The SCEAS System
Navigation Menu

Search the dblp DataBase


Noriaki Kamiyama: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Noriaki Kamiyama, Victor O. K. Li
    Renegotiated CBR Transmission Based on Queue Length of STB in IVOD System. [Citation Graph (0, 0)][DBLP]
    ICMCS, 1997, pp:12-19 [Conf]
  2. N. Kamiyama
    Identifying high-rate flows with less memory. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2781-2785 [Conf]
  3. Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Shoichiro Asano
    A Study on Detecting Network Anomalies Using Sampled Flow Statistics. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2007, pp:81- [Conf]
  4. Tatsuya Mori, Ryoichi Kawahara, Noriaki Kamiyama, Shigeaki Harada
    Inferring Original Traffic Pattern from Sampled Flow Statistics. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2007, pp:85- [Conf]
  5. Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara
    Simple and Adaptive Identification of Superspreaders by Flow Sampling. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2481-2485 [Conf]
  6. N. Kamiyama
    Identifying High-Rate Flows with Less Memory. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  7. Noriaki Kamiyama, Tatsuya Mori
    Simple and Accurate Identification of High-Rate Flows by Packet Sampling. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  8. Noriaki Kamiyama
    Optimum Server Selection in Content Distribution Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  9. Ryoichi Kawahara, Tatsuya Mori, Keisuke Ishibashi, Noriaki Kamiyama, Takeo Abe
    Estimating Flow Rate from Sampled Packet Streams for Detection of Performance Degradation at TCP Flow Level. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  10. Network Topology Design Using Analytic Hierarchy Process. [Citation Graph (, )][DBLP]

  11. Adaptive Bandwidth Control to Handle Long-Duration Large Flows. [Citation Graph (, )][DBLP]

  12. Efficiently Constructing Candidate Set for Network Topology Design. [Citation Graph (, )][DBLP]

  13. Efficient Timeout Checking Mechanism for Traffic Control. [Citation Graph (, )][DBLP]

  14. Optimum Identification of Worm-Infected Hosts. [Citation Graph (, )][DBLP]

  15. Cost-efficient backup-plane architecture for single-hop WDM network. [Citation Graph (, )][DBLP]

  16. Profit Allocation in Coalitional VoD Service. [Citation Graph (, )][DBLP]

  17. Extracting Worm-Infected Hosts Using White List. [Citation Graph (, )][DBLP]

  18. Detection Accuracy of Network Anomalies Using Sampled Flow Statistics. [Citation Graph (, )][DBLP]

  19. Network Topology Design Using Data Envelopment Analysis. [Citation Graph (, )][DBLP]

  20. Identifying Anomalous Traffic Sources Using Flow Statistics. [Citation Graph (, )][DBLP]

  21. Connectivity and Stability at Failures in ISP Backbone Networks. [Citation Graph (, )][DBLP]

  22. A Method of Detecting Network Anomalies in Cyclic Traffic. [Citation Graph (, )][DBLP]

  23. A Method of Constructing QoS Overlay Network and Its Evaluation. [Citation Graph (, )][DBLP]

  24. Design Method of Robust Networks against Performance Deterioration during Failures. [Citation Graph (, )][DBLP]

  25. Construction of Candidate Topologies for Large-Scale Networks. [Citation Graph (, )][DBLP]

  26. Improving Deployability of Peer-Assisted CDN Platform with Incentive. [Citation Graph (, )][DBLP]

  27. Impact of topology on parallel video streaming. [Citation Graph (, )][DBLP]

Search in 0.076secs, Finished in 0.076secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002