The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nei Kato: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yuji Waizumi, Daisuke Kudo, Nei Kato, Yoshiaki Nemoto
    A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:252-259 [Conf]
  2. Yuji Waizumi, Nei Kato, Kazuki Saruta, Yoshiaki Nemoto
    High speed rough classification for handwritten characters using hierarchical learning vector quantization. [Citation Graph (0, 0)][DBLP]
    ICDAR, 1997, pp:23-27 [Conf]
  3. Akira Kanamura, Kohei Ohta, Nei Kato, Glenn Mansfield, Yoshiaki Nemoto
    Evaluation of Simple Packet Aggregation Technique for Fault Detection. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshop on Internet, 2000, pp:0-0 [Conf]
  4. Ryo Inoue, Hidehisa Nakayama, Nei Kato
    Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2006, pp:1094-1097 [Conf]
  5. Fang Sun, Shinichiro Omachi, Nei Kato, Hirotomo Aso, Shunichi Kono, Tasuku Takagi
    Two-Stage Computational Cost Reduction Algorithm Based on Mahalanobis Distance Approximations. [Citation Graph (0, 0)][DBLP]
    ICPR, 2000, pp:2696-2699 [Conf]
  6. Kohei Ohta, Takumi Mori, Nei Kato, Hideaki Sone, Glenn Mansfield, Yoshiaki Nemoto
    Divide and Conquer Technique for Network Fault Management. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 1997, pp:675-687 [Conf]
  7. Tarik Taleb, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto
    IP Traffic Load Distribution in NGEO Broadband Satellite Networks - (Invited Paper). [Citation Graph (0, 0)][DBLP]
    ISCIS, 2005, pp:113-123 [Conf]
  8. Glenn Mansfield, Kohei Ohta, Y. Takei, Nei Kato, Yasunoni Nemoto
    Towards trapping wily intruders in the large. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:34, n:4, pp:659-670 [Journal]
  9. Tarik Taleb, Nei Kato, Yoshiaki Nemoto
    On-demand media streaming to hybrid wired/wireless networks over quasi-geostationary satellite systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:47, n:2, pp:287-306 [Journal]
  10. Akira Kanamaru, Kohei Ohta, Nei Kato, Glenn Mansfield, Yoshiaki Nemoto
    A simple packet aggregation technique for fault detection. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2000, v:10, n:4, pp:215-228 [Journal]
  11. Kohei Ohta, Nei Kato, Glenn Mansfield, Yoshiaki Nemoto
    Configuring a Network Management System for Efficient Operation. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 1996, v:6, n:2, pp:108-118 [Journal]
  12. Nei Kato, Masato Suzuki, Shinichiro Omachi, Hirotomo Aso, Yoshiaki Nemoto
    A Handwritten Character Recognition System Using Directional Element Feature and Asymmetric Mahalanobis Distance. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 1999, v:21, n:3, pp:258-262 [Journal]
  13. Nei Kato, Masato Abé, Yoshiaki Nemoto
    A handwritten character recognition system using modified Mahalanobis distance. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 1997, v:28, n:1, pp:46-55 [Journal]
  14. Fang Sun, Shinichiro Omachi, Nei Kato, Hirotomo Aso
    Fast and precise discriminant function considering correlations of elements of feature vectors and its application to character recognition. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 1999, v:30, n:14, pp:33-42 [Journal]
  15. Masato Suzuki, Nei Kato, Yoshiaki Nemoto, Hiroshi Ichimura
    Discrimination of similar characters with quadratic compound Mahalanobis function. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2002, v:33, n:5, pp:11-20 [Journal]
  16. Tarik Taleb, Nei Kato, Yoshiaki Nemoto
    REFWA: an efficient and fair congestion control scheme for LEO satellite networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2006, v:14, n:5, pp:1031-1044 [Journal]
  17. Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato
    Tracing back attacks against encrypted protocols. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:121-126 [Conf]
  18. Bounpadith Kannhavong, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto, Abbas Jamalipour
    A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  19. Masaru Dobashi, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto, Abbas Jamalipour
    Traitor Tracing Technology of Streaming Contents Delivery using Traffic Pattern in Wired/Wireless Environments. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  20. Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto
    A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  21. Hiroshi Tsunoda, Umith Dharmaratn, Nei Kato, Abbas Jamalipour, Yoshiaki Nemoto
    Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  22. Tarik Taleb, Farid Naït-Abdesselam, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto
    Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  23. Tarik Taleb, Daisuke Mashimo, Abbas Jamalipour, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato
    ELB: An Explicit Load Balancing Routing Protocol for Multi-Hop NGEO Satellite Constellations. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  24. Hidehisa Nakayama, Nirwan Ansari, Abbas Jamalipour, Nei Kato
    Fault-resilient sensing in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:11-12, pp:2375-2384 [Journal]

  25. Anomaly Detection for DNS Servers Using Frequent Host Selection. [Citation Graph (, )][DBLP]


  26. Ultra-Mobile Echo Network in Health Care System. [Citation Graph (, )][DBLP]


  27. An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks. [Citation Graph (, )][DBLP]


  28. A Dynamic Service Level Negotiation Mechanism for QoS Provisioning in NGEO Satellite Networks. [Citation Graph (, )][DBLP]


  29. Combating Against Attacks on Encrypted Protocols. [Citation Graph (, )][DBLP]


  30. Tailoring ELB for Multi-Layered Satellite Networks. [Citation Graph (, )][DBLP]


  31. A Classifier of Similar Characters using Compound Mahalanobis Function based on Difference Subspace. [Citation Graph (, )][DBLP]


  32. A reliable topology for efficient key distribution in ad-hoc networks. [Citation Graph (, )][DBLP]


  33. Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  34. Exploring the security requirements for quality of service in combined wired and wireless networks. [Citation Graph (, )][DBLP]


  35. NHAG: Network-Aware Hierarchical Arrangement Graph for Application Layer Multicast in Heterogeneous Networks. [Citation Graph (, )][DBLP]


  36. A Bandwidth Aggregation-Aware QoS Negotiation Mechanism for Next-Generation Wireless Networks. [Citation Graph (, )][DBLP]


  37. A Fair and Lifetime-Maximum Routing Algorithm for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  38. A New Data Gathering Scheme Based on Set Cover Algorithm for Mobile Sinks in WSNs. [Citation Graph (, )][DBLP]


  39. On Supporting P2P-Based VoD Services over Mesh Overlay Networks. [Citation Graph (, )][DBLP]


  40. Mitigating Performance Anomaly of TFRC in Multi-Rate IEEE 802.11 Wireless LANs. [Citation Graph (, )][DBLP]


  41. A Group-Based Key Management Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  42. Analysis of the node isolation attack against OLSR-based mobile ad hoc networks. [Citation Graph (, )][DBLP]


  43. A new pre-classification method based on associative matching method. [Citation Graph (, )][DBLP]


  44. On Gateway Selection Protocol for DYMO-Based MANET. [Citation Graph (, )][DBLP]


  45. Network Application Identification Using Transition Pattern of Payload Length. [Citation Graph (, )][DBLP]


  46. Extensions of VCP to Enhance the Performance in High BDP and Wireless Networks. [Citation Graph (, )][DBLP]


  47. DP Matching Approach for Streaming Contents Detection Using Traffic Pattern. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.155secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002