From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Nakashima, Takuo
add a person with the name Nakashima, Takuo
 

Другие публикации лиц с тем же именем

A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise., , и . BWCCA, стр. 575-580. IEEE, (2013)Extraction of Characteristics of Anomaly Accessed IP Packets by the Entropy-Based Analysis., , , и . CISIS, стр. 141-147. IEEE Computer Society, (2008)An Experimental Evaluation of the Total Cost of NTP Topology., и . ICOIN, стр. 240-245. IEEE Computer Society, (2001)Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment.. IIH-MSP, стр. 193-196. IEEE Computer Society, (2006)Delay Propagation Properties with Self-similarity.. ICPADS (1), стр. 509-515. IEEE Computer Society, (2005)Time Scaling Analysis of Jitter Propagation Property.. AINA (1), стр. 541-546. IEEE Computer Society, (2006)DDoS Detection Technique Using Statistical Analysis to Generate Quick Response Time., , и . BWCCA, стр. 672-677. IEEE Computer Society, (2010)Property Analysis of Heavy-tailed Traffic by Simulator., и . ICICIC (1), стр. 44-47. IEEE Computer Society, (2006)A Detective Method for SYN Flood Attacks., и . ICICIC (1), стр. 48-51. IEEE Computer Society, (2006)Statistical Analysis of Propagation Properties with Heavy-Tailedness.. International Conference on Internet Computing, стр. 328-334. CSREA Press, (2004)