スポンサーリンク
National Inst. Informatics Tokyo Jpn | 論文
- IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks
- Detecting and tracing traffic volume anomalies in an academic network (情報ネットワーク)
- BS-15-6 A Rescheduling Scheme for Providing Joint QoS in Optical Burst Switching Networks(BS-15.Network Planning, Control, and Management,ENGLISH SESSION)
- Traffic Analysis and Traffic-Smoothing Burst Assembly Methods for the Optical Burst Switching Network(Switching for Communications)
- Itinerant Agents for Network Management(Network Control and Management)(Assurance Systems and Networks)
- BS-8-19 A Heuristic Scheme to Distinguish Legitimate Traffic from Attack Traffic in Networks Anomaly Detection(BS-8. Technology and Architecture for Ubiquitous Network Systems,ENGLISH SESSION)
- A DoS/DDoS Attacks Detection Scheme Based on In/Out Traffic Proportion
- An Efficient Feature Selection Method For Object Detection
- Mobile Applications in Ubiquitous Computing Environments(Application, Ubiquitous Networks)
- MobileSpaces : An Extensible Mobile Agent System(Concurrent System Technology)
- Bridging Physical and Virtual Worlds with Mobile Agents(Mobile Computing)
- A Spatial Model for Ubiquitous Computing Services(Software Platform Technologies, Ubiquitous Networks)
- A Mobile Agent-Based Framework for Rapidly Building and Managing Application-Specific Overlay Networks(Networking Technologies for Overlay Networks)
- Network Protocols for Mobile Agents by Mobile Agents(Special Issue on High Speed Networks and Multimedia Applications)
- A Component Framework for Document-Centric Networking(Mobile Agent)(Next Generation Networks Software)
- Human Physiology as a Basis for Designing and Evaluating Affective Communication with Life-Like Characters(Life-like Agent and its Communication)
- A DoS/DDoS Attacks Detection Scheme Based on In/Out Traffic Proportion
- Learning First-Order Rules to Handle Medical Data
- Speculative Computation and Abduction for an Autonomous Agent(Software Agent and Its Applications)
- Verification of BPEL Workflows Design using Model Checking