Yasuyuki Tanaka

Orcid: 0000-0003-3020-9908

According to our database1, Yasuyuki Tanaka authored at least 25 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
The Contiki-NG open source operating system for next generation IoT devices.
SoftwareX, 2022

6TiSCH Scheduling Function Design Suite founded on Contiki-NG.
J. Inf. Process., 2022

YSF: A 6TiSCH Scheduling Function Minimizing Latency of Data Gathering in IIoT.
IEEE Internet Things J., 2022

2021
Efficient RPL Tree Construction Using Passive Link Quality Estimation.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Accelerating 6TiSCH Network Formation.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

2020
Trace-based simulation for 6TiSCH.
Internet Technol. Lett., 2020

Demo: Blink - Room-Level Localization Using SmartMesh IP.
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020

2019
Optimal Number of Message Transmissions for Probabilistic Guarantee of Latency in the IoT.
Sensors, 2019

Simulating 6TiSCH networks.
Trans. Emerg. Telecommun. Technol., 2019

6LoWPAN Fragment Forwarding.
IEEE Commun. Stand. Mag., 2019

SeedsMiner: Accurate URL Blacklist-Generation Based on Efficient OSINT Seed Collection.
Proceedings of the 2019 IEEE/WIC/ACM International Conference on Web Intelligence, 2019

Demo: Simulating a 6TiSCH Network using Connectivity Traces from Testbeds.
Proceedings of the IEEE INFOCOM 2019, 2019

Optimized Scheduling for Time-Critical Industrial IoT.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
On the Impact of WiFi on 2.4 GHz Industrial IoT Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

2017
Analysis of malware download sites by focusing on time series variation of malware.
J. Comput. Sci., 2017

Suspicious FQDN Evaluation based on Variations in Malware Download URLs.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Analysis of malware download sites by focusing on time series variation of malware.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Evaluation of diagnosis support methods in program debugging by trace analysis: An exploratory study.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2014
n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the Network.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

Continuous Product-Focused Project Monitoring with Trend Patterns and GQM.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

Initial Industrial Experience of GQM-Based Product-Focused Project Monitoring with Trend Patterns.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

Predicting Time Range of Development Based on Generalized Software Reliability Model.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2012
A security architecture for communication between smart meters and HAN devices.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

2006
PMPATH: A Policy Routing System for Multihomed End-Hosts.
IEICE Trans. Inf. Syst., 2006

AMS: An Adaptive TCP Bandwidth Aggregation Mechanism for Multi-homed Mobile Hosts.
IEICE Trans. Inf. Syst., 2006


  Loading...