Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest Editors' Introduction: Special Issue on Management of Softwarized Networks., , , , , and . IEEE Trans. Netw. Serv. Manag., 13 (3): 362-365 (2016)Service Virtualization for Border Model Based Multi-Layer Service Network Architecture., , , , , , and . IEICE Trans. Inf. Syst., 89-D (12): 2867-2874 (2006)A 10 Gb/s Firewall System for Network Security in Photonic Era., , , , , , and . IEICE Trans. Commun., 88-B (5): 1914-1920 (2005)Extended Algorithm for Calculating Routes with Include Route Constraint in IP Networks., , and . IEICE Trans. Commun., 90-B (12): 3677-3679 (2007)Overview of Measurement-Based Connection Admission Control Methods in ATM Networks., , and . IEEE Commun. Surv. Tutorials, 2 (1): 2-13 (1999)Design of versatile academic infrastructure for multilayer network services., , , , , , , , , and 1 other author(s). IEEE J. Sel. Areas Commun., 27 (3): 253-267 (2009)Rate Control for High-Speed Burst Transmission with Quick Response in Universal ATM-WAN, ALPEN., , and . ICC (3), page 1734-1738. IEEE, (1997)On the performance of screening invalid jobs using the policy gradient method in deadline-aware data transfer scheduling., , and . NoF, page 52-56. IEEE, (2023)Estimating current traffic matrices accurately by using long-term variations information., , , , , and . BROADNETS, page 404-411. IEEE, (2008)On performance prediction of address lookup algorithms of IP routers through simulation and analysis techniques., , , , , and . ICC, page 2146-2151. IEEE, (2002)