The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Toyoo Takata: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tsuyoshi Chiba, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata
    DoS Packet Filter Using DNS Information. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:116-131 [Conf]
  2. Atsumu Watanabe, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata
    On a Watermarking Scheme for MusicXML. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:894-898 [Conf]
  3. Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata
    Development of Security Scanner with High Usability. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:139-144 [Conf]
  4. Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata
    Development of Security Scanner with High Portability and Usability. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:407-410 [Conf]
  5. Yuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata
    A New Approach to Early Detection of an Unknown Worm. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:194-198 [Conf]
  6. Takashi Hamma, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata
    An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2006, pp:66-70 [Conf]
  7. Bhed Bahadur Bista, Goutam Chakraborty, Toyoo Takata
    An Efficient RP (Rendezvous Point) Replacement Mechanism for Rendezvous-Based Multicast Routing. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:514-518 [Conf]
  8. Takuya Fukasawa, Jiahong Wang, Toyoo Takata, Masatoshi Miyazaki
    An Effective Distributed Privacy-Preserving Data Mining Algorithm. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2004, pp:320-325 [Conf]
  9. Takashi Katoh, Hiroki Kuzuno, Takuya Kawahara, Atsumu Watanabe, Yushi Nakai, Bhed Bahadur Bista, Toyoo Takata
    AWide Area Log Analyzing System Based on Mobile Agents. [Citation Graph (0, 0)][DBLP]
    CIMCA/IAWTIC, 2006, pp:26- [Conf]
  10. Toru Fujiwara, Toyoo Takata, Tadao Kasami, Shu Lin
    An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1986, v:32, n:5, pp:706-0 [Journal]
  11. Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
    On linear structure and phase rotation invariant properties of block M-PSK modulation codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:1, pp:164-0 [Journal]
  12. Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
    On multilevel block modulation codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:4, pp:965-975 [Journal]
  13. Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
    On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:1, pp:242-0 [Journal]
  14. Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin
    On complexity of trellis structure of linear block codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:3, pp:1057-0 [Journal]
  15. Tadao Kasami, Toru Fujiwara, Toyoo Takata, Shu Lin
    A cascaded coding scheme for error control and its performance analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1988, v:34, n:3, pp:448-462 [Journal]
  16. Takuya Koumoto, Toyoo Takata, Tadao Kasami, Shu Lin
    A Low-Weight Trellis-Based Iterative Soft-Decision Decoding Algorithm for Binary Linear Block Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:731-741 [Journal]
  17. Toyoo Takata, Satoshi Ujita, Tadao Kasami, Shu Lin
    Multistage decoding of multilevel block M-PSK modulation codes and its performance analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:4, pp:1204-1218 [Journal]
  18. Toyoo Takata, Y. Yamashita, Toru Fujiwara, Tadao Kasami, Shu Lin
    Suboptimum decoding of decomposable block codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:5, pp:1392-1405 [Journal]
  19. Shintaro Urabe, Jiahong Wang, Eiichiro Kodama, Toyoo Takata
    A high collusion-resistant approach to distributed privacy-preserving data mining. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2007, pp:307-312 [Conf]
  20. Michitaka Yoshimoto, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata
    Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:127-136 [Conf]

  21. A Scalable Sequential Pattern Mining Algorithm. [Citation Graph (, )][DBLP]


  22. A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System. [Citation Graph (, )][DBLP]


  23. A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents. [Citation Graph (, )][DBLP]


Search in 0.017secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002