The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Toshio Hirotsu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Shin-ya Sato, Toshiharu Sugawara
    Simple but efficient collaboration in a complex competitive situation. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2003, pp:1042-1043 [Conf]
  2. Toshiharu Sugawara, Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Shigemi Aoyagi, Toshihiro Takada
    Reusing Coordination and Negotiation Strategies in Multi-Agent Systems for Ubiquitous Network Environment. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2004, pp:496-503 [Conf]
  3. Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda, Shin-ya Sato, Osamu Akashi
    Total performance by local agent selection strategies in multi-agent systems. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2006, pp:601-608 [Conf]
  4. Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda, Toshihiro Takada
    Predicting possible conflicts in hierarchical planning for multi-agent systems. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2005, pp:813-820 [Conf]
  5. Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Shin-ya Sato, Toshiharu Sugawara
    How Collective Intelligence Emerge in Complex Environment? [Citation Graph (0, 0)][DBLP]
    BioADIT, 2004, pp:484-495 [Conf]
  6. Osamu Akashi, Atsushi Terauchi, Kensuke Fukuda, Toshio Hirotsu, Mitsuru Maruyama, Toshiharu Sugawara
    Detection and Diagnosis of Inter-AS Routing Anomalies by Cooperative Intelligent Agents. [Citation Graph (0, 0)][DBLP]
    DSOM, 2005, pp:181-192 [Conf]
  7. Kensuke Fukuda, Shin-ya Sato, Osamu Akashi, Toshio Hirotsu, Satoshi Kurihara, Toshiharu Sugawara
    On the Use of Hierarchical Power-law Network Topology for Server Selection and Allocation in Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:81-88 [Conf]
  8. Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara, Shin-ya Sato, Osamu Akashi, Toshiharu Sugawara
    Dependency of Network Structures in Agent Selection and Deployment. [Citation Graph (0, 0)][DBLP]
    IAT, 2006, pp:37-44 [Conf]
  9. Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Shin-ya Sato, Satoshi Kurihara
    Multi-Agent Systems Performance by Adaptive/Non-Adaptive Agent Selection. [Citation Graph (0, 0)][DBLP]
    IAT, 2006, pp:555-559 [Conf]
  10. Toshio Hirotsu, Hiroko Fujii, Mario Tokoro
    A Multiversion Concurrent Object Model for Distributed and Multiuser Environments. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1995, pp:271-278 [Conf]
  11. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato, Kozo Itano
    Name-Level Approach for Egress Network Access Control. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:284-296 [Conf]
  12. Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Toshiharu Sugawara
    Time and Space Correlation in BGP Messages. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:215-222 [Conf]
  13. Koji Sato, Toshio Hirotsu, Kensuke Fukuda, Osamu Akashi, Toshiharu Sugawara
    Clea: A framework for the Coordination of Applications and Networks. [Citation Graph (0, 0)][DBLP]
    JCIS, 2002, pp:948-951 [Conf]
  14. Kenichi Kourai, Toshio Hirotsu, Koji Sato, Osamu Akashi, Kensuke Fukuda, Toshiharu Sugawara, Shigeru Chiba
    Secure and Manageable Virtual Private Networks for End-users. [Citation Graph (0, 0)][DBLP]
    LCN, 2003, pp:385-394 [Conf]
  15. Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Shigemi Aoyagi, Toshihiro Takada, Toshiharu Sugawara
    Multi-agent Human-Environment Interaction Framework for the Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    MMAS, 2004, pp:217-223 [Conf]
  16. Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Shin-ya Sato, Satoshi Kurihara
    Adaptive Agent Selection in Large-Scale Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    PRICAI, 2006, pp:818-822 [Conf]
  17. Osamu Akashi, Toshio Hirotsu, Koji Sato, Kenichi Kourai, Mitsuro Maruyama, Toshiharu Sugawara
    Agents Support for Flexible Inter-AS Policy Control. [Citation Graph (0, 0)][DBLP]
    SAINT Workshops, 2003, pp:294-298 [Conf]
  18. Péter Surányi, Hirotake Abe, Toshio Hirotsu, Yasushi Shinjo, Kazuhiko Kato
    General Virtual Hosting via Lightweight User-Level Virtualization. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:229-236 [Conf]
  19. Toshihiro Takada, Satoshi Kurihara, Toshio Hirotsu, Toshiharu Sugawara
    Proximity Mining: Finding Proximity using Sensor Data History. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2003, pp:129-138 [Conf]
  20. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato
    Capability-Based Egress Network Access Control for Transferring Access Rights. [Citation Graph (0, 0)][DBLP]
    ICITA (2), 2005, pp:488-495 [Conf]
  21. Toshio Hirotsu, Hiroko Fujii, Mario Tokoro
    A multiversion mechanism for intra-object concurrency. [Citation Graph (0, 0)][DBLP]
    Distributed Systems Engineering, 1995, v:2, n:4, pp:192-201 [Journal]
  22. Osamu Akashi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara
    Analysis of Diagnostic Capability for Hijacked Route Problem. [Citation Graph (0, 0)][DBLP]
    IPOM, 2007, pp:37-48 [Conf]
  23. Shin-ya Sato, Kensuke Fukuda, Satoshi Kurihara, Toshio Hirotsu, Toshiharu Sugawara
    Generating Extensional Definitions of Concepts from Ostensive Definitions by Using Web. [Citation Graph (0, 0)][DBLP]
    WISE, 2007, pp:583-592 [Conf]
  24. Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato
    Capability-based egress network access control by using DNS server. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:4, pp:1275-1282 [Journal]

  25. Analysis of Anomalies on a Virtualized Network Testbed. [Citation Graph (, )][DBLP]


  26. A PCA Analysis of Daily Unwanted Traffic. [Citation Graph (, )][DBLP]


  27. Conflict estimation of abstract plans for multiagent systems. [Citation Graph (, )][DBLP]


  28. Adaptive manager-side control policy in contract net protocol for massively multi-agent systems. [Citation Graph (, )][DBLP]


  29. Application of a Massively Multi-Agent System to Internet Routing Management. [Citation Graph (, )][DBLP]


  30. Effect of probabilistic task allocation based on statistical analysis of bid values. [Citation Graph (, )][DBLP]


  31. Controling Contract Net Protocol by Local Observation for Large-Scale Multi-Agent Systems. [Citation Graph (, )][DBLP]


  32. Performance Improvement by Means of Collaboration between Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  33. Adaptive probabilistic task allocation in large-scale multi-agent systems and its evaluation. [Citation Graph (, )][DBLP]


  34. Co-occurrence Analysis Focused on Blogger Communities. [Citation Graph (, )][DBLP]


  35. Estimating Relevance of Items on Basis of Proximity of User Groups on Blogspace. [Citation Graph (, )][DBLP]


  36. Estimation of Sensor Network Topology Using Ant Colony Optimization. [Citation Graph (, )][DBLP]


  37. Performance variation due to interference among a large number of self-interested agents. [Citation Graph (, )][DBLP]


  38. Correlation Among Piecewise Unwanted Traffic Time Series. [Citation Graph (, )][DBLP]


  39. Probabilistic Award Strategy for Contract Net Protocol in Massively Multi-agent Systems. [Citation Graph (, )][DBLP]


  40. Effective Selection of Abstract Plans for Multi-Agent Systems. [Citation Graph (, )][DBLP]


  41. Policy-based BGP-control architecture for inter-AS routing adjustment. [Citation Graph (, )][DBLP]


Search in 0.077secs, Finished in 0.080secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002