Toyoo Takata

According to our database1, Toyoo Takata authored at least 56 papers between 1986 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Probabilistic computation offloading for mobile edge computing in dynamic network environment.
Internet Things, 2020

The Trade-Off Between the False-Positive Ratio and the Attack Cost of Slow HTTP DoS.
Proceedings of the Advances in Networked-Based Information Systems, 2020

2019
Confront Phishing Attacks - from a Perspective of Security Education.
Proceedings of the IEEE 10th International Conference on Awareness Science and Technology, 2019

A Probabilistic Offloading Approach in Mobile Edge Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

2018
Construction and maintenance of k-hop CDS in MANET with two classes of mobile terminals.
Int. J. Space Based Situated Comput., 2018

Incentive mechanisms for promoting D2D communications in cellular networks.
Int. J. Space Based Situated Comput., 2018

An Analysis of a Defence Method against Slow HTTP DoS Attack.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
The motion capturing of female divers under water and the trial production of motion viewers for developing a virtual diving experience learning system.
Artif. Life Robotics, 2017

Mechanism for Adopting Device-to-Device Communication in Cellular Networks.
Proceedings of the Advances in Network-Based Information Systems, 2017

Construction and Maintenance of K-Hop CDS in Mobile Ad Hoc Networks.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
A Study of Packet Sampling Methods for Protecting Sensors Deployed on Darknet.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

A Defense Method against Distributed Slow HTTP DoS Attack.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

A user authentication scheme using keystrokes for smartphones while moving.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2015
Identifying relations between frequent patterns mined at two collaborative websites.
Int. J. Space Based Situated Comput., 2015

A Proposal of QoS-aware Power Saving Scheme for SDN-based Networks.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

2014
Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

A proposal of distributed management scheme of content key information for pure P2P networks.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

An Onomatopoeia-Based Web Music Video Searching System and Its Performance Evaluation.
Proceedings of the HCI International 2014 - Posters' Extended Abstracts, 2014

2013
A practical study on noise-tolerant PN code-based localisation attacks to internet threat monitors.
Int. J. Space Based Situated Comput., 2013

Reducing data leakage possibility resulted from eavesdropping in wireless sensor network.
Int. J. Space Based Situated Comput., 2013

A Distributed Approach to Constructing k-Hop Connected Dominating Set in Ad Hoc Networks.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

A Study on Noise-Tolerant PN Code-Based Localization Attacks to Internet Threat Monitors by Exploiting Multiple Ports.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OS.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Supporting Communication in Time of Disaster.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

2011
Enhancing Sensor Network Security by Reducing Radio-Wave Leakage.
Proceedings of the 2011 International Conference on Broadband, 2011

Evaluation of a Distributed Detecting Method for SYN Flood Attacks Using a Real Internet Trace.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
A user authenticaion scheme using multiple passphrases and its arrangement.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents.
Proceedings of the Multiagent System Technologies, 7th German Conference, 2009

2007
A high collusion-resistant approach to distributed privacy-preserving data mining.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2007

Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

A New Approach to Early Detection of an Unknown Worm.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Mining Frequent Patterns Securely in Distributed System.
IEICE Trans. Inf. Syst., 2006

An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

AWide Area Log Analyzing System Based on Mobile Agents.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

On a Watermarking Scheme for MusicXML.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

DoS Packet Filter Using DNS Information.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

A Scalable Sequential Pattern Mining Algorithm.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
Development of Security Scanner with High Portability and Usability.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
An Effective Distributed Privacy-Preserving Data Mining Algorithm.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2004

Development of Security Scanner with High Usability.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
An Efficient RP (Rendezvous Point) Replacement Mechanism for Rendezvous-Based Multicast Routing.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

2002
A Soft-Decision Iterative Decoding Algorithm Using a Top-Down and Recursive Minimum Distance Search.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

1999
A Low-Weight Trellis-Based Iterative Soft-Decision Decoding Algorithm for Binary Linear Block Codes.
IEEE Trans. Inf. Theory, 1999

1997
On bit-error probability of a concatenated coding scheme.
IEEE Trans. Commun., 1997

1994
Suboptimum decoding of decomposable block codes.
IEEE Trans. Inf. Theory, 1994

An upper bound on the effective error coefficient of two-stage decoding, and good two-level decompositions of some Reed-Muller codes.
IEEE Trans. Commun., 1994

1993
Multistage decoding of multilevel block M-PSK modulation codes and its performance analysis.
IEEE Trans. Inf. Theory, 1993

On complexity of trellis structure of linear block codes.
IEEE Trans. Inf. Theory, 1993

On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes.
IEEE Trans. Inf. Theory, 1993

1991
On multilevel block modulation codes.
IEEE Trans. Inf. Theory, 1991

On linear structure and phase rotation invariant properties of block M-PSK modulation codes.
IEEE Trans. Inf. Theory, 1991

1990
An error control system with multiple-stage forward error corrections.
IEEE Trans. Commun., 1990

A concatenated coded modulation scheme for error control.
IEEE Trans. Commun., 1990

1988
A cascaded coding scheme for error control and its performance analysis.
IEEE Trans. Inf. Theory, 1988

1986
An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11.
IEEE Trans. Inf. Theory, 1986


  Loading...