The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kazuo Hashimoto: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kazunori Matsumoto, Kazuo Hashimoto
    Schema Design for Causal Law Mining from Incomplete Database. [Citation Graph (0, 0)][DBLP]
    Discovery Science, 1999, pp:92-102 [Conf]
  2. Shigeyuki Sakazawa, Yasuhiro Takishima, Yasuyuki Nakajima, M. Wada, K. Hashimoto
    Multimedia contents management and transmission system "VAST-web" and its effective transport protocol "SVFTP". [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:647-650 [Conf]
  3. Kazunori Matsumoto, Kazuo Hashimoto
    Intelligent Monitoring Method Using Time Varying Binomial Distribution Models for Pseudo-Periodic Communication Traffic. [Citation Graph (0, 0)][DBLP]
    IDA, 1999, pp:123-136 [Conf]
  4. Kazunori Matsumoto, Kazuo Hashimoto, Sadao Obana
    Design and Implementation of Real-Time Expert System for Troubleshooting in International Telephone Networks. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 1995, pp:345-352 [Conf]
  5. Kazuo Hashimoto, Kazunori Matsumoto, Norio Shiratori
    Probabilistic Modeling of Alarm Observation Delay in Network Diagnosis. [Citation Graph (0, 0)][DBLP]
    PRICAI, 2000, pp:734-744 [Conf]
  6. Kenichi Yoshida, Kazuo Hashimoto
    AI application of the Internet - Backgrounds and Issues. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2003, pp:273-275 [Conf]
  7. Keiko Aoki, Kazunori Matsumoto, Keiichiro Hoashi, Kazuo Hashimoto
    A Study of Bayesian Clustering of a Document Set Based on GA. [Citation Graph (0, 0)][DBLP]
    SEAL, 1998, pp:260-267 [Conf]
  8. Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto
    Document filtering method using non-relevant information profile. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2000, pp:176-183 [Conf]
  9. Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto
    Query Expansion Based on Predictive Algorithms for Collaborative Filtering. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2001, pp:414-415 [Conf]
  10. Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto
    Query Expansion Method Based on Word Contribution (poster abstract). [Citation Graph (0, 0)][DBLP]
    SIGIR, 1999, pp:303-304 [Conf]
  11. Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto
    TREC-7 Experiments: Query Expansion Method Based on Word Contribution. [Citation Graph (0, 0)][DBLP]
    TREC, 1998, pp:373-381 [Conf]
  12. Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto
    Experiments on the TREC-8 Filtering Track. [Citation Graph (0, 0)][DBLP]
    TREC, 1999, pp:- [Conf]
  13. Keiichiro Hoashi, Kazunori Matsumoto, Naomi Inoue, Kazuo Hashimoto, Takashi Hasegawa, Katsuhiko Shirai
    Experiments on the TREC-9 Filtering Track. [Citation Graph (0, 0)][DBLP]
    TREC, 2000, pp:- [Conf]
  14. S. Hashimoto, Seinosuke Narita, Hironori Kasahara, Katsuhiko Shirai, Atsuo Takanishi, Shigeki Sugano, Jin'ichi Yamaguchi, H. Sawada, Hideaki Takanobu, Koji Shibuya, Toshio Morita, T. Kurata, N. Onoe, K. Ouchi, T. Noguchi, Yosihiro Niwa, Seikon Nagayama, H. Tabayashi, I. Matsui, Motoki Obata, H. Matsuzaki, A. Murasugi, T. Kobayashi, S. Haruyama, Tetsuhiko Okada, Y. Hidaki, Y. Taguchi, Keiichiro Hoashi, E. Morikawa, Y. Iwano, D. Araki, J. Suzuki, M. Yokoyama, I. Dawa, Daisuke Nishino, Sadatoshi Inoue, T. Hirano, Eiji Soga, S. Gen, T. Yanada, K. Kato, S. Sakamoto, Y. Ishii, Shigeru Matsuo, Y. Yamamoto, Kensuke Sato, T. Hagiwara, T. Ueda, N. Honda, Kazuo Hashimoto, T. Hanamoto, S. Kayaba, T. Kojima, Hiroyasu Iwata, H. Kubodera, R. Matsuki, T. Nakajima, K. Nitto, D. Yamamoto, Y. Kamizaki, S. Nagaike, Y. Kunitake, Satoshi Morita
    Humanoid Robots in Waseda University-Hadaly-2 and WABIAN. [Citation Graph (0, 0)][DBLP]
    Auton. Robots, 2002, v:12, n:1, pp:25-38 [Journal]
  15. Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato
    Tracing back attacks against encrypted protocols. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:121-126 [Conf]
  16. Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto
    A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  17. Tarik Taleb, Farid Naït-Abdesselam, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto
    Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  18. Tarik Taleb, Daisuke Mashimo, Abbas Jamalipour, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato
    ELB: An Explicit Load Balancing Routing Protocol for Multi-Hop NGEO Satellite Constellations. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  19. A New Authentication Method with Distributed Hash Table for P2P Network. [Citation Graph (, )][DBLP]


  20. Anomaly Detection for DNS Servers Using Frequent Host Selection. [Citation Graph (, )][DBLP]


  21. Decision Tree Induction from Numeric Data Stream. [Citation Graph (, )][DBLP]


  22. Design of Physical Activity Recommendation System. [Citation Graph (, )][DBLP]


  23. Multi-Source Streaming in Next Generation Mobile Communication Systems. [Citation Graph (, )][DBLP]


  24. An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks. [Citation Graph (, )][DBLP]


  25. A Dynamic Service Level Negotiation Mechanism for QoS Provisioning in NGEO Satellite Networks. [Citation Graph (, )][DBLP]


  26. Combating Against Attacks on Encrypted Protocols. [Citation Graph (, )][DBLP]


  27. Learning Higher Accuracy Decision Trees from Concept Drifting Data Streams. [Citation Graph (, )][DBLP]


  28. On supporting handoff management for multi-source video streaming in mobile communication systems. [Citation Graph (, )][DBLP]


  29. Multi-class Support Vector Machine Simplification. [Citation Graph (, )][DBLP]


  30. Computing Longest Common Substring and All Palindromes from Compressed Strings. [Citation Graph (, )][DBLP]


  31. A Novel Web Usage Mining Method - Mining and Clustering of DAG Access Patterns Considering Page Browsing Time. [Citation Graph (, )][DBLP]


  32. A Bandwidth Aggregation-Aware QoS Negotiation Mechanism for Next-Generation Wireless Networks. [Citation Graph (, )][DBLP]


  33. A Fair and Lifetime-Maximum Routing Algorithm for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  34. Route Optimization for Large Scale Network Mobility Assisted by BGP. [Citation Graph (, )][DBLP]


  35. A Group-Based Key Management Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  36. A Flexible and Secure Access Control Scheme Using Social Behavior in the Real World. [Citation Graph (, )][DBLP]


  37. A Fair Load Sharing Scheme for Multi-source Multimedia Overlay Application Layer Multicast. [Citation Graph (, )][DBLP]


  38. Hash-Based Distributed Public Key Infrastructure for Ubiquitous Environments. [Citation Graph (, )][DBLP]


  39. An Efficient Collision Avoidance Strategy for ITS systems. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002