116 results on '"Shigeno, H."'
Search Results
2. Automating Detection of Faults in TCP Implementation
3. Competitive growth model and numerical simulation for fracture size distributions, and their applications to hydrothermal vein systems
4. Inelastic Scattering and Spin-Orbit Scattering in 2D Systems Of GaAs/AlGaAs Heterostructures
5. 2011 IEEE Vehicular Networking Conference (VNC): Demo Summaries
6. Vehicular Networking Conference (VNC)
7. Automating Detection of Faults in TCP Implementation
8. TCP Performance Considerations for Layer Two ARQ in W-CDMA network
9. A Energy Efficient Data Collection Method by Two Types Routes Selection in Triage Networks
10. A Distributed Detection of Hit-List Worms
11. Early containment of worms using dummy addresses and connection trace back
12. Proposal of a map-making system for mobile learning that uses subjective geographic recognition
13. Velocity decision algorithm for platooning based on converging sequence and converging possibility.
14. Hub Node Reinforcement against Forwarding Obstruction Attacks in Peer-to-Peer Networks.
15. Video-Popularity-Based Caching Scheme for P2P Video-on-Demand Streaming.
16. Variant Path Multiplicity Routing Algorithm Adapted to Importance of Data.
17. PTrust: Provisional Value based trust for reputation aggregation in peer-to-peer networks.
18. Examination of Data Transmission Adapting to Density of Sensor in Triage Network.
19. A multicast-based cooperative communication method for platoon management (poster).
20. Overtaking priority management method between platoons and surrounding vehicles considering carbon dioxide emissions (poster).
21. ILGT: Group Reputation Aggregation Method for Unstructured Peer-to-Peer Networks.
22. Efficient Routing Using Node Pull Out Estimation.
23. GRAT: Group Reputation Aggregation Trust for Unstructured Peer-to-Peer Networks.
24. Filter Multicast: A Dynamic Platooning Management Method.
25. Proposal of Walkable Path Discovery Technique in Triage Spot.
26. A Framework of Better Deployment for WLAN Access Point Using Virtualization Technique.
27. Examination of Selection for Relay Nodes Adapted to Priority of Transportation in Triage Network.
28. Implementation and experiment of multi-modal transmission system for stable communication.
29. Condition-based data dissemination method combining adaptive beacon transmission and autonomous packet forwarding.
30. Message Sending Method Using Patients' Priority for Medical Sensor Network.
31. A distributed data propagation method to multiple areas by using a V2V communication.
32. SRJE: Decentralized Authentication Scheme against Sybil Attacks.
33. GBLT: Load Distribution Method for High Density by User Behavior in MMO Virtual Environment.
34. Examination of Forwarding Obstruction Attacks in Structured Overlay Networks.
35. Development and Evaluation of a Collaborative Virtual Environment Supporting Self Feedbacks of Electroencephalogram.
36. H.264/AVC Stream Authentication at the Network Abstraction Layer.
37. MSP-system: Mobile Secure Passport System to detect Malicious Users.
38. Pulsed ACK: Improving Robustness of TCP for Asymmetric Bandwidth.
39. d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms.
40. Airtime-based Link Aggregation at the Co-Existence of WiMAX and WiFi.
41. Detection of Silent Worms using Anomaly Connection Tree.
42. Media Synchronization Method for Video Hypermedia Application Based on Extended Event Model.
43. ACTM: Anomaly Connection Tree Method to detect Silent Worms.
44. Authenticating Video Streams.
45. Efficient log authentication for forensic computing.
46. A two-level ECN marking for fair bandwidth allocation between HSTCP and TCP Reno.
47. A CSCW system for distributed search/collection tasks using wearable computers.
48. A secure logging scheme for Forensic Computing.
49. Impact of layer two ARQ on TCP performance in W-CDMA networks.
50. Introducing grammar of the film language into automatic shooting for face-to-face meetings.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.