Search the dblp DataBase
Nei Kato :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yuji Waizumi , Daisuke Kudo , Nei Kato , Yoshiaki Nemoto A New Network Anomaly Detection Technique Based on Per-Flow and Per-Service Statistics. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:252-259 [Conf ] Yuji Waizumi , Nei Kato , Kazuki Saruta , Yoshiaki Nemoto High speed rough classification for handwritten characters using hierarchical learning vector quantization. [Citation Graph (0, 0)][DBLP ] ICDAR, 1997, pp:23-27 [Conf ] Akira Kanamura , Kohei Ohta , Nei Kato , Glenn Mansfield , Yoshiaki Nemoto Evaluation of Simple Packet Aggregation Technique for Fault Detection. [Citation Graph (0, 0)][DBLP ] ICDCS Workshop on Internet, 2000, pp:0-0 [Conf ] Ryo Inoue , Hidehisa Nakayama , Nei Kato Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection. [Citation Graph (0, 0)][DBLP ] ICPR (2), 2006, pp:1094-1097 [Conf ] Fang Sun , Shinichiro Omachi , Nei Kato , Hirotomo Aso , Shunichi Kono , Tasuku Takagi Two-Stage Computational Cost Reduction Algorithm Based on Mahalanobis Distance Approximations. [Citation Graph (0, 0)][DBLP ] ICPR, 2000, pp:2696-2699 [Conf ] Kohei Ohta , Takumi Mori , Nei Kato , Hideaki Sone , Glenn Mansfield , Yoshiaki Nemoto Divide and Conquer Technique for Network Fault Management. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 1997, pp:675-687 [Conf ] Tarik Taleb , Abbas Jamalipour , Nei Kato , Yoshiaki Nemoto IP Traffic Load Distribution in NGEO Broadband Satellite Networks - (Invited Paper). [Citation Graph (0, 0)][DBLP ] ISCIS, 2005, pp:113-123 [Conf ] Glenn Mansfield , Kohei Ohta , Y. Takei , Nei Kato , Yasunoni Nemoto Towards trapping wily intruders in the large. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2000, v:34, n:4, pp:659-670 [Journal ] Tarik Taleb , Nei Kato , Yoshiaki Nemoto On-demand media streaming to hybrid wired/wireless networks over quasi-geostationary satellite systems. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2005, v:47, n:2, pp:287-306 [Journal ] Akira Kanamaru , Kohei Ohta , Nei Kato , Glenn Mansfield , Yoshiaki Nemoto A simple packet aggregation technique for fault detection. [Citation Graph (0, 0)][DBLP ] Int. Journal of Network Management, 2000, v:10, n:4, pp:215-228 [Journal ] Kohei Ohta , Nei Kato , Glenn Mansfield , Yoshiaki Nemoto Configuring a Network Management System for Efficient Operation. [Citation Graph (0, 0)][DBLP ] Int. Journal of Network Management, 1996, v:6, n:2, pp:108-118 [Journal ] Nei Kato , Masato Suzuki , Shinichiro Omachi , Hirotomo Aso , Yoshiaki Nemoto A Handwritten Character Recognition System Using Directional Element Feature and Asymmetric Mahalanobis Distance. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Pattern Anal. Mach. Intell., 1999, v:21, n:3, pp:258-262 [Journal ] Nei Kato , Masato Abé , Yoshiaki Nemoto A handwritten character recognition system using modified Mahalanobis distance. [Citation Graph (0, 0)][DBLP ] Systems and Computers in Japan, 1997, v:28, n:1, pp:46-55 [Journal ] Fang Sun , Shinichiro Omachi , Nei Kato , Hirotomo Aso Fast and precise discriminant function considering correlations of elements of feature vectors and its application to character recognition. [Citation Graph (0, 0)][DBLP ] Systems and Computers in Japan, 1999, v:30, n:14, pp:33-42 [Journal ] Masato Suzuki , Nei Kato , Yoshiaki Nemoto , Hiroshi Ichimura Discrimination of similar characters with quadratic compound Mahalanobis function. [Citation Graph (0, 0)][DBLP ] Systems and Computers in Japan, 2002, v:33, n:5, pp:11-20 [Journal ] Tarik Taleb , Nei Kato , Yoshiaki Nemoto REFWA: an efficient and fair congestion control scheme for LEO satellite networks. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2006, v:14, n:5, pp:1031-1044 [Journal ] Tarik Taleb , Zubair Md. Fadlullah , Kazuo Hashimoto , Yoshiaki Nemoto , Nei Kato Tracing back attacks against encrypted protocols. [Citation Graph (0, 0)][DBLP ] IWCMC, 2007, pp:121-126 [Conf ] Bounpadith Kannhavong , Hidehisa Nakayama , Nei Kato , Yoshiaki Nemoto , Abbas Jamalipour A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Masaru Dobashi , Hidehisa Nakayama , Nei Kato , Yoshiaki Nemoto , Abbas Jamalipour Traitor Tracing Technology of Streaming Contents Delivery using Traffic Pattern in Wired/Wireless Environments. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Kumar Simkhada , Tarik Taleb , Yuji Waizumi , Abbas Jamalipour , Kazuo Hashimoto , Nei Kato , Yoshiaki Nemoto A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Hiroshi Tsunoda , Umith Dharmaratn , Nei Kato , Abbas Jamalipour , Yoshiaki Nemoto Network Controlled Handover for Improving TCP Performance in LEO Satellite Networks. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Tarik Taleb , Farid Naït-Abdesselam , Abbas Jamalipour , Kazuo Hashimoto , Nei Kato , Yoshiaki Nemoto Design Guidelines for a Global and Self-Managed LEO Satellites-Based Sensor Network. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Tarik Taleb , Daisuke Mashimo , Abbas Jamalipour , Kazuo Hashimoto , Yoshiaki Nemoto , Nei Kato ELB: An Explicit Load Balancing Routing Protocol for Multi-Hop NGEO Satellite Constellations. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Hidehisa Nakayama , Nirwan Ansari , Abbas Jamalipour , Nei Kato Fault-resilient sensing in wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:11-12, pp:2375-2384 [Journal ] Anomaly Detection for DNS Servers Using Frequent Host Selection. [Citation Graph (, )][DBLP ] Ultra-Mobile Echo Network in Health Care System. [Citation Graph (, )][DBLP ] An Application-Driven Mobility Management Scheme for Hierarchical Mobile IPv6 Networks. [Citation Graph (, )][DBLP ] A Dynamic Service Level Negotiation Mechanism for QoS Provisioning in NGEO Satellite Networks. [Citation Graph (, )][DBLP ] Combating Against Attacks on Encrypted Protocols. [Citation Graph (, )][DBLP ] Tailoring ELB for Multi-Layered Satellite Networks. [Citation Graph (, )][DBLP ] A Classifier of Similar Characters using Compound Mahalanobis Function based on Difference Subspace. [Citation Graph (, )][DBLP ] A reliable topology for efficient key distribution in ad-hoc networks. [Citation Graph (, )][DBLP ] Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Exploring the security requirements for quality of service in combined wired and wireless networks. [Citation Graph (, )][DBLP ] NHAG: Network-Aware Hierarchical Arrangement Graph for Application Layer Multicast in Heterogeneous Networks. [Citation Graph (, )][DBLP ] A Bandwidth Aggregation-Aware QoS Negotiation Mechanism for Next-Generation Wireless Networks. [Citation Graph (, )][DBLP ] A Fair and Lifetime-Maximum Routing Algorithm for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] A New Data Gathering Scheme Based on Set Cover Algorithm for Mobile Sinks in WSNs. [Citation Graph (, )][DBLP ] On Supporting P2P-Based VoD Services over Mesh Overlay Networks. [Citation Graph (, )][DBLP ] Mitigating Performance Anomaly of TFRC in Multi-Rate IEEE 802.11 Wireless LANs. [Citation Graph (, )][DBLP ] A Group-Based Key Management Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Analysis of the node isolation attack against OLSR-based mobile ad hoc networks. [Citation Graph (, )][DBLP ] A new pre-classification method based on associative matching method. [Citation Graph (, )][DBLP ] On Gateway Selection Protocol for DYMO-Based MANET. [Citation Graph (, )][DBLP ] Network Application Identification Using Transition Pattern of Payload Length. [Citation Graph (, )][DBLP ] Extensions of VCP to Enhance the Performance in High BDP and Wireless Networks. [Citation Graph (, )][DBLP ] DP Matching Approach for Streaming Contents Detection Using Traffic Pattern. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.008secs