Message from the Organizers of the Workshop on Middleware Architecture in the Internet.

, , and . SAINT Workshops, IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System., , , , and . IEICE Trans. Inf. Syst., 91-D (5): 1282-1291 (2008)Pipelined Parallelization in HPF Programs on the Earth Simulator., and . ISHPC, volume 4759 of Lecture Notes in Computer Science, page 365-373. Springer, (2005)A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts., , , , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 247-253. Springer, (2007)Quality-aware energy routing toward on-demand home energy networking: (Position paper)., and . CCNC, page 1041-1044. IEEE, (2011)Improving Attack Detection Performance in NIDS Using GAN., , and . COMPSAC, page 817-825. IEEE, (2020)Centralized Control of Account Migration at Single Sign-On in Shibboleth., and . COMPSAC, page 1597-1603. IEEE, (2020)Parallel Computational Complexity of Logic Programs and Alternating Turing Machines., and . FGCS, page 356-363. OHMSHA Ltd. Tokyo and Springer-Verlag, (1988)Identifying link layer home network topologies using HTIP., , , , and . CCNC, page 891-898. IEEE, (2017)Coflow-Like Online Data Acquisition from Low-Earth-Orbit Datacenters., , , , and . IEEE Trans. Mob. Comput., 19 (12): 2743-2760 (2020)Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach., , , , and . J. Inf. Process., 22 (3): 464-471 (2014)