The SCEAS System
Navigation Menu

Search the dblp DataBase


Youki Kadobayashi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Omar Ismail, Masashi Etoh, Youki Kadobayashi, Suguru Yamaguchi
    A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:145-151 [Conf]
  2. Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi
    SPS: A Simple Filtering Algorithm to Thwart Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    AINTEC, 2005, pp:195-209 [Conf]
  3. Yuko Mizuno-Matsumoto, Susumu Date, Takeshi Kaishima, Youki Kadobayashi, Shinji Shimojo
    A Grid Application for an Evaluation of Brain Function using Independent Component Analysis (ICA). [Citation Graph (0, 0)][DBLP]
    CCGRID, 2002, pp:111-0 [Conf]
  4. Yukio Okada, Kenji Masui, Youki Kadobayashi
    Proposal of Social Internetworking. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2005, pp:114-124 [Conf]
  5. Hiroaki Hazeyama, Youki Kadobayashi, Daisuke Miyamoto, Masafumi Oe
    An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:378-385 [Conf]
  6. Shigeru Kashihara, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi
    Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks. [Citation Graph (0, 0)][DBLP]
    IWDC, 2003, pp:174-183 [Conf]
  7. Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi
    A Fast Polling I/O Implementation with Real-time Signals. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:317-322 [Conf]
  8. Takuji Iimura, Hiroaki Hazeyama, Youki Kadobayashi
    Zoned federation of game servers: a peer-to-peer approach to scalable multi-player online games. [Citation Graph (0, 0)][DBLP]
    NETGAMES, 2004, pp:116-120 [Conf]
  9. Eiji Kawai, Youki Kadobayashi, Suguru Yamaguchi
    Improving scalability of processor utilization on heavily-loaded servers with real-time scheduling. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2004, pp:134-140 [Conf]
  10. Naoto Morishima, Akimichi Ogawa, Keijiro Ehara, Youki Kadobayashi
    Field-Trial of Dynamic SLA in Diffserv-Capable Network. [Citation Graph (0, 0)][DBLP]
    QofIS, 2000, pp:117-128 [Conf]
  11. Youki Kadobayashi
    Achieving Heterogeneity and Fairness in Kademlia. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2004, pp:546-551 [Conf]
  12. Shigeru Kashihara, Takashi Nishiyama, Katsuyoshi Iida, Hiroyuki Koga, Youki Kadobayashi, Suguru Yamaguchi
    Path Selection Using Active Measurement in Multi-Homed Wireless Networks. [Citation Graph (0, 0)][DBLP]
    SAINT, 2004, pp:273-276 [Conf]
  13. Masafumi Oe, Youki Kadobayashi, Suguru Yamaguchi
    An implementation of a hierarchical IP traceback architecture. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2003, pp:250-253 [Conf]
  14. Shigeki Takeuchi, Hiroyuki Koga, Katsuyoshi Iida, Youki Kadobayashi, Suguru Yamaguchi
    Performance Evaluations of DCCP for Bursty Traffic in Real-Time Applications. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:142-149 [Conf]
  15. Teruaki Yokoyama, Shigeru Kashihara, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi
    A Generic API for Retrieving Human-Oriented Information from Social Network Services. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2007, pp:33- [Conf]
  16. Mitsuaki Akiyama, Takanori Kawamoto, Masayoshi Shimamura, Teruaki Yokoyama, Youki Kadobayashi, Suguru Yamaguchi
    A Proposal of Metrics for Botnet Detection Based on Its Cooperative Behavior. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2007, pp:82- [Conf]
  17. Yukio Okada, Hiroaki Hazeyama, Youki Kadobayashi
    Proposal of Constructing PKI on Overlay Network. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2007, pp:64- [Conf]
  18. Kenji Masui, Youki Kadobayashi
    N-TAP: A Platform of Large-Scale Distributed Measurement for Overlay Network Applications. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2007, pp:60- [Conf]
  19. Yusuke Doi, Youki Kadobayashi, Kenji Saito
    Message from the Organizers of the Workshop on Dependable and Sustainable Peer-to-Peer Systems (DAS-P2P 2007). [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2007, pp:- [Conf]
  20. Mio Suzuki, Hiroaki Hazeyama, Youki Kadobayashi
    Expediting experiments across testbeds with AnyBed: A testbed-independent topology configuration tool. [Citation Graph (0, 0)][DBLP]
    TRIDENTCOM, 2006, pp:- [Conf]
  21. Yuko Mizuno-Matsumoto, Susumu Date, Yuji Tabuchi, Shinichi Tamura, Yoshinobu Sato, Reza Aghaeizadeh Zoroofi, Shinji Shimojo, Youki Kadobayashi, Haruyuki Tatsumi, Hiroki Nogawa, Kazuhiro Shinosaki, Masatoshi Takeda, Tsuyoshi Inouye, Hideo Miyahara
    Telemedicine for evaluation of brain function by a metacomputer. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Technology in Biomedicine, 2000, v:4, n:2, pp:165-172 [Journal]
  22. Kenji Masui, Youki Kadobayashi
    A Role-Based Peer-to-Peer Approach to Application-Oriented Measurement Platforms. [Citation Graph (0, 0)][DBLP]
    AINTEC, 2007, pp:184-198 [Conf]
  23. Ruo Ando, Youki Kadobayashi, Youichi Shinoda
    Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:131-143 [Conf]
  24. Kenji Masui, Youki Kadobayashi
    Bridging the Gap Between PAMs and Overlay Networks: A Framework-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    PAM, 2007, pp:265-268 [Conf]

  25. Design of an FDB based Intra-domain Packet Traceback System. [Citation Graph (, )][DBLP]

  26. An Independent Evaluation of Web Timing Attack and its Countermeasure. [Citation Graph (, )][DBLP]

  27. Wireless Measurement Framework to Survey an Area with Required Communication Quality. [Citation Graph (, )][DBLP]

  28. Hardening Botnet by a Rational Botmaster. [Citation Graph (, )][DBLP]

  29. Spanning SVM Tree for Personalized Transductive Learning. [Citation Graph (, )][DBLP]

  30. Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly. [Citation Graph (, )][DBLP]

  31. An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites. [Citation Graph (, )][DBLP]

  32. AdaIndex: An Adaptive Index Structure for Fast Similarity Search in Metric Spaces. [Citation Graph (, )][DBLP]

  33. String Kernel Based SVM for Internet Security Implementation. [Citation Graph (, )][DBLP]

  34. Hierarchical Core Vector Machines for Network Intrusion Detection. [Citation Graph (, )][DBLP]

  35. HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites. [Citation Graph (, )][DBLP]

  36. A Storage Efficient Redactable Signature in the Standard Model. [Citation Graph (, )][DBLP]

  37. Seamless VoWLAN Handoff Management based on Estimation of AP Queue Length and Frame Retries. [Citation Graph (, )][DBLP]

  38. Experiences in emulating 10K AS topology with massive VM multiplexing. [Citation Graph (, )][DBLP]

  39. Outfitting an Inter-AS Topology to a Network Emulation TestBed for Realistic Performance Tests of DDoS Countermeasures. [Citation Graph (, )][DBLP]

  40. An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. [Citation Graph (, )][DBLP]

  41. Blink: Large-scale P2P network monitoring and visualization system using VM introspection. [Citation Graph (, )][DBLP]

Search in 0.039secs, Finished in 0.040secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002