default search action
Yasuo Okabe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Masato Hirai, Daisuke Kotani, Yasuo Okabe:
Linking Contexts from Distinct Data Sources in Zero Trust Federation. J. Inf. Process. 32: 288-296 (2024) - [c99]Kazuki Takashima, Daisuke Kotani, Yasuo Okabe:
DDoS Attack Information Sharing Among CDNs Interconnected Through CDNI. COMPSAC 2024: 2209-2214 - [c98]Sayako Shimizu, Hiroyuki Sato, Motonori Nakamura, Hukofumi Suzuki, Yasuo Okabe:
A Cross-Organizational Identity Proofing System for Seamless Online ID Re-Binding Leveraging Individual Number Cards. COMPSAC 2024: 2321-2326 - [c97]Kenta Murayama, Yasuo Okabe:
Network State Estimation by Spectral Analysis of Passively Measured TCP Flows. ICOIN 2024: 373-378 - [c96]Yasuo Okabe, Motonori Nakamura, Hideaki Goto:
Dynamic VLAN Assignment for Local Users Under External IdP Management in RADIUS-Based Wi-Fi Roaming. ICOIN 2024: 484-489 - [c95]Masato Hirai, Daisuke Kotani, Yasuo Okabe:
Putting Authorization Servers on User-Owned Devices in User-Managed Access. SEC 2024: 162-176 - 2023
- [j26]Amelie Gyrard, Kasia Tabeau, Laura Fiorini, Antonio Kung, Eloise Sengès, Marleen de Mul, Francesco Giuliani, Delphine Lefebvre, Hiroshi Hoshino, Isabelle Fabbricotti, Daniele Sancarlo, Grazia D'Onofrio, Filippo Cavallo, Denis Guiot, Estibaliz Arzoz-Fernandez, Yasuo Okabe, Masahiko Tsukamoto:
Knowledge Engineering Framework for IoT Robotics Applied to Smart Healthcare and Emotional Well-Being. Int. J. Soc. Robotics 15(3): 445-472 (2023) - [j25]Takuya Urimoto, Daisuke Kotani, Yasuo Okabe:
Vantage Point Placement Based on Inference of AS-level Connections. J. Inf. Process. 31: 155-164 (2023) - [j24]Naoki Matsumoto, Daisuke Kotani, Yasuo Okabe:
CREBAS: Enabling Network Access Control in a Home with One Click. J. Inf. Process. 31: 174-184 (2023) - [j23]Masaki Kobayashi, Yo Kanemoto, Daisuke Kotani, Yasuo Okabe:
Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities. J. Inf. Process. 31: 591-601 (2023) - [c94]Keisuke Hamajima, Daisuke Kotani, Yasuo Okabe:
Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents. COMPSAC 2023: 717-722 - [c93]Masahiro Kozuka, Yasuo Okabe:
A Policy-Based Path Selection Mechanism in QUIC Multipath Extension. COMPSAC 2023: 1255-1259 - [c92]Naoki Matsumoto, Daisuke Kotani, Yasuo Okabe:
Efficient Container Image Updating in Low-bandwidth Networks with Delta Encoding. IC2E 2023: 1-10 - [c91]Hiroya Onoe, Daisuke Kotani, Yasuo Okabe:
Protocol-Independent Context Propagation for Sharing Microservices in Multiple Environments. IC2E 2023: 11-20 - [c90]Kenta Terada, Yasuo Okabe, Yoshinori Matsumoto:
Is Puzzle-Based CAPTCHA Secure Against Attacks Based on CNN? ICOIN 2023: 358-362 - [c89]Kodai Hatakeyama, Daisuke Kotani, Yasuo Okabe:
Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. SEC 2023: 361-375 - [i5]Tomoyuki Ehira, Daisuke Kotani, Hiroki Shirokura, Hirofumi Ichihara, Yasuo Okabe:
Monitoring Cascading Changes of Resources in the Kubernetes Control Plane. CoRR abs/2307.12567 (2023) - 2022
- [c88]Masato Hirai, Daisuke Kotani, Yasuo Okabe:
