Search

Your search keyword '"Kadobayashi, Youki"' showing total 40 results

Search Constraints

Start Over You searched for: Author "Kadobayashi, Youki" Remove constraint Author: "Kadobayashi, Youki" Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources
40 results on '"Kadobayashi, Youki"'

Search Results

1. Multi-path transmission algorithm for end-to-end seamless handover across heterogeneous wireless access networks

2. Hierarchical Load Balancing and Clustering Technique for Home Edge Computing

3. Adaptive Bloom Filter: A space-efficient counting algorithm for unpredictable network traffic

4. Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set

5. Reducing processor usage on heavily-loaded network servers with POSIX real-time scheduling control

6. A survey on blockchain, SDN and NFV for the smart-home security

7. D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems

8. A 1D-CNN Based Deep Learning for Detecting VSI-DDoS Attacks in IoT Applications

9. Choice of Parallelism: Multi-GPU Driven Pipeline for Huge Academic Backbone Network

10. Hierarchical Load Balancing and Clustering Technique for Home Edge Computing

11. SDN-Enabled IoT Anomaly Detection Using Ensemble Learning

12. Hierarchical Load Balancing and Clustering Technique for Home Edge Computing

13. Hierarchical Load Balancing and Clustering Technique for Home Edge Computing

14. LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications

15. Hierarchical Load Balancing and Clustering Technique for Home Edge Computing

16. Hierarchical Load Balancing and Clustering Technique for Home Edge Computing

17. LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications

18. Hierarchical Load Balancing and Clustering Technique for Home Edge Computing

19. LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications

20. Hierarchical Load Balancing and Clustering Technique for Home Edge Computing

21. Attributes affecting user decision to adopt a Virtual Private Network (VPN) app

22. Hierarchical Load Balancing and Clustering Technique for Home Edge Computing

23. Information-theoretic Ensemble Learning for DDoS Detection with Adaptive Boosting

24. Adversarial Impact on Anomaly Detectionin Cloud Datacenters

25. TVis : A Light-weight Traffic Visualization System for DDoS Detection

26. Ontological Approach toward Cybersecurity in Cloud Computing

27. Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set

28. Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries

29. Expediting Experiments across Testbeds with AnyBed: A Testbed-Independent Topology Configuration System and Its Tool Set

30. Handover Management for VoWLAN Based on Estimation of AP Queue Length and Frame Retries

31. Adaptive Bloom Filter: A space-efficient counting algorithm for unpredictable network traffic

32. Adaptive Bloom Filter: A space-efficient counting algorithm for unpredictable network traffic

33. Performance study and deployment strategies on the sender-initiated multicast

34. Reducing processor usage on heavily-loaded network servers with POSIX real-time scheduling control

35. Reducing processor usage on heavily-loaded network servers with POSIX real-time scheduling control

36. Performance study and deployment strategies on the sender-initiated multicast

37. Multi-path transmission algorithm for end-to-end seamless handover across heterogeneous wireless access networks

38. Multi-path transmission algorithm for end-to-end seamless handover across heterogeneous wireless access networks

Catalog

Books, media, physical & digital resources