Yoshiaki Nemoto

According to our database1, Yoshiaki Nemoto authored at least 91 papers between 1991 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Resilient ICT research based on lessons learned from the Great East Japan Earthquake.
IEEE Commun. Mag., 2014

2012
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy.
J. Information Security, 2012

2011
Development of a WLAN based monitoring system for group activity measurement in real-time.
J. Commun. Networks, 2011

2010
Gateway Selection Protocol in Hybrid MANET Using DYMO Routing.
Mob. Networks Appl., 2010

Extensions of VCP to Enhance the Performance in High BDP and Wireless Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

HYMN to Improve the Longevity of Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
DEMAPS: A Load-Transition-Based Mobility Management Scheme for an Efficient Selection of MAP in Mobile IPv6 Networks.
IEEE Trans. Veh. Technol., 2009

A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2009

Combating against internet worms in large-scale networks: an autonomic signature-based solution.
Secur. Commun. Networks, 2009

Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems.
IEEE J. Sel. Areas Commun., 2009

Tailoring ELB for Multi-Layered Satellite Networks.
Proceedings of IEEE International Conference on Communications, 2009

Mitigating Performance Anomaly of TFRC in Multi-Rate IEEE 802.11 Wireless LANs.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

On Supporting P2P-Based VoD Services over Mesh Overlay Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

2008
A Cross-Layer Approach for an Efficient Delivery of TCP/RTP-Based Multimedia Applications in Heterogeneous Wireless Networks.
IEEE Trans. Veh. Technol., 2008

Detecting DRDoS attacks by a simple response packet confirmation mechanism.
Comput. Commun., 2008

A reliable topology for efficient key distribution in ad-hoc networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

On Gateway Selection Protocol for DYMO-Based MANET.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Network Application Identification Using Transition Pattern of Payload Length.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition.
Proceedings of IEEE International Conference on Communications, 2008

A Reliable Network Identification Method Based on Transition Pattern of Payload Length.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A New Data Gathering Scheme Based on Set Cover Algorithm for Mobile Sinks in WSNs.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Ultra-Mobile Echo Network in Health Care System.
Proceedings of the Twenty-First IEEE International Symposium on Computer-Based Medical Systems, 2008

2007
A survey of routing attacks in mobile ad hoc networks.
IEEE Wirel. Commun., 2007

A Stable Routing Protocol to Support ITS Services in VANET Networks.
IEEE Trans. Veh. Technol., 2007

Discrimination of similar characters with a nonlinear compound discriminant function.
Syst. Comput. Jpn., 2007

Toward Efficient Service-Level QoS Provisioning in Large-Scale 802.11-Based Networks.
IEEE Netw., 2007

Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method.
Int. J. Netw. Secur., 2007

A study of a routing attack in OLSR-based mobile <i>ad hoc</i> networks.
Int. J. Commun. Syst., 2007

A Network-based Anomaly Detection System using Multiple Network Features.
Proceedings of the WEBIST 2007, 2007

A Low Cost Worm Detection Technique based on Flow Payload Similarity.
Proceedings of the WEBIST 2007, 2007

A Novel Scheme to Reduce Control Overhead and Increase Link Duration in Highly Mobile Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Dynamic QoS Negotiation for Next-Generation Wireless Communications Systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Tracing back attacks against encrypted protocols.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007

Distributed Early Worm Detection Based on Payload Histograms.
Proceedings of IEEE International Conference on Communications, 2007

An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks.
Proceedings of IEEE International Conference on Communications, 2007

A Dynamic Service Level Negotiation Mechanism for QoS Provisioning in NGEO Satellite Networks.
Proceedings of IEEE International Conference on Communications, 2007

Combating Against Attacks on Encrypted Protocols.
Proceedings of IEEE International Conference on Communications, 2007

A Bandwidth Aggregation-Aware QoS Negotiation Mechanism for Next-Generation Wireless Networks.
Proceedings of the Global Communications Conference, 2007

A Fair and Lifetime-Maximum Routing Algorithm for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

2006
REFWA: an efficient and fair congestion control scheme for LEO satellite networks.
IEEE/ACM Trans. Netw., 2006

Enhancements of T-REFWA to mitigate link error-related degradations in hybrid wired/wireless networks.
J. Commun. Networks, 2006

Theatre in the Sky: a ubiquitous broadband multimedia-on-demand service over a novel constellation composed of quasi-geostationary satellites.
Int. J. Satell. Commun. Netw., 2006

An efficient vehicle-heading based routing protocol for VANET networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