Linking Contexts from Distinct Data Sources in Zero Trust Federation. ETAA 2022: 136-144 - [c87]Naoki Matsumoto, Daisuke Kotani, Yasuo Okabe:
Capability Based Network Access Control for Smart Home Devices. PerCom Workshops 2022: 551-556 - [c86]Kentaro Ohnishi, Daisuke Kotani, Hirofumi Ichihara, Yohei Kanemaru, Yasuo Okabe:
Acila: attaching identities of workloads for efficient packet classification in a cloud data center network. FIRA@SIGCOMM 2022: 79-85 - [i4]Koudai Hatakeyama, Daisuke Kotani, Yasuo Okabe:
Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. CoRR abs/2204.05471 (2022) - [i3]Koudai Hatakeyama, Daisuke Kotani, Yasuo Okabe:
Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation. CoRR abs/2209.11025 (2022) - [i2]Masato Hirai, Daisuke Kotani, Yasuo Okabe:
Linking Contexts from Distinct Data Sources in Zero Trust Federation. CoRR abs/2209.11108 (2022) - 2021
- [j22]Satsuki Nishioka, Yasuo Okabe:
Centralized Control of Account Migration at Single Sign-On in Shibboleth. J. Inf. Process. 29: 769-777 (2021) - [c85]Satsuki Nishioka, Yasuo Okabe:
Mutual Secrecy of Attributes and Authorization Policies in Identity Federation. COMPSAC 2021: 1202-1209 - [c84]Takuya Urimoto, Daisuke Kotani, Yasuo Okabe:
Analysis of Inter-regional Relationship among Regional Tier-1 ASes in the Internet. COMPSAC 2021: 1417-1422 - [c83]Daisuke Kotani, Taku Tanaka, Yasuo Okabe:
QoS Network Control for Elderly Support Services. COMPSAC 2021: 1639-1644 - [c82]Yu Takabatake, Yasuo Okabe:
An Anonymous Distributed Electronic Voting System Using Zerocoin. ICOIN 2021: 163-168 - [c81]Tsuyoshi Arai, Yasuo Okabe, Yoshinori Matsumoto:
Precursory Analysis of Attack-Log Time Series by Machine Learning for Detecting Bots in CAPTCHA. ICOIN 2021: 295-300 - [c80]Koudai Hatakeyama, Daisuke Kotani, Yasuo Okabe:
Zero Trust Federation: Sharing Context under User Control towards Zero Trust in Identity Federation. PerCom Workshops 2021: 514-519 - [i1]Kentaro Ohnishi, Daisuke Kotani, Hirofumi Ichihara, Yohei Kanemaru, Yasuo Okabe:
Acila: Attaching Identities of Workloads for Efficient Packet Classification in a Cloud Data Center Network. CoRR abs/2109.08343 (2021) - 2020
- [j21]Yoshiyuki Mihara, Shuichi Miyazaki, Yasuo Okabe, Tetsuya Yamaguchi, Manabu Okamoto:
Identifying Link Layer Home Network Topologies Using HTIP. IEICE Trans. Inf. Syst. 103-D(3): 566-577 (2020) - [j20]Huawei Huang, Song Guo, Weifa Liang, Kun Wang, Yasuo Okabe:
Coflow-Like Online Data Acquisition from Low-Earth-Orbit Datacenters. IEEE Trans. Mob. Comput. 19(12): 2743-2760 (2020) - [c79]Dongyang Li, Daisuke Kotani, Yasuo Okabe:
Improving Attack Detection Performance in NIDS Using GAN. COMPSAC 2020: 817-825 - [c78]Satsuki Nishioka, Yasuo Okabe:
Centralized Control of Account Migration at Single Sign-On in Shibboleth. COMPSAC 2020: 1597-1603 - [c77]Tsuyoshi Arai, Yasuo Okabe, Yoshinori Matsumoto, Koji Kawamura:
Detection of Bots in CAPTCHA as a Cloud Service Utilizing Machine Learning. ICOIN 2020: 584-589 - [c76]Kaku Sawada, Daisuke Kotani, Yasuo Okabe:
