![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 49 matches
- 2021
- Haruki Ishizaki, Ryohei Saka, Eitaro Kohno, Yoshiaki Kakuda:
A Loop Reduction Method Utilizing Public Device Addresses of Master Terminals in Connection Procedures of Multiple Piconets for Bluetooth MANETs. Int. J. Netw. Comput. 11(2): 492-515 (2021) - Akifumi Nomasaki, Eitaro Kohno, Reo Morishige, Yoshiaki Kakuda:
A Control Method for Transmission Timing of Control Packets to Prevent the Concentration of Control Packets for Bluetooth MANETs. Int. J. Netw. Comput. 11(2): 533-555 (2021) - Haruki Ishizaki, Eitaro Kohno, Yoshiaki Kakuda:
On the Suppression of Loops with Long Hops During Scatternet Configuration in Bluetooth MANETs. CANDAR (Workshops) 2021: 35-41 - 2020
- Temma Ohtani, Eitaro Kohno, Akifumi Nomasaki, Yoshiaki Kakuda:
An Adaptive Connection-Establishment Timeout Configuration Method for Bluetooth MANETs in Control Packet Loss Environments. Int. J. Netw. Comput. 10(1): 25-43 (2020) - Haruki Ishizaki, Ryohei Saka, Eitaro Kohno, Yoshiaki Kakuda:
On the Loop Suppression Method by Utilizing Information of Master Terminals for Neighboring Terminals in Bluetooth MANETs. CANDAR 2020: 134-140 - Akifumi Nomasaki, Eitaro Kohno, Yoshiaki Kakuda:
On the Connection-Establishment Request Control Method to Improve Data Packet Delivery Ratio at Densely Populated Areas for Bluetooth MANETs. CANDAR 2020: 188-194 - 2019
- Kazuki Fujita, Eitaro Kohno, Yoshiaki Kakuda:
On the Secure Dispersed Data Transfer-Oriented Path Construction Method for Different ID Trees in WSNs. CANDAR Workshops 2019: 8-13 - Yuya Minami, Ryohei Saka, Eitaro Kohno, Yoshiaki Kakuda:
On the Effect of BLE Beacons on Fast Bluetooth Connection Establishment Scheme. CANDAR Workshops 2019: 28-32 - 2018
- Temma Ohtani, Eitaro Kohno, Yoshiaki Kakuda:
On Relationship between Timeout and Latency of Connection Re-establishment for Control Packet Loss Scenario in Bluetooth MANETs. CANDAR Workshops 2018: 42-46 - Yuya Minami, Nobuhiro Kajikawa, Ryohei Saka, Yuma Nakao, Eitaro Kohno, Yoshiaki Kakuda:
Arbitration-Based Deadlock Mitigation Mechanism for Fast Connection Establishment in Autonomous Self-Organized Bluetooth MANETs. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1611-1616 - 2017
- Ryuma Tani, Kento Aoi, Eitaro Kohno, Yoshiaki Kakuda:
An Adaptability-Enhanced Routing Method for Multiple Gateway-Based Wireless Sensor Networks Using Secure Dispersed Data Transfer. ICDCS Workshops 2017: 19-25 - 2016
- Tetsuya Murakami, Eitaro Kohno, Yoshiaki Kakuda:
A Countermeasure to Eavesdropping on Data Packets by Utilizing Control Packet Overhearing for Radio overlapping Reduced Multipath Routing in Ad Hoc Networks. Int. J. Netw. Comput. 6(2): 345-367 (2016) - Nobuhiro Kajikawa, Yuya Minami, Eitaro Kohno, Yoshiaki Kakuda:
On Availability and Energy Consumption of the Fast Connection Establishment Method by Using Bluetooth Classic and Bluetooth Low Energy. CANDAR 2016: 286-290 - 2015
- Tetsuya Murakami, Eitaro Kohno, Yoshiaki Kakuda:
Radio Overlapping Reduced Multipath Routing Method by Utilizing Control Packet Overhearing to Counter Eavesdropping on Data Packets for Ad Hoc Networks. CANDAR 2015: 167-173 - Tetsuya Murakami, Toshimasa Kimura, Takahide Uemori, Eitaro Kohno, Yoshiaki Kakuda:
On Notification Message Re-broadcasting for the Node-Disjoint Multipath Routing Method in Ad Hoc Networks to Counter Eavesdropping of Data Packets. ICDCS Workshops 2015: 11-16 - 2014
