Author of the publication

Scalable Cache Component in ICN Adaptable to Various Network Traffic Access Patterns.

, , , and . IEICE Trans. Commun., 101-B (1): 35-48 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparisons of Machine Learning Algorithms for Application Identification of Encrypted Traffic., , , , and . ICMLA (2), page 358-361. IEEE Computer Society, (2011)978-0-7695-4607-0.Image Processing Approach to Automatic Scoring System for Archery Targets., , , , , and . IIH-MSP, page 259-262. IEEE, (2013)An Automatic Error Identification Method in Call Control Protocol Using Levenshtein Distance., , , , and . ICIN, page 266-273. IEEE, (2020)SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet., , , , , , , , and . Comput. Networks, (2014)Towards real-time processing for application identification of encrypted traffic., , , , and . ICNC, page 136-140. IEEE, (2014)Effective bit selection methods for improving performance of packet classifications on IP routers., , , and . GLOBECOM, page 2350-2354. IEEE, (2002)On Inferring Network Impact Factors by Decomposition of Mixed Distribution., , , and . GLOBECOM, IEEE, (2006)Real-Time Identification of Different TCP Versions., , and . APNOMS, volume 4773 of Lecture Notes in Computer Science, page 215-224. Springer, (2007)Identification of Attack Nodes from Traffic Matrix Estimation., , and . IEICE Trans. Commun., 90-B (10): 2854-2864 (2007)A New TCAM Architecture for Managing ACL in Routers., , , , and . IEICE Trans. Commun., 93-B (11): 3004-3012 (2010)