A new smooth handoff scheme for mobile multimedia streaming using RTP dummy packets and RTCP explicit handoff notification.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Analysis of the node isolation attack against OLSR-based mobile ad hoc networks.
Proceedings of the International Symposium on Computer Networks, 2006

Geographical and Orbital Information Based Mobility Management to Overcome Last-Hop Ambiguity over IP/LEO Satellite Networks.
Proceedings of IEEE International Conference on Communications, 2006

A Fair TCP-Based Congestion Avoidance Approach for One-to-Many Private Networks.
Proceedings of IEEE International Conference on Communications, 2006

An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks.
Proceedings of IEEE International Conference on Communications, 2006

Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

ELB: An Explicit Load Balancing Routing Protocol for Multi-Hop NGEO Satellite Constellations.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Traitor Tracing Technology of Streaming Contents Delivery using Traffic Pattern in Wired/Wireless Environments.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Recent trends in IP/NGEO satellite communication systems: transport, routing, and mobility management concerns.
IEEE Wirel. Commun., 2005

On-demand media streaming to hybrid wired/wireless networks over quasi-geostationary satellite systems.
Comput. Networks, 2005

A dummy segment based bandwidth probing technique to enhance the performance of TCP over heterogeneous networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

IP Traffic Load Distribution in NGEO Broadband Satellite Networks - (Invited Paper).
Proceedings of the Computer and Information Sciences, 2005

A geographical location based satellite selection scheme for a novel constellation composed of quasi-geostationary satellites.
Proceedings of IEEE International Conference on Communications, 2005

A dynamic and efficient MAP selection scheme for mobile IPv6 networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

securing hybrid wired/mobile IP networks from TCP-flooding based denial-of-service attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Supporting IP/LEO satellite networks by handover-independent IP mobility management.
IEEE J. Sel. Areas Commun., 2004

An explicit and fair window adjustment method to enhance TCP efficiency and fairness over multihops Satellite networks.
IEEE J. Sel. Areas Commun., 2004

Detecting and Tracing DDoS Attacks in the Traffic Analysis Using Auto Regressive Model.
IEICE Trans. Inf. Syst., 2004

A recursive, explicit and fair method to efficiently and fairly adjust TCP windows in satellite networks.
Proceedings of IEEE International Conference on Communications, 2004

2003
Neighbors-buffering-based video-on-demand architecture.
Signal Process. Image Commun., 2003

2002
Discrimination of similar characters with quadratic compound Mahalanobis function.
Syst. Comput. Jpn., 2002

2001
Buffer-Size Approximation for the Geo/D/1/K Queue.
Proceedings of the Networking, 2001

2000
A simple packet aggregation technique for fault detection.
Int. J. Netw. Manag., 2000

Towards trapping wily intruders in the large.
Comput. Networks, 2000

Guaranteeing multiple QoSs in differentiated services Internet.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000

Evaluation of Simple Packet Aggregation Technique for Fault Detection.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999
A multicast routing algorithm.
Syst. Comput. Jpn., 1999

A Handwritten Character Recognition System Using Directional Element Feature and Asymmetric Mahalanobis Distance.
IEEE Trans. Pattern Anal. Mach. Intell., 1999

1998
A fast sequential distributed synchronization protocol.
Syst. Comput. Jpn., 1998

Bandwidth Allocation in ATM Networks: Heuristic Approach.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
A handwritten character recognition system using modified Mahalanobis distance.
Syst. Comput. Jpn., 1997

Providing the Statistical QoS Objectives in High-Speed Networks.
Comput. Networks ISDN Syst., 1997

Divide and Conquer Technique for Network Fault Management.
Proceedings of the Integrated Network Management V, 1997

High speed rough classification for handwritten characters using hierarchical learning vector quantization.
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997

1996
Configuring a Network Management System for Efficient Operation.
Int. J. Netw. Manag., 1996

Techniques for Automated Network Map Generation Using SNMP.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996

1995
Evaluation of a causal order protocol in broadcast channel.
Syst. Comput. Jpn., 1995

1994
Multidimensional analysis method for NOAA AVHRR images.
IEEE Trans. Geosci. Remote. Sens., 1994

Recognition of handwritten character database ETL9B using pattern transformation method.
Syst. Comput. Jpn., 1994

1992
Network Management In A Large-scale OSI-based Campus Network.
Proceedings of the Network Without Bounds: Network Operations and Management Symposium, 1992

1991
Japanese Earth Resources Satellite-1 synthetic aperture radar.
Proc. IEEE, 1991


  Loading...