Sumiko Miyata

Orcid: 0000-0001-8023-7435

According to our database1, Sumiko Miyata authored at least 45 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Improved Intensity Factor of Correlation-Based Steganography Using M-Sequence and DCT.
SN Comput. Sci., January, 2024

D2EcoSys: Decentralized Digital Twin EcoSystem Empower Co-Creation City-Level Digital Twins.
IEICE Trans. Commun., January, 2024

AP Connection Method for Maximizing Throughput Considering Moving User and Degree of Interference Based on Potential Game.
IEEE Open J. Commun. Soc., 2024

A User Allocation Method for DASH Multi-Servers Considering Coalition Structure Generation in Cooperative Game.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Reward Distribution Using an Anti-Duality Game in a Point Cloud Data Trading Model Based on Collected Area.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication , 2024

Cost Sharing Method for a Mobile Tethering with a Coalitional Game Theory.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication , 2024

Characteristic Analysis of Upper Bound Call Blocking Probability of Emergency CAC for Three Types of Calls.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

Heterogeneous Edge Server and Job Allocation Based on k-means++ and Transfer Probability.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Three types of calls admission control methods considering seek-bar operation.
IET Commun., July, 2023

AP Connection Method for Maximizing Throughput Considering User Moving and Degree of Interference Based on Potential Game.
CoRR, 2023

Flow Admission Control for Users Considering Dissatisfactions With Selection Errors and Loss Using Stochastic Evolutionary Game and Queueing Theory.
IEEE Access, 2023

A Client-Side Evil-Twin Attack Detection System with Threshold Considering Traffic Load.
Proceedings of the 13th IEEE International Conference on Consumer Electronics - Berlin, 2023

CNN-based perceptual hashing scheme for image groups suitable for security systems.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

AP Connection Method Considering Interference for Maximizing System Throughput Using Potential Game.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
A Load Balancing Method Using K-means++ for P2P MMORPGs.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
A Proposal for Correlation-based Steganography Using Shamir's Secret Sharing Scheme and DCT Domain.
Proceedings of the International Conference on Information Networking, 2021

A proposal of Web accesses method considering tolerable delay for each content.
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021

Flow Admission Control Method with Bounded Rationality Using Stochastic Evolutionary Game Theory.
Proceedings of the IEEE Global Communications Conference, 2021

Design Scheme of Perceptual Hashing based on Output of CNN for Digital Watermarking.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Two types of flows admission control method for maximizing all user satisfaction considering seek-bar operation.
Proceedings of the IEEE International Symposium on Multimedia, 2020

A Study of Steganography Based on Error Correction Code and Secret Sharing Scheme.
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020

Bitrate selection for MPEG-DASH considering QoE by queueing theory.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020

An Improved Design Scheme for Perceptual Hashing Based on CNN for Digital Watermarking.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
A call admission control maximizing the number of general calls from non-disaster area considering the priority calls.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019

2018
Exact Mean Packet Delay for Delayed Report Messages Multipoint Control Protocol in EPON.
JOCN, 2018

Analysis of mean packet delay in DR-MPCP limited service using queueing theory.
Proceedings of the 2018 International Conference on Optical Network Design and Modeling, 2018

Two Types of Flows Admission control by altruistic behavior based on warning.
Proceedings of the 2018 International Conference on Computing, 2018

Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2016
Threshold Relaxation and Holding Time Limitation Method for Accepting More General Calls under Emergency Trunk Reservation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

2015
DR-MPCP: Delayed REPORT message for multipoint control protocol in EPON.
Proceedings of the 7th International Workshop on Reliable Networks Design and Modeling, 2015

RDFization of database for folk implements and ontology-assisted information retrieval system.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

Development of the folk implements database for the digital archive.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

Exact Mean Packet Delay Analysis for Long-Reach Passive Optical Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Optimal Threshold Configuration Methods for Flow Admission Control with Cooperative Users.
IEICE Trans. Commun., 2014

Optimal threshold configuration with equality based call admission control with cooperative users (mixed loss and delay system).
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Access Control Model for the My Number National Identification Program in Japan.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Game theoretic analysis of the value exchange system.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Equality Based Flow-Admission Control by Using Mixed Loss and Delay System.
IEICE Trans. Commun., 2012

Novel Access-Point Selection for User QoS and System Optimization Based on User Cooperative Moving.
IEICE Trans. Commun., 2012

A Local Currency System Reflecting Variety of Values with a Swarm Intelligence.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Characteristic analysis of an access-point selection for user throughput and system optimization based on user cooperative moving.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
An access-point selection algorithm for user QoS and system optimization based on user cooperative moving.
Proceedings of the International Conference on the Network of the Future, 2011

2010
Flow-Admission Control Based on Equality of Heterogeneous Traffic (Two-Type Flow Model).
IEICE Trans. Commun., 2010

A Threshold Configuration for Flow-Admission Control Based on the Equality (Two-Type Flow Model).
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

A Basic Study of Heterogeneous Flow Admission Control Based on Equality of Flow Classes.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010


  Loading...