The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ken-ichi Baba: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Naoki Wakamiya, Ken-ichi Baba, Masayuki Murata, Hideo Miyahara
    Performance Analysis of Traffic Control Methods in Multimedia ATM LAN. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1995, pp:1027-1036 [Conf]
  2. Kenta Yasukawa, Ken-ichi Baba, Katsunori Yamaoka
    Concept of Admission Control in Packet Switching Networks Based on Tentative Accommodation of Incoming Flows. [Citation Graph (0, 0)][DBLP]
    IWQoS, 2005, pp:349-352 [Conf]
  3. Hirohisa Nakamoto, Ken-ichi Baba, Masayuki Murata
    Shared Memory Access Method for a lambda Computing Environment. [Citation Graph (0, 0)][DBLP]
    OpNeTec, 2004, pp:210-217 [Conf]
  4. Masaaki Noro, Takahiro Kikuchi, Ken-ichi Baba, Hideki Sunahara, Shinji Shimojo
    QoS Support for VoIP Traffic to Prepare Emergency. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2004, pp:229-235 [Conf]
  5. Toyokazu Akiyama, Yuuichi Teranishi, Shingo Okamura, Eisaku Sakane, Go Hasegawa, Ken-ichi Baba, Hirotaka Nakano, Shinji Shimojo
    A Report of Campus-Wide IT Authentication Platform System Development in Osaka University. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2007, pp:35- [Conf]
  6. Kazunori Nozaki, Masaaki Noro, Masashi Nakagawa, Susumu Date, Ken-ichi Baba, Steven Peltier, Toshihiro Kawaguchi, Toyokazu Akiyama, Hiroo Tamagawa, Yohsuke Tanaka, Shinji Shimojo
    Analytics challenge - Computational oral and speech science on e-science infrastructures. [Citation Graph (0, 0)][DBLP]
    SC, 2006, pp:298- [Conf]

  7. Performance Evaluation of Advanced High-Speed Data Transfer Methods in Long-Distance Broadband Networks. [Citation Graph (, )][DBLP]


  8. Evaluation of OCDM-Switching and Code Conversion for All-Optical End-to-End Path Provisioning in Multi-granularity Networks. [Citation Graph (, )][DBLP]


  9. Design and implementation of openMP library for lambda computing environment. [Citation Graph (, )][DBLP]


  10. A Dynamic Window Control Method of Grid Middleware for Volume Data Transfer to Make the Best Use of Reservation Bandwidth. [Citation Graph (, )][DBLP]


  11. An Authentication System Development in Application of Grid Middleware to a Nationwide Joint-Use Environment for Computing. [Citation Graph (, )][DBLP]


  12. Proposal of an Initial Route Establishment Method in Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  13. Theoretical Analysis of Difference Between Edge-Based and Core-Node-Supported TACCS. [Citation Graph (, )][DBLP]


  14. Impact of MAI Noise Cycle Attack on OCDM-Based Optical Networks and its Diagnostic/Mitigation Algorithm. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002