The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Takuo Nakashima: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Takuo Nakashima
    Experimental Analysis of Propagation Properties Implementing the Path-Based Measurement. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:243-248 [Conf]
  2. Takuo Nakashima
    Time Scaling Analysis of Jitter Propagation Property. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:541-546 [Conf]
  3. Takuo Nakashima, Toshinori Sueyoshi
    Self-Similar Property for TCP Traffic under the Bottleneck Restrainment. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:228-233 [Conf]
  4. Takuo Nakashima
    Statistical Analysis of Propagation Properties with Heavy-Tailedness. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2004, pp:328-334 [Conf]
  5. Takuo Nakashima, Syuichi Ihara
    An Experimental Evaluation of the Total Cost of NTP Topology. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2001, pp:240-245 [Conf]
  6. Takuo Nakashima
    Delay Propagation Properties with Self-similarity. [Citation Graph (0, 0)][DBLP]
    ICPADS (1), 2005, pp:509-515 [Conf]
  7. Takuo Nakashima, Mamoru Tsuichihara
    Stability in Web Server Performance with Heavy-Tailed Distribution. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:575-581 [Conf]
  8. Takuo Nakashima, Shunsuke Oshima
    A Detective Method for SYN Flood Attacks. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:48-51 [Conf]
  9. Takuo Nakashima, Akari Ono
    Property Analysis of Heavy-tailed Traffic by Simulator. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:44-47 [Conf]
  10. Takuo Nakashima
    Time Scaling Property on Edge Routers. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:60-63 [Conf]
  11. Takuo Nakashima
    Self-Similar Property for TCP Traffic under the Bottleneck Bandwidth Restrainment. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:193-196 [Conf]

  12. Analysis of Queueing Property for Self-Similar Traffic. [Citation Graph (, )][DBLP]


  13. Queue Length Behavior on Restricted Link Under Bursty Self-similar TCP Traffic. [Citation Graph (, )][DBLP]


  14. Flooding Features for the AODV Protocol. [Citation Graph (, )][DBLP]


  15. Performance Estimation of TCP under SYN Flood Attacks. [Citation Graph (, )][DBLP]


  16. Extraction of Characteristics of Anomaly Accessed IP Packets by the Entropy-Based Analysis. [Citation Graph (, )][DBLP]


  17. Extraction of Characteristics of Anomaly Accessed IP Packets Using Chi-square Method. [Citation Graph (, )][DBLP]


  18. Early DoS/DDoS Detection Method using Short-term Statistics. [Citation Graph (, )][DBLP]


Search in 0.011secs, Finished in 0.012secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002