The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yuko Murayama: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Masato Terada, Yuko Murayama
    User Access Domain Management Systems - ADAMS. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:50-61 [Conf]
  2. Yuko Murayama
    The Problems in Knowledge Discovery in Computer Networks. [Citation Graph (0, 0)][DBLP]
    CODAS, 1996, pp:293-0 [Conf]
  3. Yuko Murayama
    Configuration Detection as a Problem of Knowledge Discovery in Computer Networks. [Citation Graph (0, 0)][DBLP]
    CoopIS, 1997, pp:47-55 [Conf]
  4. Keishi Suzumura, Natsuko Hikage, Yuko Murayama
    A chat system with knock-on-the-door sound and shadow. [Citation Graph (0, 0)][DBLP]
    Computer Supported Acitivity Coordination, 2004, pp:81-90 [Conf]
  5. Yuko Murayama, Hiromi Gondo, Yasunari Nakamoto, Norihisa Segawa, Masatoshi Miyazaki
    Visualization of Time in a Message Board System on WWW for On-Door Communication. [Citation Graph (0, 0)][DBLP]
    HICSS, 2001, pp:- [Conf]
  6. Yuko Murayama, Natsuko Hikage, Carl Hauser, Basabi Chakraborty, Norihisa Segawa
    An Anshin Model for the Evaluation of the Sense of Security. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  7. Norihisa Segawa, Yuko Murayama, Masatoshi Miyazaki
    Information Hiding with a Handwritten Message in Vector-Drawing Codes. [Citation Graph (0, 0)][DBLP]
    HICSS, 2002, pp:306- [Conf]
  8. Norihisa Segawa, Yuko Murayama, Yasunari Nakamoto, Hiromi Gondo, Masatoshi Miyazaki
    Evaluation of the Handwriting Function of an ``On-Door'' Communication System. [Citation Graph (0, 0)][DBLP]
    HICSS, 2001, pp:- [Conf]
  9. Yasuo Ebara, Yukinori Goto, Toshihiko Shimokawa, Shinji Yamane, Kenzi Watanabe, Yuko Murayama
    The Project of Virtual Laboratory for Informal Communication on Gigabit Network. [Citation Graph (0, 0)][DBLP]
    ICEIS (4), 2004, pp:176-181 [Conf]
  10. Jiahong Wang, Yuuhei Tsutaya, Norihisa Segawa, Shinji Yamane, Yuko Murayama, Masatoshi Miyazaki, Hironobu Suzuki
    Approaches to Balancing Data Load of Shared-Nothing Clusters and Their Performance Comparison. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2002, pp:293-300 [Conf]
  11. Yuko Murayama, Vijay Varadharajan
    Message from the IWSEC Workshop Co-Chairs. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:132-0 [Conf]
  12. Kensuke Arakawa, Yasushi Ichikawa, Yuko Murayama
    A Novel Internet Radio Service for Personal Communications; The Private Channel Service. [Citation Graph (0, 0)][DBLP]
    PWC, 2002, pp:79-86 [Conf]
  13. Keishi Suzumura, Hiromi Gondo, Yuko Murayama
    Tools for On-Door Communications on WWW. [Citation Graph (0, 0)][DBLP]
    PWC, 2002, pp:87-94 [Conf]
  14. Steve R. Wilbur, Jon Crowcroft, Yuko Murayama
    MAC Layer Security Measures in Local Area Networks. [Citation Graph (0, 0)][DBLP]
    LANSEC, 1989, pp:53-65 [Conf]
  15. Norihisa Segawa, Yuko Murayama, Yasunari Nakamoto, Hiromi Gondo, Masatoshi Miyazaki
    A message board on WWW for on-door communication. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia (2), 1999, pp:187-190 [Conf]
  16. Yasushi Ichikawa, Kensuke Arakawa, Keisuke Wano, Yuko Murayama
    Issues in Internet Radio. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2002, pp:1129-1134 [Conf]
  17. Masato Terada, Yuko Murayama, Glenn Mansfield
    Access Control for Inter-Organizational Computer Network Environment. [Citation Graph (0, 0)][DBLP]
    WWCA, 1997, pp:394-409 [Conf]
  18. Shinji Yamane, Jiahong Wang, Hironobu Suzuki, Norihisa Segawa, Yuko Murayama
    Rethinking OpenPGP PKI and OpenPGP Public Keyserver [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]

  19. Development Concept for and Trial Application of a "Mulutiplex Risk Communicator". [Citation Graph (, )][DBLP]


  20. Anshin as Emotional Trust: A Comparison Study between U.S. and Japanese Non-computer-science Students. [Citation Graph (, )][DBLP]


  21. Exploratory survey on an Evaluation Model for a Sense of Security. [Citation Graph (, )][DBLP]


  22. A user survey on the sense of security, Anshin. [Citation Graph (, )][DBLP]


  23. The Structure of the Sense of Security, Anshin. [Citation Graph (, )][DBLP]


  24. Towards an Interface causing Discomfort for Security: A User Survey on the Factors of Discomfort. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002