Author of the publication

Proactive Retransmission and Buffer Management for Layered Video Transmission over Wireless Channel.

, , , , , and . IEICE Trans. Commun., 91-B (9): 2897-2906 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Analysis of Dynamic Lightpath Configuration for WDM Asymmetric Ring Networks., and . NETWORKING, volume 2345 of Lecture Notes in Computer Science, page 972-983. Springer, (2002)Resource-Efficient and Availability-Aware Service Chaining and VNF Placement with VNF Diversity and Redundancy., , , and . IEICE Trans. Commun., 107 (1): 105-116 (January 2024)Performance Modeling of Bitcoin Blockchain: Mining Mechanism and Transaction-Confirmation Process.. IEICE Trans. Commun., 104-B (12): 1455-1464 (2021)Automatic Evacuation Guiding Scheme Using Trajectories of Mobile Nodes., , , and . MobiWIS, volume 9228 of Lecture Notes in Computer Science, page 3-14. Springer, (2015)Efficient construction of binary decision diagrams for network reliability with imperfect vertices., , , and . Reliab. Eng. Syst. Saf., (2019)Practical Time-Scale Fitting of Self-Similar Traffic with Markov-Modulated Poisson Process., , and . Telecommun. Syst., 17 (1-2): 185-211 (2001)Capacitated Refuge Assignment for Speedy and Reliable Evacuation., , , and . ISPRS Int. J. Geo Inf., 9 (7): 442 (2020)Enumerating Graph Partitions Without Too Small Connected Components Using Zero-suppressed Binary and Ternary Decision Diagrams., , and . CoRR, (2018)Intelligent Mining Pool Selection in the Case of Unobservable Block Withholding Attack., , , and . IEEE ICBC, page 1-4. IEEE, (2021)On Eavesdropping Region Characterization in Hybrid Wireless Communications., , and . NaNA, page 29-34. IEEE, (2020)