Network Routing Optimization Based on Machine Learning Using Graph Networks Robust against Topology Change. ICOIN 2020: 608-615 - [c75]Kei Wakabayashi, Daisuke Kotani, Yasuo Okabe:
Traffic-aware Access Control List Reconstruction. ICOIN 2020: 616-621
2010 – 2019
- 2019
- [c74]Yo Kanemoto, Kazufumi Aoki, Makoto Iwamura, Jun Miyoshi, Daisuke Kotani, Hiroki Takakura, Yasuo Okabe:
Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes. COMPSAC (2) 2019: 471-476 - [c73]Kyosuke Futami, Yutaka Yanagisawa, Hiroshi Hoshino, Aiko Matsumori, Masahiko Tsukamoto, Daisuke Kotani, Yasuo Okabe:
Data distribution infrastructure and applications for robotic therapy for blind elderly. UbiComp/ISWC Adjunct 2019: 61-64 - 2018
- [c72]Ryozo Kiyohara, Yasuo Okabe, Atsushi Tagami:
Message from the CDS 2018 Workshop Organizers. COMPSAC (2) 2018: 240 - [c71]Ryoh Akiyoshi, Daisuke Kotani, Yasuo Okabe:
Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet. COMPSAC (2) 2018: 658-663 - [c70]Hiroyuki Ohsaki, Yasuo Okabe, Koji Okamura:
Message from the IWFIT 2018 Workshop Organizers. COMPSAC (2) 2018: 762 - [c69]Tsubasa Munemitsu, Daisuke Kotani, Yasuo Okabe:
A Mixed Integer Programming Solution for Network Optimization Under Tunneling-Based Traffic Engineering Schemes. COMPSAC (2) 2018: 769-776 - [c68]Keitaro Yamazaki, Daisuke Kotani, Yasuo Okabe:
Xilara: An XSS Filter Based on HTML Template Restoration. SecureComm (2) 2018: 332-351 - 2017
- [j19]Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura:
User Identification of Pseudonyms without Identity Information Exposure - A Scenario in Access Federations. J. Inf. Process. 25: 788-795 (2017) - [j18]Koji M. Kobayashi, Shuichi Miyazaki, Yasuo Okabe:
Competitive buffer management for multi-queue switches in QoS networks using packet buffering algorithms. Theor. Comput. Sci. 675: 27-42 (2017) - [c67]Yoshiyuki Mihara, Shuichi Miyazaki, Yasuo Okabe, Tetsuya Yamaguchi, Manabu Okamoto:
Identifying link layer home network topologies using HTIP. CCNC 2017: 891-898 - [c66]Kazuma Matsumoto, Yasuo Okabe:
A Collusion-Resilient Hybrid P2P Framework for Massively Multiplayer Online Games. COMPSAC (2) 2017: 342-347 - [c65]Tomohiro Ito, Daisuke Kotani, Yasuo Okabe:
A Threshold-Based Authentication System Which Provides Attributes Using Secret Sharing. COMPSAC (2) 2017: 730-737 - [c64]Yoshiharu Tsuzaki, Yasuo Okabe:
Reactive configuration updating for Intent-Based Networking. ICOIN 2017: 97-102 - 2016
- [j17]Daisuke Kotani, Yasuo Okabe:
A Packet-In Message Filtering Mechanism for Protection of Control Plane in OpenFlow Switches. IEICE Trans. Inf. Syst. 99-D(3): 695-707 (2016) - [c63]Yasuo Okabe, Takaaki Komura, Hiroyuki Sato, Kazutsuna Yamaji, Motonori Nakamura:
An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other. COMPSAC Workshops 2016: 202-207 - [c62]Teruhisa Tajima, Yasuo Okabe:
Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LAN. COMPSAC Workshops 2016: 312-318 - [c61]Hiroyuki Sato, Yasuo Okabe, Motonori Nakamura:
User Identification of Pseudonyms without Identity Information Exposure in Access Federations. COMPSAC 2016: 487-492 - 2015
- [j16]Yasuo Okabe:
Editor's Message to Special Issue of "Students' and Young Researchers' Papers". J. Inf. Process. 23(2): 142 (2015) - [c60]Daisuke Kotani, Yasuo Okabe:
Fast Failure Detection of OpenFlow Channels. AINTEC 2015: 32-39 - [c59]Shuichi Miyazaki, Naoyuki Morimoto, Yasuo Okabe:
Approximability of Two Variants of Multiple Knapsack Problems. CIAC 2015: 365-376 - [c58]Naoki Tsujio, Yasuo Okabe:
A Traceable and Pseudonymous P2P Information Distribution System. COMPSAC Workshops 2015: 67-72 - [c57]Tomotaka Maeda, Hiroki Nakano, Naoyuki Morimoto, Kazumi Sakai, Yasuo Okabe:
Design and Implementation of an On-Demand Home Power Management System Based on a Hierarchical Protocol. COMPSAC Workshops 2015: 188-193 - 2014
- [j15]Hiroyuki Sato, Yasuo Okabe, Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura:
Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach. J. Inf. Process. 22(3): 464-471 (2014) - [j14]Takeshi Nishimura, Motonori Nakamura, Kazutsuna Yamaji, Hiroyuki Sato, Yasuo Okabe:
Privacy Preserving Attribute Aggregation Method without Shared Identifier Binding. J. Inf. Process. 22(3): 472-479 (2014) - [c56]Daisuke Kotani, Yasuo Okabe:
A packet-in message filtering mechanism for protection of control plane in openflow networks. ANCS 2014: 29-40 - [c55]Yoshiharu Tsuzaki, Yasuo Okabe, Ray Atarashi, Tatsuya Hayashi:
Development of an automatic managing system of wide-area distributed networks with defined network specification. CNSM 2014: 443-446 - [c54]Masayuki Tsubouchi, Tomotaka Maeda, Yasuo Okabe:
Digital Fingerprinting on Executable File for Tracking Illegal Uproaders. COMPSAC Workshops 2014: 325-330 - 2013
- [j13]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Koji Nakao:
Toward a more practical unsupervised anomaly detection system. Inf. Sci. 231: 4-14 (2013) - [c53]Toyokazu Akiyama, Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura, Yasuo Okabe:
Design and Implementation of a Functional Extension Framework for Authn & Authz Federation Infrastructure Using Web Browser Add-on. AINA 2013: 389-396 - [c52]Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe:
An Extension of the Link Layer Discovery Protocol for On-Demand Power Supply Network by PoE. AINA Workshops 2013: 1612-1616 - [c51]Hiroki Okamoto, Ryosuke Matsumoto, Yasuo Okabe:
Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network. COMPSAC 2013: 220-225 - [c50]Motonori Nakamura, Takeshi Nishimura, Kazutsuna Yamaji, Hiroyuki Sato, Yasuo Okabe:
Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities across Shibboleth SPs. COMPSAC Workshops 2013: 367-372 - [c49]Hiroyuki Sato, Yasuo Okabe, Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura:
Privacy Enhancing Proxies in Attribute Releases: Two Approaches. COMPSAC Workshops 2013: 379-384 - [c48]Masaya Yokohata, Tomotaka Maeda, Yasuo Okabe:
Power Allocation Algorithms of PoE for On-Demand Power Supply. COMPSAC Workshops 2013: 517-522 - [c47]Yasuhiro Teramoto, Rei Atarashi, Yoshifumi Atarashi, Yasuo Okabe:
Managing Networks Independently of the Physical Topology by Service Defined Network. COMPSAC Workshops 2013: 650-655 - [c46]Yoshiharu Tsuzaki, Ryosuke Matsumoto, Daisuke Kotani, Shuichi Miyazaki, Yasuo Okabe:
A Mail Transfer System Selectively Restricting a Huge Amount of E-Mails. SITIS 2013: 896-900 - 2012
- [c45]Wataru Oogami, Takaaki Komura, Yasuo Okabe:
Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation. COMPSAC Workshops 2012: 64-69 - [c44]Daisuke Kotani, Yasuo Okabe:
Packet-In Message Control for Reducing CPU Load and Control Traffic in OpenFlow Switches. EWSDN 2012: 42-47 - [c43]Akihiro Takahashi, Tomotaka Maeda, Yasuo Okabe:
Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol. SAINT 2012: 19-28 - [c42]Takuya Miyamoto, Youichi Koyama, Kazumi Sakai, Yasuo Okabe:
A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home Networking. SAINT 2012: 138-147 - [c41]Ryosuke Matsumoto, Yasuo Okabe:
Access Control Architecture Separating Privilege by a Thread on a Web Server. SAINT 2012: 178-183 - 2011
- [c40]Kenji Ohira, Yasuo Okabe:
Host-Centric Site-Exit Router Selection in IPv6 Site Multihoming Environment. AINA Workshops 2011: 696-703 - [c39]Shin Maruyama, Masahiro Kozuka, Yasuo Okabe, Motonori Nakamura:
Policy-Based IP Address Selection in SCTP Automatic Address Reconfiguration. AINA Workshops 2011: 704-707 - [c38]Akihiro Takahashi, Yasuo Okabe:
Providing ubiquitous networks securely using host identity protocol (HIP). AINTEC 2011: 156-159 - [c37]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue, Koji Nakao:
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation. BADGERS@EuroSys 2011: 29-36 - [c36]Tomoki Shibata, Kazumi Sakai, Yasuo Okabe:
Power routing switches toward energy-on-demand home networking. CCNC 2011: 844-845 - [c35]Kazumi Sakai, Yasuo Okabe:
Quality-aware energy routing toward on-demand home energy networking: (Position paper). CCNC 2011: 1041-1044 - [c34]Moriteru Ishida, Hiroki Takakura, Yasuo Okabe:
High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling. SAINT 2011: 11-19 - [c33]Satoshi Ishibashi, Shuichi Miyazaki, Yasuo Okabe:
Design and Implementation of a Certified Document Delivery System without a Trusted Intermediate Authority. SAINT 2011: 20-26 - [c32]Tomoki Shibata, Kazumi Sakai, Yasuo Okabe:
The Design and Implementation of an On-demand DC Grid in Home. SAINT 2011: 152-159 - 2010
- [j12]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto, Koji Nakao:
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data. IEICE Trans. Inf. Syst. 93-D(9): 2544-2554 (2010) - [c31]Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara:
A Web-Based Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking. CCNC 2010: 1-2
2000 – 2009
- 2009
- [j11]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon:
Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM. IEICE Trans. Commun. 92-B(6): 1981-1990 (2009) - [j10]Shuichi Miyazaki, Naoyuki Morimoto, Yasuo Okabe:
The Online Graph Exploration Problem on Restricted Graphs. IEICE Trans. Inf. Syst. 92-D(9): 1620-1627 (2009) - [c30]Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara:
Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques. IWDW 2009: 14-28 - [c29]Keiji Maekawa, Yasuo Okabe:
An Enhanced Location Privacy Framework with Mobility Using Host Identity Protocol. SAINT 2009: 23-29 - [c28]Keita Shimizu, Shuichi Miyazaki, Yasuo Okabe:
Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange. SAINT 2009: 37-42 - [c27]Toshiyuki Kataoka, Takeshi Nishimura, Masaki Shimaoka, Kazutsuna Yamaji, Motonori Nakamura, Noboru Sonehara, Yasuo Okabe:
Leveraging PKI in SAML 2.0 Federation for Enhanced Discovery Service. SAINT 2009: 239-242 - [c26]Mitsuo Okada, Yasuo Okabe, Tetsutaro Uehara:
Security Analysis on Privacy-Secure Image Trading Framework Using Blind Watermarking. SAINT 2009: 243-246 - [c25]Tomotaka Maeda, Masahiro Kozuka, Yasuo Okabe:
Reliable Streaming Transmission Using PR-SCTP. SAINT 2009: 278-279 - [c24]Koji M. Kobayashi, Shuichi Miyazaki, Yasuo Okabe:
Competitive buffer management for multi-queue switches in qos networks using packet buffering algorithms. SPAA 2009: 328-336 - 2008
- [j9]Jungsuk Song, Kenji Ohira, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon:
A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System. IEICE Trans. Inf. Syst. 91-D(5): 1282-1291 (2008) - [j8]Mitsuo Okada, Hiroaki Kikuchi, Yasuo Okabe:
Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information. IEICE Trans. Inf. Syst. 91-D(5): 1348-1358 (2008) - [j7]Koji M. Kobayashi, Shuichi Miyazaki, Yasuo Okabe:
A Tight Bound on Online Buffer Management for Two-Port Shared-Memory Switches. IEICE Trans. Inf. Syst. 91-D(8): 2105-2114 (2008) - [j6]Koji M. Kobayashi, Shuichi Miyazaki, Yasuo Okabe:
A Tight Upper Bound on Online Buffer Management for Multi-Queue Switches with Bicodal Buffers. IEICE Trans. Inf. Syst. 91-D(12): 2757-2769 (2008) - [c23]Toshihiro Takagi, Takaaki Komura, Shuichi Miyazaki, Yasuo Okabe:
Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols. SAINT 2008: 293-296 - 2007
- [j5]Yasuo Okabe:
Special Section on New Challenge for Internet Technology and its Architecture. IEICE Trans. Commun. 90-B(10): 2637 (2007) - [c22]Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon:
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts. ASIAN 2007: 247-253 - [c21]Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon:
A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System. DASFAA 2007: 140-151 - [c20]Yutaka Nakano, Motonori Nakamura, Yasuo Okabe:
Analysis for Topological Properties of the Network Feeding Usenet News. SAINT 2007: 14 - [c19]Shoichirou Fujiwara, Takaaki Komura, Yasuo Okabe:
A Privacy Oriented Extension of Attribute Exchange in Shibboleth. SAINT Workshops 2007: 28 - [c18]Yasuo Okabe, James Sankar, Shinji Shimojo:
Message from the Organizers of the Workshop on Middleware Architecture in the Internet. SAINT Workshops 2007 - [c17]Koji M. Kobayashi, Shuichi Miyazaki, Yasuo Okabe:
A tight bound on online buffer management for two-port shared-memory switches. SPAA 2007: 358-364 - 2006
- [c16]Shunsaku Kato, Shuichi Miyazaki, Yusuke Nishimura, Yasuo Okabe:
Cheat-Proof Serverless Network Games. Computers and Games 2006: 234-243 - [c15]Shin Maruyama, Motonori Nakamura, Yasuo Okabe, Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashita:
Priority Control in Receiving E-mails by Giving a Separate Response to Each DNS Query. SAINT 2006: 90-93 - 2005
- [j4]Hiro Ito, Kazuo Iwama, Yasuo Okabe, Takuya Yoshihiro:
Single backup table schemes for shortest-path routing. Theor. Comput. Sci. 333(3): 347-353 (2005) - [c14]Kenji Ohira, Youichi Koyama, Kenji Fujikawa, Yasuo Okabe:
Automatic Address Assignment for IPv6 End-to-End Multihoming Sites. ICITA (2) 2005: 755-758 - [c13]Hitoshi Murai, Yasuo Okabe:
Pipelined Parallelization in HPF Programs on the Earth Simulator. ISHPC 2005: 365-373 - [c12]Kenji Ohira, Ying Huang, Yasuo Okabe, Kenji Fujikawa, Motonori Nakamura:
Security analysis on public wireless internet service models. WMASH 2005: 107-110 - 2004
- [j3]Ahmed Ishtiaq, Yasuo Okabe, Masanori Kanazawa:
Management of parallel UBR flows over TCP in congested ATM networks. Comput. Commun. 27(9): 801-808 (2004) - 2003
- [j2]Hiro Ito, Kazuo Iwama, Yasuo Okabe, Takuya Yoshihiro:
Avoiding Routing Loops on the Internet. Theory Comput. Syst. 36(6): 597-609 (2003) - [c11]Ishtiaq Ahmed, Yasuo Okabe, Kanazawa Masanori:
Improving Performance of SCTP over Broadband High Latency Networks. LCN 2003: 644- - [c10]Arifumi Matsumoto, Kenji Fujikawa, Yasuo Okabe, Fumio Teraoka, Mitsunobu Kunishi, Masataka Ohta, Masahiro Ishiyama:
Multihoming Support based on Mobile Node Protocol LIN6. SAINT Workshops 2003: 204-207 - [c9]Hiro Ito, Kazuo Iwama, Yasuo Okabe, Takuya Yoshihiro:
Polynomial-Time Computable Backup Tables for Shortest-Path Routing. SIROCCO 2003: 163-177 - [c8]Takaaki Komura, Kenji Fujikawa, Yasuo Okabe:
The MIAKO.NET public wireless internet service in Kyoto. WMASH 2003: 56-63 - 2002
- [j1]Kazuo Iwama, Daisuke Kawai, Shuichi Miyazaki, Yasuo Okabe, Jun Umemoto:
Parallelizing Local Search for CNF Satisfiability Using Vectorization and PVM. ACM J. Exp. Algorithmics 7: 2 (2002) - [c7]Masatsugu Tonoike, Takaaki Komura, Kenji Fujikawa, Yasuo Okabe, Katsuo Ikeda:
Design and Implementation of a Web-Based Internet Broadcasting System on QoS Multicast Routers. ASIAN 2002: 195-205 - [c6]Kae Asaoka, Akio Hirano, Yasuo Okabe, Masanori Kanazawa:
Evaluation of the HPF/JA Extensions on Fujitsu VPP Using the NAS Parallel Benchmarks. ISHPC 2002: 503-514 - [c5]Ahmed Ishtiaq, Yasuo Okabe, Masanori Kanazawa:
Interference among Multiple TCP Flows over Congested ATM Links. LCN 2002: 730-732 - [c4]Hiro Ito, Kazuo Iwama, Yasuo Okabe, Takuya Yoshihiro:
Avoiding Routing Loops on the Internet. SIROCCO 2002: 197-210 - 2001
- [c3]Kazuo Iwama, Yasuo Okabe, Toshiro Takase:
Separating Oblivious and Non-oblivious BPs. COCOON 2001: 28-38 - 2000
- [c2]Kazuo Iwama, Daisuke Kawai, Shuichi Miyazaki, Yasuo Okabe, Jun Umemoto:
Parallelizing Local Search for CNF Satisfiability Using Vectorization and PVM. WAE 2000: 123-134
1980 – 1989
- 1988
- [c1]Yasuo Okabe, Shuzo Yajima:
Parallel Computational Complexity of Logic Programs and Alternating Turing Machines. FGCS 1988: 356-363
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint