Kensuke Fukuda

Orcid: 0000-0001-8372-2807

According to our database1, Kensuke Fukuda authored at least 183 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Do Cookie Banners Respect My Browsing Privacy? Measuring the Effectiveness of Cookie Rejection for Limiting Behavioral Advertising.
IEEE Access, 2024

GothX: a generator of customizable, legitimate and malicious IoT network traffic.
Proceedings of the 17th Cyber Security Experimentation and Test Workshop, 2024

Exploring the Discovery Process of Fresh IPv6 Prefixes: An Analysis of Scanning Behavior in Darknet and Honeynet.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

Following the Data Trail: An Analysis of IXP Dependencies.
Proceedings of the Passive and Active Measurement - 25th International Conference, 2024

Practical Anomaly Detection in Internet Services: An ISP centric approach.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

Privacy Leakage of DNS over QUIC: Analysis and Countermeasure.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication , 2024

Evaluation of XAI Algorithms in IoT Traffic Anomaly Detection.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication , 2024

2023
I Never Trust My University for This! Investigating Student PII Leakage at Vietnamese Universities.
IEICE Trans. Inf. Syst., December, 2023

Characterizing Privacy Leakage in Encrypted DNS Traffic.
IEICE Trans. Commun., February, 2023

ASTrack: Automatic Detection and Removal of Web Tracking Code with Minimal Functionality Loss.
Proceedings of the IEEE INFOCOM 2023, 2023

Investigating Search Engines Terms Leakage.
Proceedings of the on CoNEXT Student Workshop 2023, 2023

dot2net: A Labeled Graph Approach for Template-Based Configuration of Emulation Networks.
Proceedings of the 19th International Conference on Network and Service Management, 2023

SSOLogin: A framework for automated web privacy measurement with SSO logins.
Proceedings of the 18th Asian Internet Engineering Conference, 2023

SIURU: A Framework for Machine Learning Based Anomaly Detection in IoT Network Traffic.
Proceedings of the 18th Asian Internet Engineering Conference, 2023

2022
amulog: A general log analysis framework for comparison and combination of diverse template generation methods.
Int. J. Netw. Manag., 2022

Comparative Causal Analysis of Network Log Data in Two Large ISPs.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Characterizing DNS query response sizes through active and passive measurements.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Advancement of Logging Monitoring Using ALOS-2/PALSAR-2 for Japanese Forest Management.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

2021
Routing and Capacity Optimization Based on Estimated Latent OD Traffic Demand.
IEICE Trans. Commun., July, 2021

CNAME Cloaking-Based Tracking on the Web: Characterization, Detection, and Protection.
IEEE Trans. Netw. Serv. Manag., 2021

Latent Semantics Approach for Network Log Analysis: Modeling and its application.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

LogDTL: Network Log Template Generation with Deep Transfer Learning.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

An analysis of privacy leakage in DoQ traffic.
Proceedings of the CoNEXT-SW '21: Proceedings of the CoNEXT Student Workshop, 2021

Alternative to third-party cookies: investigating persistent PII leakage-based web tracking.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

Towards Extracting Semantics of Network Config Blocks.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

A Quantitative Causal Analysis for Network Log Data.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Verifying Network Properties in SRv6 based Service Function Chaining.
Proceedings of the AINTEC '21: Asian Internet Engineering Conference, Virtual Event, Japan, December 14, 2021

2020
Characterizing CNAME Cloaking-based Tracking on the Web.
Proceedings of the 4th Network Traffic Measurement and Analysis Conference, 2020

Towards detecting DNSSEC validation failure with passive measurements.
Proceedings of the NOMS 2020, 2020

HUMAN - Hierarchical Clustering for Unsupervised Anomaly Detection & Interpretation.
Proceedings of the 11th International Conference on Network of the Future, 2020

Toward Detecting IoT Device Traffic in Transit Networks.
Proceedings of the 2020 International Conference on Artificial Intelligence in Information and Communication, 2020

A machine learning approach for detecting CNAME cloaking-based tracking on the Web.
Proceedings of the IEEE Global Communications Conference, 2020

