Toyoo Takata
According to our database1,
Toyoo Takata
authored at least 57 papers
between 1986 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
1990
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
1
2
1
1
2
2
1
1
1
1
2
3
2
2
1
1
1
2
1
2
3
1
3
2
2
2
2
1
2
5
1
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Probabilistic computation offloading for mobile edge computing in dynamic network environment.
Internet Things, 2020
Proceedings of the Advances in Networked-Based Information Systems, 2020
2019
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019
2018
Construction and maintenance of k-hop CDS in MANET with two classes of mobile terminals.
Int. J. Space Based Situated Comput., 2018
Int. J. Space Based Situated Comput., 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
2017
The motion capturing of female divers under water and the trial production of motion viewers for developing a virtual diving experience learning system.
Artif. Life Robotics, 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
2015
Int. J. Space Based Situated Comput., 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
2014
Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
A proposal of distributed management scheme of content key information for pure P2P networks.
Proceedings of the International Symposium on Information Theory and its Applications, 2014
An Onomatopoeia-Based Web Music Video Searching System and Its Performance Evaluation.
Proceedings of the HCI International 2014 - Posters' Extended Abstracts, 2014
2013
A practical study on noise-tolerant PN code-based localisation attacks to internet threat monitors.
Int. J. Space Based Situated Comput., 2013
Reducing data leakage possibility resulted from eavesdropping in wireless sensor network.
Int. J. Space Based Situated Comput., 2013
A Distributed Approach to Constructing k-Hop Connected Dominating Set in Ad Hoc Networks.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013
A Study on Noise-Tolerant PN Code-Based Localization Attacks to Internet Threat Monitors by Exploiting Multiple Ports.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OS.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
2011
Proceedings of the 2011 International Conference on Broadband, 2011
Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents.
Proceedings of the Multiagent System Technologies, 7th German Conference, 2009
2007
Mining Sequential Patterns More Efficiently by Reducing the Cost of Scanning Sequence Databases.
Inf. Media Technol., 2007
Inf. Media Technol., 2007
Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study.
Proceedings of the Network-Based Information Systems, First International Conference, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
IEICE Trans. Inf. Syst., 2006
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Proceedings of the Intelligent Data Engineering and Automated Learning, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
An Efficient RP (Rendezvous Point) Replacement Mechanism for Rendezvous-Based Multicast Routing.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003
2002
A Soft-Decision Iterative Decoding Algorithm Using a Top-Down and Recursive Minimum Distance Search.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
1999
A Low-Weight Trellis-Based Iterative Soft-Decision Decoding Algorithm for Binary Linear Block Codes.
IEEE Trans. Inf. Theory, 1999
1997
1994
An upper bound on the effective error coefficient of two-stage decoding, and good two-level decompositions of some Reed-Muller codes.
IEEE Trans. Commun., 1994
1993
Multistage decoding of multilevel block M-PSK modulation codes and its performance analysis.
IEEE Trans. Inf. Theory, 1993
IEEE Trans. Inf. Theory, 1993
On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes.
IEEE Trans. Inf. Theory, 1993
1991
On linear structure and phase rotation invariant properties of block M-PSK modulation codes.
IEEE Trans. Inf. Theory, 1991
1990
IEEE Trans. Commun., 1990
1988
IEEE Trans. Inf. Theory, 1988
1986
An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11.
IEEE Trans. Inf. Theory, 1986