Atsushi Kara

According to our database1, Atsushi Kara authored at least 20 papers between 1987 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
User-perceived reliability of unrepairable shared protection systems with functionally identical units.
Int. J. Syst. Sci., 2012

Coping with the Complexity of SOA Systems with Message Forensics.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Reliability Analysis of M-for- N Shared Protection Systems With General Repair-Time Distributions.
IEEE Trans. Reliab., 2011

Service-level assurance in high-availability multi-unit systems using the M-for-N backup scheme.
Qual. Reliab. Eng. Int., 2011

User-perceived reliability of shared protection systems with the Erlang type-k repair scheme.
Int. J. Inf. Commun. Technol., 2011

2010
Metadata Driven Approaches for Web Security of New age Computing.
Proceedings of the 2010 International Conference on Internet Computing, 2010

Event Capture Approaches for Vulnerability Detection.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
User-Perceived Reliability of M-for-N (M: N) Shared Protection Systems.
IEICE Trans. Inf. Syst., 2009

User-Perceived Reliability of Shared Protection Systems with a Finite Number of Repairers.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2007
Computing the Availability and MTTF of Shared Protection Systems.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
New Group Rekeying Algorithm Using Combination of Secret Mask Patterns and Hash Values.
IEICE Trans. Inf. Syst., 2006

2005
A scalable group-rekeying scheme using secret mask patterns.
Int. J. High Perform. Comput. Netw., 2005

2004
Private-to-Private Communications over the Internet.
Computer, 2004

A DoS-Vulnerability Analysis of L2TP-VPN.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2003
Secret Keys Multiplication for Scalable Group Re-Keying.
Proceedings of the 3th International Conference on IT in Asia, 2003

2001
Protecting Privacy in Remote-Patient Monitoring.
Computer, 2001

Secure remote access from office to home.
IEEE Commun. Mag., 2001

1992
Reflex Control For An Intelligent Robotic System.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 1992

1988
An expert system to automate timing design.
IEEE Des. Test, 1988

1987
Module: A Modular Programming Environment in Prolog.
Proceedings of the Methodologies for Intelligent Systems, 1987


  Loading...