WhatsThat? On the Usage of Hierarchical Clustering for Unsupervised Detection & Interpretation of Network Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

amulog: A General Log Analysis Framework for Diverse Template Generation Methods.
Proceedings of the 16th International Conference on Network and Service Management, 2020

2019
Latent Variable Based Anomaly Detection in Network System Logs.
IEICE Trans. Inf. Syst., 2019

Characterizing and Detecting Money Laundering Activities on the Bitcoin Network.
CoRR, 2019

Adaptive probabilistic caching technique for caching networks with dynamic content popularity.
Comput. Commun., 2019

A comparison of web privacy protection techniques.
Comput. Commun., 2019

BGP Zombies: An Analysis of Beacons Stuck Routes.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

Causal analysis of network logs with layered protocols and topology knowledge.
Proceedings of the 15th International Conference on Network and Service Management, 2019

2018
Mining Causality of Network Events in Log Data.
IEEE Trans. Netw. Serv. Manag., 2018

An Evaluation of Darknet Traffic Taxonomy.
J. Inf. Process., 2018

Finding Anomalies in Network System Logs with Latent Variables.
Proceedings of the 2018 Workshop on Big Data Analytics and Machine Learning for Data Communication Networks, 2018

Who Knocks at the IPv6 Door?: Detecting IPv6 Scanning.
Proceedings of the Internet Measurement Conference 2018, 2018

Robust Peer to Peer Mobile Botnet Detection by Using Communication Patterns.
Proceedings of the Asian Internet Engineering Conference, 2018

Understanding abusive web resources: characteristics and counter-measures of malicious web resources and cryptocurrency mining.
Proceedings of the Asian Internet Engineering Conference, 2018

2017
Detecting Malicious Activity With DNS Backscatter Over Time.
IEEE/ACM Trans. Netw., 2017

Scaling in Internet Traffic: A 14 Year and 3 Day Longitudinal Study, With Multiscale Analyses and Random Projections.
IEEE/ACM Trans. Netw., 2017

SDN-Mon: Fine-Grained Traffic Monitoring Framework in Software-Defined Networks.
J. Inf. Process., 2017

On rate limitation mechanisms for TCP throughput: A longitudinal analysis.
Comput. Networks, 2017

Profiling internet scanners: Spatiotemporal structures and measurement ethics.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

Mining causes of network events in log data with causal inference.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

SINET5: A low-latency and high-bandwidth backbone network for SDN/NFV Era.
Proceedings of the IEEE International Conference on Communications, 2017

Adaptive and distributed monitoring mechanism in software-defined networks.
Proceedings of the 13th International Conference on Network and Service Management, 2017

GML learning, a generic machine learning model for network measurements analysis.
Proceedings of the 13th International Conference on Network and Service Management, 2017

An Analysis of Burstiness and Causality of System Logs.
Proceedings of the Asian Internet Engineering Conference, 2017

Toward a Flexible and Scalable Monitoring Framework in Software-Defined Networks.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
A streaming flow-based technique for traffic classification applied to 12 + 1 years of Internet traffic.
Telecommun. Syst., 2016

Combining Communication Patterns & Traffic Patterns to Enhance Mobile Traffic Identification Performance.
J. Inf. Process., 2016

Machine learning, data mining and Big Data frameworks for network monitoring and troubleshooting.
Comput. Networks, 2016

Identifying Coordination of Network Scans Using Probed Address Structure.
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016

A fully meshed backbone network for data-intensive sciences and SDN services.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

Non-linear regression for bivariate self-similarity identification - application to anomaly detection in Internet traffic based on a joint scaling analysis of packet and byte counts.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection.
Int. J. Netw. Manag., 2015

New Directions for a Japanese Academic Backbone Network.
IEICE Trans. Inf. Syst., 2015

An empirical mixture model for large-scale RTT measurements.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Detecting Malicious Activity with DNS Backscatter.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Tracking the Evolution and Diversity in Network Usage of Smartphones.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Random projection and multiscale wavelet leader based anomaly detection and address identification in internet traffic.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Enhancing the Performance of Mobile Traffic Identification with Communication Patterns.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Highly available network design and resource management of SINET4.
Telecommun. Syst., 2014

Network application profiling with traffic causality graphs.
Int. J. Netw. Manag., 2014

Unsupervised Learning Model for Real-Time Anomaly Detection in Computer Networks.
IEICE Trans. Inf. Syst., 2014

Visual comparison of network anomaly detectors with chord diagrams.
Proceedings of the Symposium on Applied Computing, 2014

Towards evaluation of DNS server selection with geodesic distance.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

A taxonomy of anomalies in backbone network traffic.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Towards a taxonomy of darknet traffic.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Hashdoop: A MapReduce framework for network anomaly detection.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A longitudinal analysis of Internet rate limitations.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Towards an NLP-based log template generation algorithm for system log analysis.
Proceedings of the International Conference of Future Internet 2014, 2014

Clustering Spam Campaigns with Fuzzy Hashing.
Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference, Chiang Mai, Thailand, November 26, 2014

2013
Synoptic Graphlet: Bridging the Gap Between Supervised and Unsupervised Profiling of Host-Level Network Traffic.
IEEE/ACM Trans. Netw., 2013

MARIF: Multiple Queries Look-Up Architecture Using Range Information Feedback in a DHT Network.
IEICE Trans. Commun., 2013

ADMIRE: Anomaly detection method using entropy-based PCA with three-step sketches.
Comput. Commun., 2013

A Measurement of Mobile Traffic Offloading.
Proceedings of the Passive and Active Measurement - 14th International Conference, 2013

PopCache: Cache more or less based on content popularity for information-centric networking.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Strip, bind, and search: a method for identifying abnormal energy consumption in buildings.
Proceedings of the 12th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2013), 2013

A technique for counting DNSSEC validators.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Nine years of observing traffic anomalies: Trending analysis in backbone networks.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Towards classification of DNS erroneous queries.
Proceedings of the Asian Internet Engineering Conference, 2013

Towards passive DNS software fingerprinting.
Proceedings of the Asian Internet Engineering Conference, 2013

An Analysis of Players and Bots Behaviors in MMORPG.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Counting NATted hosts by observing TCP/IP field behaviors.
Proceedings of IEEE International Conference on Communications, 2012

Efficient query bundling mechanism in a DHT network.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

On incentive-based inter-domain caching for content delivery in future internet architectures.
Proceedings of the Asian Internet Engineering Conference, 2012

Improving an SVD-based combination strategy of anomaly detectors for traffic labelling.
Proceedings of the Asian Internet Engineering Conference, 2012

2011
A Visualization Tool for Exploring Multi-scale Network Traffic Anomalies.
J. Networks, 2011

IM-DB: Information Retrieval System for Interactive Network-Status Analysis.
Inf. Media Technol., 2011

An Analysis of Longitudinal TCP Passive Measurements (Short Paper).
Proceedings of the Traffic Monitoring and Analysis - Third International Workshop, 2011

Traffic causality graphs: Profiling network applications through temporal and spatial causality of flows.
Proceedings of the 23rd International Teletraffic Congress, 2011

A Hough-transform-based anomaly detector with an adaptive time interval.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

On the use of weighted syslog time series for anomaly detection.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Impact of Tohoku earthquake on R&E network in Japan.
Proceedings of the Special Workshop on Internet and Disasters, 2011

Disasters seen through Flickr cameras.
Proceedings of the Special Workshop on Internet and Disasters, 2011

MALAWI: aggregated longitudinal analysis of the MAWI dataset.
Proceedings of The ACM CoNEXT Student Workshop, 2011

Analysis of Spoofed IP Traffic Using Time-to-Live and Identification Fields in IP Headers.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Fluctuated peer selection policy and its performance in large-scale multi-agent systems.
Web Intell. Agent Syst., 2010

An evaluation of automatic parameter tuning of a statistics-based anomaly detection algorithm.
Int. J. Netw. Manag., 2010

Unsupervised host behavior classification from connection patterns.
Int. J. Netw. Manag., 2010

Characterization of Host-Level Application Traffic with Multi-Scale Gamma Model.
IEICE Trans. Commun., 2010

Evaluation of Anomaly Detection Method Based on Pattern Recognition.
IEICE Trans. Commun., 2010

Dynamic Resource Allocation and QoS Control Capabilities of the Japanese Academic Backbone Network.
Future Internet, 2010

Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory.
Proceedings of the Traffic Monitoring and Analysis, Second International Workshop, 2010

Effect of Alternative Distributed Task Allocation Strategy Based on Local Observations in Contract Net Protocol.
Proceedings of the Principles and Practice of Multi-Agent Systems, 2010

Dynamic and distributed routing control for virtualized local area networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

A Flow Analysis for Mining Traffic Anomalies.
Proceedings of IEEE International Conference on Communications, 2010

Estimating Speed of Scanning Activities with a Hough Transform.
Proceedings of IEEE International Conference on Communications, 2010

A Light-Weight Autonomous Power Saving Method for Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Autonomic and Autonomous Systems, 2010

Probabilistic Award Strategy for Contract Net Protocol in Massively Multi-agent Systems.
Proceedings of the ICAART 2010 - Proceedings of the International Conference on Agents and Artificial Intelligence, Volume 2, 2010

Evaluation of Anomaly Detection Based on Sketch and PCA.
Proceedings of the Global Communications Conference, 2010

Adaptive probabilistic task allocation in large-scale multi-agent systems and its evaluation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2010

MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

Towards characterization of wireless traffic in coexisting 802.11a/g and 802.11n network.
Proceedings of the ACM CoNEXT Student Workshop, 2010

Difficulties of identifying application type in backbone traffic.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Effect of probabilistic task allocation based on statistical analysis of bid values.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

A PCA Analysis of Daily Unwanted Traffic.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Impact of QoS operations on an experimental testbed network.
Simul. Model. Pract. Theory, 2009

Design of versatile academic infrastructure for multilayer network services.
IEEE J. Sel. Areas Commun., 2009

Estimating Relevance of Items on Basis of Proximity of User Groups on Blogspace.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Seven Years and One Day: Sketching the Evolution of Internet Traffic.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Implementation and Evaluation of Layer-1 Bandwidth-on-Demand Capabilities in SINET3.
Proceedings of IEEE International Conference on Communications, 2009

An Automatic and Dynamic Parameter Tuning of a Statistics-Based Anomaly Detection Algorithm.
Proceedings of IEEE International Conference on Communications, 2009

Towards systematic traffic annotation.
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009

A Visualization of Internet AS Topology with Valley-free Rules.
Proceedings of the 2009 International Conference on Complex, 2009

Combining multiresolution and random projections for robust statistical analysis and anomaly detection.
Proceedings of the AINTEC '09, 2009

2008
Policy-based BGP-control architecture for inter-AS routing adjustment.
Comput. Commun., 2008

Co-occurrence Analysis Focused on Blogger Communities.
Proceedings of the 2008 IEEE / WIC / ACM International Conference on Web Intelligence, 2008

Graphic Drawing Tools for Network Traffic Simulation.
Proceedings of the Network-Based Information Systems, 2nd International Conference, 2008

Towards Modeling of Traffic Demand of Node in Large Scale Network.
Proceedings of IEEE International Conference on Communications, 2008

Correlation Among Piecewise Unwanted Traffic Time Series.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Observing slow crustal movement in residential user traffic.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

Controling Contract Net Protocol by Local Observation for Large-Scale Multi-Agent Systems.
Proceedings of the Cooperative Information Agents XII, 12th International Workshop, 2008

Adaptive manager-side control policy in contract net protocol for massively multi-agent systems.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

An image processing approach to traffic anomaly detection.
Proceedings of the AINTEC '08, 2008

2007
Improvements in Performance of Large-Scale Multi-Agent Systems Based on the Adaptive/ Non-Adaptive Agent Selection.
Proceedings of the Emergent Intelligence of Networked Agents, 2007

The Impact of Network Model on Performance of Load-balancing.
Proceedings of the Emergent Intelligence of Networked Agents, 2007

Architectural Design of Next-Generation Science Information Network.
IEICE Trans. Commun., 2007

Generating Extensional Definitions of Concepts from Ostensive Definitions by Using Web.
Proceedings of the Web Information Systems Engineering, 2007

Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures.
Proceedings of the 2007 Workshop on Large Scale Attack Defense, 2007

Effective Selection of Abstract Plans for Multi-Agent Systems.
Proceedings of the Research and Development in Intelligent Systems XXIV, 2007

Message from the Organizers of the Workshop on Internet Measurement Technology and its Applications to Building Next Generation Internet.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Lisp-based agent platform and applications for inter-domain network management.
Proceedings of the International Lisp Conference, 2007

Analysis of Diagnostic Capability for Hijacked Route Problem.
Proceedings of the IP Operations and Management, 7th IEEE International Workshop, 2007

Layer-1 Bandwidth on Demand Services in SINET3.
Proceedings of the Global Communications Conference, 2007

Performance variation due to interference among a large number of self-interested agents.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

Conflict estimation of abstract plans for multiagent systems.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

Multi-Agent Coordination Mechanism Based on Indirect Interaction.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
The impact and implications of the growth in residential user-to-user traffic.
Proceedings of the ACM SIGCOMM 2006 Conference on Applications, 2006

Policy-based BGP control architecture for autonomous routing management.
Proceedings of the 2006 SIGCOMM Workshop on Internet Network Management, 2006

Adaptive Agent Selection in Large-Scale Multi-Agent Systems.
Proceedings of the PRICAI 2006: Trends in Artificial Intelligence, 2006

Multi-Agent Systems Performance by Adaptive/Non-Adaptive Agent Selection.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Dependency of Network Structures in Agent Selection and Deployment.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Total performance by local agent selection strategies in multi-agent systems.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

How can agent know the global information without close coordination?
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Application of a Massively Multi-Agent System to Internet Routing Management.
Proceedings of the Massively Multi-Agent Technology, AAMAS Workshops, 2006

2005
A cause of self-similarity in TCP traffic.
Int. J. Commun. Syst., 2005

Traffic Matrix Estimation Using Spike Flow Detection.
IEICE Trans. Commun., 2005

Effective Decision Making by Self-evaluation in the Multi-agent Environment.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

ARTISTE: Agent Organization Management System for Multi-Agent Systems.
Proceedings of the Multi-Agent Systems for Society, 2005

Evaluation of Using Human Relationships on the Web as Information Navigation Paths.
Proceedings of the New Frontiers in Artificial Intelligence, 2005

Time and Space Correlation in BGP Messages.
Proceedings of the Information Networking, 2005

On the Use of Hierarchical Power-law Network Topology for Server Selection and Allocation in Multi-Agent Systems.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

Detection and Diagnosis of Inter-AS Routing Anomalies by Cooperative Intelligent Agents.
Proceedings of the Ambient Networks, 2005

Predicting possible conflicts in hierarchical planning for multi-agent systems.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

2004
A Stochastic Map Model of Phase Transition in Internet Traffic.
Comput. Sci. J. Moldova, 2004

The impact of residential broadband traffic on Japanese ISP backbones.
Comput. Commun. Rev., 2004

Multi-agent Human-Environment Interaction Framework for the Ubiquitous Environment.
Proceedings of the Massively Multi-Agent Systems I, First International Workshop, 2004

How Collective Intelligence Emerge in Complex Environment?
Proceedings of the Biologically Inspired Approaches to Advanced Information Technology, 2004

Reusing Coordination and Negotiation Strategies in Multi-Agent Systems for Ubiquitous Network Environment.
Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 2004

2003
Secure and Manageable Virtual Private Networks for End-users.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

Dynamics of temporal correlation in daily Internet traffic.
Proceedings of the Global Telecommunications Conference, 2003

Simple but efficient collaboration in a complex competitive situation.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

2002
Clea: A framework for the Coordination of Applications and Networks.
Proceedings of the 6th Joint Conference on Information Science, 2002


  Loading...