Search For:

Displaying 1-26 out of 26 total
Guest Editors' Introduction: Special Issue on Cyber-Physical Systems (CPS)
Found in: IEEE Transactions on Parallel and Distributed Systems
By Symeon Papavassiliou,Nei Kato,Yunhao Liu,Cheng-Zhong Xu,Xinbing Wang
Issue Date:September 2012
pp. 1569-1571
The nineteen papers in this special issue focus on the development and applications of cyber-physical systems. These systems refer to the tight link between computational, virtual, and physical resources that drive the potential of having a pervasive effec...
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Hiroki Nishiyama,Desmond Fomo,Zubair Md. Fadlullah,Nei Kato
Issue Date:February 2014
pp. 301-309
Due to the increasing popularity of multimedia streaming applications and services in recent years, the issue of trusted video delivery to prevent undesirable content-leakage has, indeed, become critical. While preserving user privacy, conventional systems...
A Framework for Information Propagation in Mobile Sensor Networks
Found in: 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)
By Jiajia Liu,Hiroki Nishiyama,Nei Kato
Issue Date:October 2013
pp. 214-221
A common complication for routing in mobile sensor networks is how to efficiently control the forwarding behaviors of relay nodes so as to save their energy consumption and buffer usage while simultaneously satisfy the specified delivery performance requir...
Smart FiWi Networks: Challenges and Solutions for QoS and Green Communications
Found in: IEEE Intelligent Systems
By Zubair Md. Fadlullah,Hiroki Nishiyama,Nei Kato,Hirotaka Ujikawa,Ken-Ichi Suzuki,Naoto Yoshimoto
Issue Date:March 2013
pp. 86-91
A smart integration of wireless local area network (WLAN) with passive optical network (PON) technology carefully synchronizes and coordinates different quality-of-service specifications and energy-saving modes so that they can be seamlessly combined to fa...
Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Wei Liu,Hiroki Nishiyama,Nirwan Ansari,Jie Yang,Nei Kato
Issue Date:February 2013
pp. 239-249
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challe...
On the throughput evaluation of wireless mesh network deployed in disaster areas
Found in: 2013 International Conference on Computing, Networking and Communications (ICNC)
By Thuan Ngo,Hiroki Nishiyama,Nei Kato,Yoshitaka Shimizu,Kohei Mizuno,Tomoaki Kumagai
Issue Date:January 2013
pp. 413-417
After disasters such as earthquakes and tsunamis, the network infrastructures might be extremely damaged or destroyed while Internet connection becomes much more necessary. Therefore, deploying networks in disaster areas has received much attention especia...
On the optimal transmission distance for power-aware routing in Ad Hoc networks
Found in: 2013 International Conference on Computing, Networking and Communications (ICNC)
By Ahmed E. A. A. Abdulla,Zubair Md. Fadlullah,Hiroki Nishiyama,Nei Kato
Issue Date:January 2013
pp. 519-523
Power-aware routing for battery-powered wireless ad hoc networks is crucial to insure the longevity of such networks. Most contemporary research that attempts to minimize the energy consumption does so via short distance transmissions. However, this transm...
Fairness issue in message delivery in delay- and Disruption-Tolerant Networks for disaster areas
Found in: 2013 International Conference on Computing, Networking and Communications (ICNC)
By Asato Takahashi,Hiraki Nishiyama,Nei Kato
Issue Date:January 2013
pp. 890-894
Delay- and Disruption-Tolerant Network (DTN) is a promising solution which allows us to communicate to each other even in disaster areas where a large number of users lose network connectivity due to significant damages on network infrastructures by earthq...
A general model for store-carry-forward routing schemes with multicast in delay tolerant networks
Found in: Software Maintenance and Reengineering, European Conference on
By Jiajia Liu,Xiaohong Jiang,Hiroki Nishiyama,Nei Kato
Issue Date:August 2011
pp. 494-500
Delay tolerant networks (DTNs) are sparse and highly mobile wireless ad hoc networks, where no contemporaneous end-to-end path may ever exist at any given time instant, and thus the
Effective Delay-Controlled Load Distribution over Multipath Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Sumet Prabhavat,Hiroki Nishiyama,Nirwan Ansari,Nei Kato
Issue Date:October 2011
pp. 1730-1741
Owing to the heterogeneity and high degree of connectivity of various networks, there likely exist multiple available paths between a source and a destination. An effective model of delay-controlled load distribution becomes essential to efficiently utiliz...
On Gateway Selection Protocol for DYMO-Based MANET
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Takeshi Matsuda, Hidehisa Nakayama, Sherman Shen, Yoshiaki Nemoto, Nei Kato
Issue Date:October 2008
pp. 32-37
The coupling of Mobile Ad-hoc Networks (MANETs) and the Internet is gaining attention by researchers working towards future ubiquitous computing environments. In this work, we focus on the situation that occurs when specialized, sensitive data are sent to ...
A reliable topology for efficient key distribution in ad-hoc networks
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Kenji Miyao, Hidehisa Nakayama, Nirwan Ansari, Yoshiaki Nemoto, Nei Kato
Issue Date:June 2008
pp. 1-5
Data confidentiality is one of the most important concerns in security of ad-hoc networks which have been widely studied in recent years. In this paper, we consider the public-key cryptography which is one of the simplest and viable means to maintain data ...
Ultra-Mobile Echo Network in Health Care System
Found in: Computer-Based Medical Systems, IEEE Symposium on
By Yoshifumi Saijo, Takahiro Iwamoto, Kazuto Kobayashi, Satoshi Yamaguchi, Hiroshi Tsunoda, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto
Issue Date:June 2008
pp. 164-166
For the management of early stage atherosclerosis, the concept of metabolic syndrome is important. An inexpensive, ultra-mobile ultrasound imaging device is proposed for the accurate diagnosis of the atherosclerosis. A linear probe capable of transmitting ...
A Classifier of Similar Characters using Compound Mahalanobis Function based on Difference Subspace
Found in: Document Analysis and Recognition, International Conference on
By Junichi Hirayama, Hidehisa Nakayama, Nei Kato
Issue Date:September 2007
pp. 432-436
To distinguish similar characters, it is preferable to construct a classifier using a projective feature space which differentiates two similar categories. The classifier CMF has been proposed for a discriminant function, in similar characters recognition....
Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection
Found in: Pattern Recognition, International Conference on
By Ryo Inoue, Hidehisa Nakayama, Nei Kato
Issue Date:August 2006
pp. 1094-1097
In this paper, we propose a method to compose a classifier by non-linear discriminant analysis using kernel method combined with kernel feature selection for holistic recognition of historical hand-written string. Through experiments using historical hand-...
A self-adaptive intrusion detection method for AODV-based mobile ad hoc networks
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By S. Kurosawa, H. Nakayama, Nei Kato, A. Jamalipour, Y. Nemoto
Issue Date:November 2005
pp. 773-780
No summary available.
Two-Stage Computational Cost Reduction Algorithm Based on Mahalanobis Distance Approximations
Found in: Pattern Recognition, International Conference on
By Fang Sun, Shin'ichiro Omachi, Nei Kato, Hirotomo Aso, Shunichi Kono, Tasuku Takagi
Issue Date:September 2000
pp. 2696
For many pattern recognition methods, high recognition accuracy is obtained at very high expense of computational cost. In this paper, a new algorithm that reduces the computational cost for calculating discriminant function is proposed. This algorithm con...
A Handwritten Character Recognition System Using Directional Element Feature and Asymmetric Mahalanobis Distance
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Nei Kato, Masato Suzuki, Shin'ichiro Omachi, Hirotomo Aso, Yoshiaki Nemoto
Issue Date:March 1999
pp. 258-262
<p><b>Abstract</b>—This paper presents a precise system for handwritten Chinese and Japanese character recognition. Before extracting <it>directional element feature</it> (DEF) from each character image, <it>transformati...
A Cooperative ONU Sleep Method for Reducing Latency and Energy Consumption of STA in Smart-FiWi Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Hiroki Nishiyama,Ko Togashi,Yuichi Kawamoto,Nei Kato
Issue Date:February 2015
pp. 1
Fiber-Wireless (FiWi) network is a classification of network that combines the massive bandwidth of the optical network and the reach of the wireless network. FiWi networks are usually composed of an optical and a wireless component. Since both components ...
Dynamic Replication and Forwarding Control Based on Node Surroundings in Cooperative Delay-Tolerant Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Hiroki Nishiyama,Asato Takahashi,Nei Kato,Katsuya Nakahira,Takatoshi Sugiyama
Issue Date:February 2015
pp. 1
Delay-Tolerant Networks (DTNs) are a promising network architecture which can provide reliable multi-hop message transmission between participating mobile nodes in an unfavorable environment that is prone to link disruption and disconnection by replicating...
GT-CFS: A Game Theoretic Coalition Formulation Strategy for Reducing Power Loss in Micro Grids
Found in: IEEE Transactions on Parallel and Distributed Systems
By Chao Wei,Zubair M. Fadlullah,Nei Kato,Akira Takeuchi
Issue Date:September 2014
pp. 2307-2317
In recent years, research attention on smart grid comprising distributed power generators has increased. To produce electricity in the smart grid, many micro grids (MGs) may exploit various renewable energy resources. Because the production capacity of ren...
Anomaly Detection for DNS Servers Using Frequent Host Selection
Found in: Advanced Information Networking and Applications, International Conference on
By Akira Yamada, Yutaka Miyake, Masahiro Terabe, Kazuo Hashimoto, Nei Kato
Issue Date:May 2009
pp. 853-860
DNS is one of the internet's fundamental building blocks, used by various applications such as web and mail transfer. Therefore, monitoring DNS traffic has potential to detect host anomalies such as spammers and infected hosts in a network. However, previo...
An intelligent routing scheme effectively utilizing mass storage embedded on satellites to mitigate network congestions
Found in: Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems (MSWiM '13)
By Hiroki Nishiyama, Nei Kato, Kazuma Kaneko, Naoko Yoshimura, Shinichi Yamamoto, Yuuichi Kawamoto
Issue Date:November 2013
pp. 167-172
Recently, since many kinds of wireless devices have been widely used and a large amount of contents is available on the Internet, a network system that provides adequate services anytime and anywhere is required. In this research, we focus on satellite net...
Exploring the security requirements for quality of service in combined wired and wireless networks
Found in: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly (IWCMC '09)
By Nei Kato, Nidal Nasser, Tarik Taleb, Zubair Md. Fadlullah
Issue Date:June 2009
pp. 5-6
In the modern era of Internet, providing Quality of Service (QoS) is a challenging issue, particularly in resource-constrained wireless networks with delay-sensitive multimedia traffic. Real-time and multimedia services are now available to end-users over ...
Tracing back attacks against encrypted protocols
Found in: Proceedings of the 2007 international conference on Wireless communications and mobile computing (IWCMC '07)
By Kazuo Hashimoto, Nei Kato, Tarik Taleb, Yoshiaki Nemoto, Zubair Md. Fadlullah
Issue Date:August 2007
pp. 121-126
Attacks against encrypted protocols have become increasingly popular and sophisticated. Such attacks are often undetectable by the traditional Intrusion Detection Systems (IDSs). Additionally, the encrypted attack-traffic makes tracing the source of the at...
Network cartographer
Found in: Proceedings of the fourth ACM international conference on Multimedia (MULTIMEDIA '96)
By Glenn Mansfield, K. Jayanthi, Kohei Ohta, Nei Kato, Tomohiro Ika, Yoshiaki Nemoto
Issue Date:November 1996
pp. 439-440
This paper addresses the problem of how to automatically generate visual representations of recorded histories of distributed multimedia collaborations. The work reported here focuses mainly on what we consider to be an innovative approach to this problem,...