- Eitaro Kohno, Anri Kimura, Yoshiaki Kakuda:
On Parameters for the Secure Dispersed Data Transfer Scheme Using a Multipath Routing Method. ICDCS Workshops 2014: 140-145 - Takahide Uemori, Eitaro Kohno, Yoshiaki Kakuda:
Experimental evaluation of the effects with backtrack search and notification messages in the node-disjoint multipath scheme for secure dispersed data transfer method. ICMU 2014: 89-90 - Yuya Kitaura, Yuya Minami, Eitaro Kohno, Yoshiaki Kakuda:
A Self-Organized Approach for the Communication Method to Adapt Connectivity of Terminals in Bluetooth MANETs. ISORC 2014: 342-347 - Yuya Minami, Yuya Kitaura, Eitaro Kohno, Shinji Inoue, Tomoyuki Ohta, Yoshiaki Kakuda:
Delay- and Disruption-Tolerant Bluetooth MANET-Based Dual-Purpose Systems for Normal and Disaster Situations. UIC/ATC/ScalCom 2014: 615-619 - Tetsuya Murakami, Eitaro Kohno, Yoshiaki Kakuda:
An Adaptivity-Enhanced Multipath Routing Method for Secure Dispersed Data Transfer Method in Ad Hoc Networks with Varying Node Density. UIC/ATC/ScalCom 2014: 502-509 - Takahiro Shigeta, Eitaro Kohno, Yoshiaki Kakuda:
An Efficient Algorithm for Deriving Mobility Scenarios from New Mobility Model Representing Spatially and Temporally Biased Change of Node Mobility and Node Density for Mobile Ad Hoc Networks. UIC/ATC/ScalCom 2014: 556-562 - Hiroaki Yagi, Eitaro Kohno, Yoshiaki Kakuda:
On the Applicability of the Tree-Based Group ID Reassignment Routing Method for MANETs. UIC/ATC/ScalCom 2014: 609-614 - 2013
- Mario Takeuchi, Eitaro Kohno, Tomoyuki Ohta, Yoshiaki Kakuda:
Improving assurance of a sustainable route-split MANET routing by adapting node battery exhaustion. Telecommun. Syst. 54(1): 35-45 (2013) - Yuya Kitaura, Yuri Tsutsui, Koji Taketa, Eitaro Kohno, Shinji Inoue, Tomoyuki Ohta, Yoshiaki Kakuda:
The Assessment Information Acquisition and Dissemination System Based on Delay and Disruption Tolerant MANETs for the Hiroshima National Confectionery Exposition. CANDAR 2013: 476-479 - Takahide Uemori, Eitaro Kohno, Yoshiaki Kakuda:
A Node-Disjoint Multipath Scheme for Secure Dispersed Data Transfer in Ad Hoc Networks. CANDAR 2013: 441-447 - Noriaki Tanabe, Eitaro Kohno, Yoshiaki Kakuda:
A Path Authenticating Method Using Bloom Filters against Impersonation Attacks on Relaying Nodes for Wireless Sensor Networks. ICDCS Workshops 2013: 357-361 - 2012
- Eitaro Kohno, Tomoya Okazaki, Mario Takeuchi, Tomoyuki Ohta, Yoshiaki Kakuda, Masaki Aida:
Improvement of assurance including security for wireless sensor networks using dispersed data transmission. J. Comput. Syst. Sci. 78(6): 1703-1715 (2012) - Noriaki Tanabe, Eitaro Kohno, Yoshiaki Kakuda:
An Impersonation Attack Detection Method Using Bloom Filters and Dispersed Data Transmission for Wireless Sensor Networks. GreenCom 2012: 767-770 - Anri Kimura, Eitaro Kohno, Yoshiaki Kakuda:
Security and Dependability Enhancement of Wireless Sensor Networks with Multipath Routing Utilizing the Connectedness of Joint Nodes. ICDCS Workshops 2012: 342-348 - Tomoya Okazaki, Mario Takeuchi, Eitaro Kohno, Yoshiaki Kakuda:
Self-Organized Routing ID Tree-Based Multipath Construction for Ad Hoc Networks. ISORC Workshops 2012: 172-179
skipping 19 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-18 21:28 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint