Author of the publication

Token-based Code Clone Detection Technique in a Student's Programming Exercise.

, , and . BWCCA, page 650-655. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nakashima, Takuo
add a person with the name Nakashima, Takuo
 

Other publications of authors with the same name

Extraction of Characteristics of Anomaly Accessed IP Packets by the Entropy-Based Analysis., , , and . CISIS, page 141-147. IEEE Computer Society, (2008)A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise., , and . BWCCA, page 575-580. IEEE, (2013)DDoS Detection Technique Using Statistical Analysis to Generate Quick Response Time., , and . BWCCA, page 672-677. IEEE Computer Society, (2010)An Experimental Evaluation of the Total Cost of NTP Topology., and . ICOIN, page 240-245. IEEE Computer Society, (2001)Property Analysis of Heavy-tailed Traffic by Simulator., and . ICICIC (1), page 44-47. IEEE Computer Society, (2006)A Detective Method for SYN Flood Attacks., and . ICICIC (1), page 48-51. IEEE Computer Society, (2006)Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment.. IIH-MSP, page 193-196. IEEE Computer Society, (2006)Delay Propagation Properties with Self-similarity.. ICPADS (1), page 509-515. IEEE Computer Society, (2005)Time Scaling Analysis of Jitter Propagation Property.. AINA (1), page 541-546. IEEE Computer Society, (2006)An Anomaly Detection System Based on Chi-Square Method with Dynamic BIN Algorithm., , , and . BWCCA, page 549-554. IEEE Computer Society, (2011)