Author of the publication

Design and implementation of network management system SPLICE/NM based on scripted operations.

, , and . Syst. Comput. Jpn., 31 (9): 89-99 (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Quantification of Complex Attacks in Infrastructure as a Service Cloud Computing., , , , and . CLOSER, page 145-148. SciTePress, (2013)Construction of internet for Japanese academic communities., , , and . SC, page 737-746. ACM, (1989)Leveraging Static Probe Instrumentation for VM-based Anomaly Detection System., , , and . ICICS, volume 9543 of Lecture Notes in Computer Science, page 320-334. Springer, (2015)An Implementation Design of a WLAN Handover Method Based on Cross-Layer Collaboration for TCP Communication., , , , and . IEICE Trans. Commun., 96-B (7): 1716-1726 (2013)Detecting Anomalies in Massive Traffic Streams Based on S-Transform Analysis of Summarized Traffic Entropies., , , and . IEICE Trans. Inf. Syst., 98-D (3): 588-595 (2015)Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries., , , , and . IEICE Trans. Inf. Syst., 92-D (10): 1847-1856 (2009)Empirical analysis of IPv6 transition technologies using the IPv6 Network Evaluation Testbed., , , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 2 (2): e1 (2015)Conceptualizing Player-Side Emergence in Interactive Games: Between Hardcoded Software and the Human Mind in Papers, Please and Gone Home., , and . Int. J. Gaming Comput. Mediat. Simulations, 7 (3): 1-21 (2015)Towards a Vulnerability Tree Security Evaluation of OpenStack's Logical Architecture., , , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 127-142. Springer, (2014)Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks., , , , and . IWDC, volume 2918 of Lecture Notes in Computer Science, page 174-183. Springer, (2003)