default search action
Hiroshi Esaki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2008
- [b1]Hiroshi Esaki, Hideki Sunahara, Jun Murai:
Broadband Internet Deployment in Japan. Advanced Information Technology 4, IOS Press 2008, ISBN 978-1-58603-862-5
Journal Articles
- 2024
- [j34]Jin Nakazato, Kousuke Nakagawa, Koki Itoh, Romain Fontugne, Manabu Tsukada, Hiroshi Esaki:
WebRTC over 5 G: A Study of Remote Collaboration QoS in Mobile Environment. J. Netw. Syst. Manag. 32(1): 1 (2024) - 2023
- [j33]Ye Tao, Ehsan Javanmardi, Pengfei Lin, Jin Nakazato, Yuze Jiang, Manabu Tsukada, Hiroshi Esaki:
Zero-Knowledge Proof of Traffic: A Deterministic and Privacy-Preserving Cross Verification Mechanism for Cooperative Perception Data. IEEE Access 11: 142846-142861 (2023) - [j32]Hideya Ochiai, Md Delwar Hossain, Pawissakan Chirupphapa, Youki Kadobayashi, Hiroshi Esaki:
Modbus/RS-485 Attack Detection on Communication Signals with Machine Learning. IEEE Commun. Mag. 61(6): 43-49 (2023) - [j31]Takuro Sone, Shin Kato, Ray Atarashi, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki:
An Ontology for Spatio-Temporal Media Management and an Interactive Application. Future Internet 15(7): 225 (2023) - [j30]Hidetaka Masuda, Oussama El Marai, Manabu Tsukada, Tarik Taleb, Hiroshi Esaki:
Feature-Based Vehicle Identification Framework for Optimization of Collective Perception Messages in Vehicular Networks. IEEE Trans. Veh. Technol. 72(2): 2120-2129 (2023) - 2022
- [j29]Yukito Ueno, Ryo Nakamura, Yohei Kuga, Hiroshi Esaki:
A NIC-driven Architecture for High-speed IP Packet Forwarding on General-purpose Servers. J. Inf. Process. 30: 226-237 (2022) - [j28]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Decentralized Deep Learning for Multi-Access Edge Computing: A Survey on Communication Efficiency and Trustworthiness. IEEE Trans. Artif. Intell. 3(6): 963-972 (2022) - 2021
- [j27]Yuwei Sun, Hiroshi Esaki, Hideya Ochiai:
Adaptive Intrusion Detection in the Networking of Large-Scale LANs With Segmented Federated Learning. IEEE Open J. Commun. Soc. 2: 102-112 (2021) - 2020
- [j26]Yukito Ueno, Ryo Nakamura, Yohei Kuga, Hiroshi Esaki:
Fast Longest Prefix Matching by Exploiting SIMD Instructions. IEEE Access 8: 167027-167041 (2020) - [j25]Manabu Tsukada, Takaharu Oi, Masahiro Kitazawa, Hiroshi Esaki:
Networked Roadside Perception Units for Autonomous Driving. Sensors 20(18): 5320 (2020) - 2019
- [j24]Kazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
Latent Variable Based Anomaly Detection in Network System Logs. IEICE Trans. Inf. Syst. 102-D(9): 1644-1652 (2019) - 2018
- [j23]Ye Tao, Xin Li, Manabu Tsukada, Hiroshi Esaki:
Reliable Overlay Networking on ETSI GeoNetworking Standards. Int. J. Intell. Transp. Syst. Res. 16(2): 98-111 (2018) - [j22]Satoru Kobayashi, Kazuki Otomo, Kensuke Fukuda, Hiroshi Esaki:
Mining Causality of Network Events in Log Data. IEEE Trans. Netw. Serv. Manag. 15(1): 53-67 (2018) - 2015
- [j21]Ryo Nakamura, Kouji Okada, Yuji Sekiya, Hiroshi Esaki:
A common data plane for multiple overlay networks. Comput. Networks 92: 240-250 (2015) - [j20]Ikuo Nakagawa, Masahiro Hiji, Hiroshi Esaki:
Dripcast - Architecture and Implementation of Server-less Java Programming Framework for Billions of IoT Devices. J. Inf. Process. 23(4): 458-464 (2015) - 2014
- [j19]Hirochika Asai, Kensuke Fukuda, Patrice Abry, Pierre Borgnat, Hiroshi Esaki:
Network application profiling with traffic causality graphs. Int. J. Netw. Manag. 24(4): 289-303 (2014) - 2013
- [j18]Tri Trinh, Hiroshi Esaki, Chaodit Aswakul:
Dynamic Virtual Network Allocation for OpenFlow Based Cloud Resident Data Center. IEICE Trans. Commun. 96-B(1): 56-64 (2013) - [j17]Yosuke Himura, Kensuke Fukuda, Kenjiro Cho, Pierre Borgnat, Patrice Abry, Hiroshi Esaki:
Synoptic Graphlet: Bridging the Gap Between Supervised and Unsupervised Profiling of Host-Level Network Traffic. IEEE/ACM Trans. Netw. 21(4): 1284-1297 (2013) - 2011
- [j16]Hideya Ochiai, Hiroshi Esaki:
CCDM: Ladder-Logic Programming for Wireless Sensors and Actuators with Central Controller-Based Device Management. IEICE Trans. Commun. 94-B(8): 2208-2215 (2011) - 2010
- [j15]Yosuke Himura, Kensuke Fukuda, Patrice Abry, Kenjiro Cho, Hiroshi Esaki:
Characterization of Host-Level Application Traffic with Multi-Scale Gamma Model. IEICE Trans. Commun. 93-B(11): 3048-3057 (2010) - [j14]Hiroshi Esaki:
A consideration on R&D direction for future Internet architecture. Int. J. Commun. Syst. 23(6-7): 694-707 (2010) - [j13]Yosuke Himura, Kensuke Fukuda, Kenjiro Cho, Hiroshi Esaki:
An evaluation of automatic parameter tuning of a statistics-based anomaly detection algorithm. Int. J. Netw. Manag. 20(5): 295-316 (2010) - [j12]Guillaume Dewaele, Yosuke Himura, Pierre Borgnat, Kensuke Fukuda, Patrice Abry, Olivier J. J. Michel, Romain Fontugne, Kenjiro Cho, Hiroshi Esaki:
Unsupervised host behavior classification from connection patterns. Int. J. Netw. Manag. 20(5): 317-337 (2010) - 2009
- [j11]Sergio Carrilho, Hiroshi Esaki:
A Pub/Sub Message Distribution Architecture for Disruption Tolerant Networks. IEICE Trans. Inf. Syst. 92-D(10): 1888-1896 (2009) - [j10]Sho Fujita, Keiichi Shima, Yojiro Uo, Hiroshi Esaki:
A Decentralized VPN Service over Generalized Mobile Ad-Hoc Networks. IEICE Trans. Inf. Syst. 92-D(10): 1897-1904 (2009) - 2007
- [j9]Satoshi Katsuno, Katsuyuki Yamazaki, Tohru Asami, Hiroshi Esaki:
Performance evaluation of L2 over MPLS. Syst. Comput. Jpn. 38(5): 59-68 (2007) - 2006
- [j8]Hiroshi Esaki:
Special Section on Internet Technology VI. IEICE Trans. Commun. 89-B(4): 1043 (2006) - [j7]Nobuo Okabe, Shoichi Sakane, Kazunori Miyazawa, Kenichi Kamada, Masahiro Ishiyama, Atsushi Inoue, Hiroshi Esaki:
Implementing a Secure Autonomous Bootstrap Mechanism for Control Networks. IEICE Trans. Inf. Syst. 89-D(12): 2822-2830 (2006) - 2005
- [j6]Mallik Tatipamula, Francois Le Faucheur, Tomohiro Otani, Hiroshi Esaki:
Implementation of IPv6 services over a GMPLS-based IP/optical network. IEEE Commun. Mag. 43(5): 114-122 (2005) - [j5]Hiroshi Esaki:
Special Section on Internet Technology V. IEICE Trans. Commun. 88-B(4): 1325 (2005) - 2004
- [j4]Kensuke Fukuda, Kenjiro Cho, Hiroshi Esaki:
The impact of residential broadband traffic on Japanese ISP backbones. Comput. Commun. Rev. 35(1): 15-22 (2004) - [j3]Mallik Tatipamula, Patrick Grossetete, Hiroshi Esaki:
IPv6 integration and coexistence strategies for next-generation networks. IEEE Commun. Mag. 42(1): 88-96 (2004) - 1999
- [j2]Kenichi Nagami, Hiroshi Esaki, Yasuhiro Katsube, Osamu Nakamura:
Flow aggregated, traffic driven label mapping in label-switching networks. IEEE J. Sel. Areas Commun. 17(6): 1170-1177 (1999) - 1997
- [j1]Yasuhiro Katsube, Kenichi Nagami, Shigeo Matsuzawa, Hiroshi Esaki:
Internetworking based on cell switch router-architecture and protocol overview. Proc. IEEE 85(12): 1998-2006 (1997)
Conference and Workshop Papers
- 2024
- [c147]Ryo Iwaki, Jin Nakazato, Muhammad Asad, Ehsan Javanmardi, Kazuki Maruta, Manabu Tsukada, Hideya Ochiai, Hiroshi Esaki:
Optimizing mmWave Beamforming for High-Speed Connected Autonomous Vehicles: An Adaptive Approach. CCNC 2024: 1088-1089 - [c146]George Karimata, Jin Nakazato, Gia Khanh Tran, Katsuya Suto, Manabu Tsukada, Hiroshi Esaki:
Multi-UAVs Strategies for Ad Hoc Network with Multi-Agent Reinforcement Learning. ICOIN 2024: 726-729 - [c145]Kengo Suzuki, Jin Nakazato, Yuki Sasaki, Kazuki Maruta, Manabu Tsukada, Hiroshi Esaki:
Toward B5G/6G Connected Autonomous Vehicles: O-RAN-Driven Millimeter-Wave Beam Management and Handover Management. INFOCOM (Workshops) 2024: 1-6 - [c144]Ye Tao, Hongyi Wu, Ehsan Javanmardi, Manabu Tsukada, Hiroshi Esaki:
Zero-Knowledge Proof of Distinct Identity: a Standard-compatible Sybil-resistant Pseudonym Extension for C-ITS. IV 2024: 1828-1835 - [c143]Yuji Aizono, Takuya Sakamoto, Hideya Ochiai, Hiroshi Esaki:
Building Automation with Vision Transformer Using Synthetic Indoor Images for Room Light Control. KST 2024: 40-44 - [c142]Atsuya Muramatsu, Hideya Ochiai, Hiroshi Esaki:
Tuning Personalized Models by Two-Phase Parameter Decoupling with Device-to-Device Communication. KST 2024: 57-61 - [c141]Takuya Sakamoto, Yuji Aizono, Hideya Ochiai, Hiroshi Esaki:
Augmenting Room Light Patterns for Building Automation with Camera Images and Vision Transformer. KST 2024: 91-96 - [c140]Yudai Ueda, Hideya Ochiai, Hiroshi Esaki:
Device-to-Device Collaborative Learning for Self-Localization with Previous Model Utilization. KST 2024: 97-102 - [c139]Koki Itoh, Jin Nakazato, Romain Fontugne, Manabu Tsukada, Hiroshi Esaki:
Enhancing Real-Time Streaming Quality through a Multipath Redundant Communication Framework. IFIP Networking 2024: 1-10 - 2023
- [c138]Ye Tao, Yuze Jiang, Pengfei Lin, Manabu Tsukada, Hiroshi Esaki:
zk-PoT: Zero-Knowledge Proof of Traffic for Privacy Enabled Cooperative Perception. CCNC 2023: 261-268 - [c137]Eisuke Tomiyama, Hiroshi Esaki, Hideya Ochiai:
Competitive and Asynchronous Decentralized Federated Learning with Blockchain Smart Contracts. GoodIT 2023: 92-99 - [c136]Momoka Yamamoto, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki:
Iterative Resolution with IPv6 Packets Failing. ICCCN 2023: 1-2 - [c135]Yusuke Sugizaki, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki:
Umpire Assistance System in Baseball Game. IoT 2023: 287-294 - [c134]Ryusei Higuchi, Hiroshi Esaki, Hideya Ochiai:
Collaborative Multi-Task Learning across Internet Edges with Device-to-Device Communications. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2023: 555-562 - [c133]Ye Tao, Ehsan Javanmardi, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki:
Flowsim: A Modular Simulation Platform for Microscopic Behavior Analysis of City-Scale Connected Autonomous Vehicles. ITSC 2023: 2186-2193 - [c132]Ryusei Higuchi, Hideya Ochiai, Hiroshi Esaki:
Honeypot-Assisted Masquerade Detection with Character-Level Machine Learning. KST 2023: 1-6 - [c131]Eisuke Tomiyama, Hiroshi Esaki, Hideya Ochiai:
WAFL-GAN: Wireless Ad Hoc Federated Learning for Distributed Generative Adversarial Networks. KST 2023: 1-6 - [c130]Kazuma Inokuchi, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki:
Semantic digital twin for interoperability and Comprehensive Management of Data Assets. MetaCom 2023: 217-225 - [c129]Hideya Ochiai, Riku Nishihata, Eisuke Tomiyama, Yuwei Sun, Hiroshi Esaki:
Detection of Global Anomalies on Distributed IoT Edges with Device-to-Device Communication. MobiHoc 2023: 388-393 - [c128]Momoka Yamamoto, Jin Nakazato, Romain Fontugne, Manabu Tsukada, Hiroshi Esaki:
Poster: Evaluation of IPv6-only-Capable Iterative Resolvers. SIGCOMM 2023: 1102-1104 - [c127]Yu Asabe, Ehsan Javanmardi, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki:
AutowareV2X: Reliable V2X Communication and Collective Perception for Autonomous Driving. VTC2023-Spring 2023: 1-7 - [c126]Ryusei Higuchi, Hiroshi Esaki, Hideya Ochiai:
Personalized Wireless Ad Hoc Federated Learning for Label Preference Skew. WF-IoT 2023: 1-8 - [c125]Hideya Ochiai, Atsuya Muramatsu, Yudai Ueda, Ryuhei Yamaguchi, Kazuhiro Katoh, Hiroshi Esaki:
Tuning Vision Transformer with Device-to-Device Communication for Targeted Image Recognition. WF-IoT 2023: 1-6 - [c124]Yusuke Sugizaki, Hideya Ochiai, Muhammad Asad, Manabu Tsukada, Hiroshi Esaki:
Wireless Ad-Hoc Federated Learning for Cooperative Map Creation and Localization Models. WF-IoT 2023: 1-6 - [c123]Hideya Ochiai, Md Delwar Hossain, Youki Kadobayashi, Hiroshi Esaki:
Attacker Localization with Machine Learning in RS-485 Industrial Control Networks. WFCS 2023: 1-8 - 2022
- [c122]Pawissakan Chirupphapa, Hiroshi Esaki, Hideya Ochiai:
Feature Extraction Pipeline and Analysis of Suspicious Events in Large-Scale LANs for Cyberattack Categorization. BDE 2022: 104-112 - [c121]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks. CCNC 2022: 743-744 - [c120]Manabu Tsukada, Shimpei Arii, Hideya Ochiai, Hiroshi Esaki:
Misbehavior Detection Using Collective Perception under Privacy Considerations. CCNC 2022: 808-814 - [c119]Shugo Fujimura, Koki Fujita, Yuwei Sun, Hiroshi Esaki, Hideya Ochiai:
A Flexible Distributed Building Simulator for Federated Reinforcement Learning. COINS 2022: 1-6 - [c118]Koki Fujita, Shugo Fujimura, Yuwei Sun, Hiroshi Esaki, Hideya Ochiai:
Federated Reinforcement Learning for the Building Facilities. COINS 2022: 1-6 - [c117]Koichiro Kanaya, Yasunobu Toyota, Wataru Mishima, Hiroki Shirokura, Hiroshi Esaki:
QoE-Aware Content Oriented Path Optimization Framework with Egress Peer Engineering. CANDAR 2022: 36-45 - [c116]Pawissakan Chirupphapa, Md Delwar Hossain, Hiroshi Esaki, Hideya Ochiai:
Unsupervised Anomaly Detection in RS-485 Traffic using Autoencoders with Unobtrusive Measurement. IPCCC 2022: 17-23 - [c115]Yukito Ueno, Ryo Nakamura, Yohei Kuga, Hiroshi Esaki:
Pktpit: separating routing and packet transfer for fast and scalable software routers. SAC 2022: 943-951 - [c114]Akihiro Kiuchi, Taishi Eguchi, Jun Rekimoto, Manabu Tsukada, Hiroshi Esaki:
ZIGEN: A Windowing System Enabling Multitasking Among 3D and 2D Applications in Immersive Environments. SIGGRAPH Posters 2022: 34:1-34:2 - [c113]Naoya Tezuka, Hideya Ochiai, Yuwei Sun, Hiroshi Esaki:
Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning Attacks. TPS-ISA 2022: 168-177 - 2021
- [c112]Kosuke Nakagawa, Manabu Tsukada, Keiichi Shima, Hiroshi Esaki:
WebRTC-based measurement tool for peer-to-peer applications and preliminary findings with real users. AINTEC 2021: 1-8 - [c111]Yuyi Cai, Manabu Tsukada, Hideya Ochiai, Hiroshi Esaki:
MAC address randomization tolerant crowd monitoring system using Wi-Fi packets. AINTEC 2021: 27-33 - [c110]Porapat Ongkanchana, Romain Fontugne, Hiroshi Esaki, Job Snijders, Emile Aben:
Hunting BGP zombies in the wild. ANRW 2021: 1-7 - [c109]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Multi-Type Anomaly Detection Based on Raw Network Traffic. CCNC 2021: 1-2 - [c108]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Deep Learning-Based Anomaly Detection in LAN from Raw Network Traffic Measurement. CISS 2021: 1-5 - [c107]Kazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Osamu Akashi, Kimihiro Mizutani, Hiroshi Esaki:
Towards Extracting Semantics of Network Config Blocks. COMPSAC 2021: 1443-1448 - [c106]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Intrusion Measurement and Detection in LAN Using Protocol-Wise Associative Memory. ICAIIC 2021: 5-9 - [c105]Meatasit Karakate, Hiroshi Esaki, Hideya Ochiai:
SDNHive: A Proof-of-Concept SDN and Honeypot System for Defending Against Internal Threats. ICCNS 2021: 9-20 - [c104]Yichuan Chen, Manabu Tsukada, Hiroshi Esaki:
Reinforcement Learning Based Optimal Camera Placement for Depth Observation of Indoor Scenes. ICNSC 2021: 1-6 - [c103]Kazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
Latent Semantics Approach for Network Log Analysis: Modeling and its application. IM 2021: 215-223 - [c102]Yukito Ueno, Ryo Nakamura, Yohei Kuga, Hiroshi Esaki:
P2PNIC: High-Speed Packet Forwarding by Direct Communication between NICs. INFOCOM Workshops 2021: 1-6 - [c101]Masaya Mizutani, Manabu Tsukada, Hiroshi Esaki:
AutoMCM: Maneuver Coordination Service with Abstracted Functions for Autonomous Driving. ITSC 2021: 1069-1076 - 2020
- [c100]Sheng Gong, Hideya Ochiai, Hiroshi Esaki:
Scan-Based Self Anomaly Detection: Client-Side Mitigation of Channel-Based Man-in-the-Middle Attacks Against Wi-Fi. COMPSAC 2020: 1498-1503 - [c99]Masaya Mizutani, Manabu Tsukada, Yuki Iida, Hiroshi Esaki:
3D maps distribution of self-driving vehicles using roadside edges. CANDAR (Workshops) 2020: 40-45 - [c98]Takashi Kasuya, Takai Takeshi, Hiroshi Esaki:
Building Activity Profiling: Explainable and Predictive Modeling for Building Automation. ICAIIC 2020: 242-247 - [c97]Yuwei Sun, Hiroshi Esaki, Hideya Ochiai:
Blockchain-Based Federated Learning Against End-Point Adversarial Data Corruption. ICMLA 2020: 729-734 - [c96]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Intrusion Detection with Segmented Federated Learning for Large-Scale Multiple LANs. IJCNN 2020: 1-8 - [c95]Zhiqing Zhang, Pawissakan Chirupphapa, Hiroshi Esaki, Hideya Ochiai:
XGBoosted Misuse Detection in LAN-Internal Traffic Dataset. ISI 2020: 1-6 - [c94]Kazuma Inokuchi, Manabu Tsukada, Hiroshi Esaki:
Co-sound: An Interactive Medium with WebAR and Spatial Synchronization. ICEC 2020: 255-263 - [c93]Yukito Ueno, Ryo Nakamura, Yohei Kuga, Hiroshi Esaki:
Spider: Parallelizing Longest Prefix Matching with Optimization for SIMD Instructions. NetSoft 2020: 267-271 - [c92]Rikuta Furuta, Hideya Ochiai, Hiroshi Esaki:
Mitigating Privacy Leak by Injecting Unique Noise into the Traffic of Smart Speakers. SMARTCOMP 2020: 452-457 - [c91]Manabu Tsukada, Takaharu Oi, Akihide Ito, Mai Hirata, Hiroshi Esaki:
AutoC2X: Open-source software to realize V2X cooperative perception among autonomous vehicles. VTC Fall 2020: 1-6 - 2019
- [c90]Hyuga Kobayashi, Zhiqing Zhang, Hideya Ochiai, Hiroshi Esaki:
Probing Firewalls of Malware-Infected Networks with Honeypot. CFI 2019: 3:1-3:4 - [c89]Takashi Kasuya, Manabu Tsukada, Yu Komohara, Shigeki Takasaka, Takuhiro Mizuno, Yoshitaka Nomura, Yuta Ueda, Hiroshi Esaki:
LiVRation: Remote VR live platform with interactive 3D audio-visual service. GEM 2019: 1-7 - [c88]Toki Suga, Kazuya Okada, Hiroshi Esaki:
Toward Real-time Packet Classification for Preventing Malicious Traffic by Machine Learning. ICIN 2019: 106-111 - [c87]Kai Matsufuji, Satoru Kobayashi, Hiroshi Esaki, Hideya Ochiai:
ARP Request Trend Fitting for Detecting Malicious Activity in LAN. IMCOM 2019: 89-96 - [c86]Supanat Limjitti, Hideya Ochiai, Hiroshi Esaki, Kunwadee Sripanidkulchai:
IoT-VuLock: Locking IoT Device Vulnerability with Enhanced Network Scans. IMCOM 2019: 225-233 - [c85]Porapat Ongkanchana, Hiroshi Esaki, Hideya Ochiai:
A Rule-Based Algorithm of Finding Valid Hosts for IoT Device Using Its Network Traffic. IMCOM 2019: 279-287 - [c84]Zhiqing Zhang, Hiroshi Esaki, Hideya Ochiai:
Analysis of Malware Hidden Behind Firewalls with Back Scans. ISDFS 2019: 1-6 - [c83]Manabu Tsukada, Masahiro Kitazawa, Takaharu Oi, Hideya Ochiai, Hiroshi Esaki:
Cooperative awareness using roadside unit networks in mixed traffic. VNC 2019: 1-8 - 2018
- [c82]Tomoyuki Kitabatake, Romain Fontugne, Hiroshi Esaki:
BLT: A taxonomy and classification tool for mining BGP update messages. INFOCOM Workshops 2018: 409-414 - [c81]Mohd. Saalim Jamal, Venkata Keerthy S, Hideya Ochiai, Hiroshi Esaki, Kotaro Kataoka:
INSTRUCT: A Clustering Based Identification of Valid Communications in IoT Networks. IoTSMS 2018: 228-233 - [c80]Ray Atarashi, Takuro Sone, Yu Komohara, Manabu Tsukada, Takashi Kasuya, Hiraku Okumura, Masahiro Ikeda, Hiroshi Esaki:
The Software Defined Media Ontology for Music Events. SAAM@ISWC 2018: 15-23 - [c79]Kazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
Finding Anomalies in Network System Logs with Latent Variables. Big-DAMA@SIGCOMM 2018: 8-14 - 2017
- [c78]Hideya Ochiai, Zhiqing Zhang, Hiroto Kitamura, Hiroshi Esaki:
IR-XY-PV: Infrared Multihop Communication for XY-Coordinated PV Modules. AINTEC 2017: 1-7 - [c77]Motomu Utsumi, Hajime Tazaki, Hiroshi Esaki:
/dev/stdpkt: A Service Chaining Architecture with Pipelined Operating System Instances in a Unix Shell. AINTEC 2017: 8-15 - [c76]Kazuki Otomo, Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
An Analysis of Burstiness and Causality of System Logs. AINTEC 2017: 16-23 - [c75]Motomu Utsumi, Hirochika Asai, Hiroshi Esaki:
Spatio-Temporal Modeling of BGP Routing Table Evolution. CFI 2017: 8:1-8:7 - [c74]Zhiqing Zhang, Hideya Ochiai, Hiroshi Esaki:
An IoT Application-Layer Protocol Modem: A Case Study on Interfacing IEEE 1888 with AT Commands. CyberC 2017: 346-349 - [c73]Manabu Tsukada, Keiko Ogawa, Masahiro Ikeda, Takuro Sone, Kenta Niwa, Shoichiro Saito, Takashi Kasuya, Hideki Sunahara, Hiroshi Esaki:
Software defined media: Virtualization of audio-visual services. ICC 2017: 1-7 - [c72]Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
Mining causes of network events in log data with causal inference. IM 2017: 45-53 - [c71]Hiroshi Esaki, Ryo Nakamura:
Overlaying and slicing for IoT era based on internet's end-to-end discipline. LANMAN 2017: 1-6 - [c70]Ajinkya Mulay, Hideya Ochiai, Hiroshi Esaki:
IoT WebSocket Connection Management Algorithm for Early Warning Earthquake Alert Applications. UCC (Companion") 2017: 189-194 - 2016
- [c69]Ryo Nakamura, Yohei Kuga, Yuji Sekiya, Hiroshi Esaki:
Protocol-Independent FIB Architecture for Network Overlays. APSys 2016: 8:1-8:7 - [c68]Ikuo Nakagawa, Masahiro Hiji, Hiroshi Esaki:
Design and Implementation of Global Reference and Indirect Method Invocation Mechanisms in the Dripcast. COMPSAC Workshops 2016: 338-343 - [c67]Tomoya Kitazato, Manabu Tsukada, Hideya Ochiai, Hiroshi Esaki:
Proxy cooperative awareness message: an infrastructure-assisted V2V messaging. ICMU 2016: 1-6 - [c66]Ye Tao, Xin Li, Manabu Tsukada, Hiroshi Esaki:
DUPE: Duplicated Unicast Packet Encapsulation in Position-based Routing VANET. WMNC 2016: 123-130 - 2015
- [c65]Ayumu Hirata, Daisuke Miyamoto, Masaya Nakayama, Hiroshi Esaki:
INTERCEPT+: SDN Support for Live Migration-Based Honeypots. BADGERS@RAID 2015: 16-24 - [c64]Ye Tao, Manabu Tsukada, Xin Li, Masatoshi Kakiuchi, Hiroshi Esaki:
Reproducing and Extending Real Testbed Evaluation of GeoNetworking Implementation in Simulated Networks. CFI 2015: 27-34 - [c63]Hiroyuki Ikegami, Raja Vara Prasad Yerra, Pachamuthu Rajalakshmi, Hiroshi Esaki:
Real Time Power Capping with Smart Circuit Breaker to Maximize Power Utilization of Local Generator. COMPSAC Workshops 2015: 505-510 - [c62]Ryo Nakamura, Yuji Sekiya, Hiroshi Esaki:
Layer-3 multipathing in commodity-based data center networks. INFOCOM Workshops 2015: 318-323 - [c61]Hiroyuki Ikegami, Manabu Tsukada, Hideya Ochiai, Hideaki Nii, Hiroshi Esaki:
Electric current based power line communication for plug-load device auto identification. SmartGridComm 2015: 121-126 - [c60]Hoan Tran Quoc, Hideya Ochiai, Hiroshi Esaki:
Hidden topics modeling approach for review quality prediction and classification. SoCPaR 2015: 278-283 - 2014
- [c59]Satoru Kobayashi, Kensuke Fukuda, Hiroshi Esaki:
Towards an NLP-based log template generation algorithm for system log analysis. CFI 2014: 11:1-11:4 - [c58]Ikuo Nakagawa, Masahiro Hiji, Hiroshi Esaki:
Dripcast - Server-less Java Programming Framework for Billions of IoT Devices. COMPSAC Workshops 2014: 186-191 - [c57]Hideya Ochiai, Hiroyuki Ikegami, Yuuichi Teranishi, Hiroshi Esaki:
Facility Information Management on HBase: Large-Scale Storage for Time-Series Data. COMPSAC Workshops 2014: 306-311 - [c56]Hideya Ochiai, Yuuichi Teranishi, Hiroshi Esaki:
InNetTC: in-network traffic control for full IP sensor-actuator networks. ICUIMC 2014: 3:1-3:7 - [c55]Ryo Nakamura, Kouji Okada, Yuji Sekiya, Hiroshi Esaki:
ovstack: A protocol stack of common data plane for overlay networks. NOMS 2014: 1-8 - [c54]Hideya Ochiai, Hiroki Nakagami, Yuuichi Teranishi, Hiroshi Esaki:
Facility networking with IP over RS485: Packet control for master-slave cascaded networks. SmartGridComm 2014: 410-415 - [c53]Masato Yamanouchi, Hideya Ochiai, Y. K. Reddy, Hiroshi Esaki, Hideki Sunahara:
Case Study of Constructing Weather Monitoring System in Difficult Environment. UIC/ATC/ScalCom 2014: 692-696 - [c52]Manussanun Buranachokphaisan, Hideya Ochiai, Hiroshi Esaki:
Unidirectional Link-Aware DTN-based sensor network in building monitoring scenario. Wireless Days 2014: 1-4 - 2013
- [c51]Yutaro Mishima, Kensuke Fukuda, Hiroshi Esaki:
An Analysis of Players and Bots Behaviors in MMORPG. AINA 2013: 870-876 - [c50]Ryo Nakamura, Yuji Sekiya, Hiroshi Esaki:
Implementation and Operation of User Defined Network on IaaS Clouds using Layer 3 Overlay. CLOSER 2013: 366-369 - [c49]Romain Fontugne, Nicolas Tremblay, Pierre Borgnat, Patrick Flandrin, Hiroshi Esaki:
Mining anomalous electricity consumption using Ensemble Empirical Mode Decomposition. ICASSP 2013: 5238-5242 - [c48]Youngjoon Won, Romain Fontugne, Kenjiro Cho, Hiroshi Esaki, Kensuke Fukuda:
Nine years of observing traffic anomalies: Trending analysis in backbone networks. IM 2013: 636-642 - [c47]Romain Fontugne, Jorge Ortiz, Nicolas Tremblay, Pierre Borgnat, Patrick Flandrin, Kensuke Fukuda, David E. Culler, Hiroshi Esaki:
Strip, bind, and search: a method for identifying abnormal energy consumption in buildings. IPSN 2013: 129-140 - 2012
- [c46]Johan Mazel, Hiroshi Esaki, Romain Fontugne, Kensuke Fukuda:
Improving an SVD-based combination strategy of anomaly detectors for traffic labelling. AINTEC 2012: 69-76 - 2011
- [c45]Luciano Aparicio, Rodney Van Meter, Hiroshi Esaki:
Protocol design for quantum repeater networks. AINTEC 2011: 73-80 - [c44]Hideya Ochiai, Kenji Matsuo, Satoshi Matsuura, Hiroshi Esaki:
A Case Study of UTMesh: Design and Impact of Real World Experiments with Wi-Fi and Bluetooth Devices. SAINT 2011: 433-438 - [c43]Hirochika Asai, Kensuke Fukuda, Hiroshi Esaki:
Traffic causality graphs: Profiling network applications through temporal and spatial causality of flows. ITC 2011: 95-102 - [c42]Hideya Ochiai, Masaya Nakayama, Hiroshi Esaki:
Hop-by-hop reliable, parallel message propagation for intermittently-connected mesh networks. WOWMOM 2011: 1-9 - 2010
- [c41]Kaveevivitchai Sathita, Hiroshi Esaki:
Independent DTNs message deletion mechanism for multi-copy routing scheme. AINTEC 2010: 48-55 - [c40]Hirochika Asai, Kensuke Fukuda, Hiroshi Esaki:
Towards characterization of wireless traffic in coexisting 802.11a/g and 802.11n network. StudentWorkshop@CoNEXT 2010: 1:1-1:2 - [c39]Hirochika Asai, Hiroshi Esaki:
Estimating AS Relationships for Application-Layer Traffic Optimization. ETM 2010: 51-63 - [c38]Hideya Ochiai, Kenichi Shimotada, Hiroshi Esaki:
DTIPN: delay tolerant IP networking for opportunistic network applications. MobiOpp 2010: 65-71 - [c37]Lertluck Leela-amornsin, Hiroshi Esaki:
Heuristic Congestion Control for Message Deletion in Delay Tolerant Network. NEW2AN 2010: 287-298 - [c36]Kaveevivitchai Sathita, Hideya Ochiai, Hiroshi Esaki:
Message Deletion and Mobility Patterns for Efficient Message Delivery in DTNs. PerCom Workshops 2010: 760-763 - 2009
- [c35]Yosuke Himura, Kensuke Fukuda, Kenjiro Cho, Hiroshi Esaki:
An Automatic and Dynamic Parameter Tuning of a Statistics-Based Anomaly Detection Algorithm. ICC 2009: 1-6 - [c34]Sho Fujita, Hiroshi Esaki:
ATMOS: A middleware for Transparent MObile ad-hoc networking Systems. ICUIMC 2009: 180-184 - [c33]Hideya Ochiai, Hiroshi Esaki:
Message routing on potential-fields in forwarding-based DTNs. ICUIMC 2009: 185-193 - [c32]Hideya Ochiai, Kenichi Shimotada, Hiroshi Esaki:
IP over DTN: Large-delay asynchronous packet delivery in the internet. ICUMT 2009: 1-4 - [c31]Kaoru Yoshida, Yutaka Kikuchi, Masateru Yamamoto, Yoriko Fujii, Kenichi Nagami, Ikuo Nakagawa, Hiroshi Esaki:
Inferring POP-Level ISP Topology through End-to-End Delay Measurement. PAM 2009: 35-44 - [c30]Akihiro Sugiyama, Hideya Ochiai, Hiroshi Esaki:
CCDM: Central Controller-Based Device Management Architecture and Method to Split Management Scripts. SAINT 2009: 185-188 - [c29]Kaveevivitchai Sathita, Hideya Ochiai, Hiroshi Esaki:
RainWatch Project: Location-Awared Realtime Detection and Notification of Rain on Internet-Based Sensor Network. SAINT 2009: 259-262 - [c28]Elyes Ben Hamida, Hideya Ochiai, Hiroshi Esaki, Pierre Borgnat, Patrice Abry, Eric Fleury:
Measurement Analysis of the Live E! Sensor Network: Spatial-Temporal Correlations and Data Aggregation. SAINT 2009: 263-266 - 2008
- [c27]Hideya Ochiai, Hiroshi Esaki:
Mobility entropy and message routing in community-structured delay tolerant networks. AINTEC 2008: 93-102 - [c26]Kenjiro Cho, Kensuke Fukuda, Hiroshi Esaki, Akira Kato:
Observing slow crustal movement in residential user traffic. CoNEXT 2008: 12 - [c25]Sho Fujita, Tadashi Yasumoto, Hiroshi Esaki:
On seamless connectivity over multi-radio and multi-channel wireless mesh networks. CoNEXT 2008: 58 - [c24]Hideya Ochiai, Hiroshi Esaki:
Accuracy-Based Cache Consistency Management for Numerical Object Replication. SAINT 2008: 421-424 - 2007
- [c23]Hiroshi Esaki, Hideki Sunahara:
Live E! Project; Sensing the Earth with Internet Weather Stations. SAINT 2007: 1 - [c22]Satoshi Matsuura, Hiroki Ishizuka, Hideya Ochiai, Shinichi Doi, Shinichi Ishida, Masaya Nakayama, Hiroshi Esaki, Hideki Sunahara:
Live E! Project: Establishment of Infrastructure Sharing Environmental Information. SAINT Workshops 2007: 67 - [c21]Hideya Ochiai, Hiroshi Esaki:
Architecture of Scalable Embedded Device Management System with Configurable Plug-In Translator. SAINT Workshops 2007: 73 - [c20]Hideya Ochiai, Zhiyong Wang, Ryo Oguchi, Tetsuhiro Sugiyama, Yusuke Sakamoto, Shinichi Ishida, Hiroshi Esaki:
Application of Content-Based Network for Sensor Data Distribution System. SAINT Workshops 2007: 74 - [c19]Hideki Sunahara, Toshifumi Matsumoto, Hiroshi Esaki:
Message from Organizers Practical Applications of Sensor Networking. SAINT Workshops 2007 - 2006
- [c18]Masaya Nakayama, Satoshi Matsuura, Hiroshi Esaki, Hideki Sunahara:
Live E! Project: Sensing the Earth. AINTEC 2006: 61-74 - [c17]Hiroki Ishizuka, Kenji Sasaki, Satoshi Matsuura, Makoto Kamiya, Hideki Sunahara, Hiroshi Esaki:
Collecting Adaptive Data for Isolated Wireless Sensors with Patrol Nodes in Live E!. MDM 2006: 136 - [c16]Hiroshi Esaki, Akira Kato, Jun Murai:
IPv6 R&D Activities in WIDE Project. SAINT Workshops 2006: 2-5 - [c15]Yoshihiko Kanaurni, Takashi Miyake, Ichiro Yamauchi, Kazumasa Kobayashi, Hiroshi Esaki:
JGN 11 (Japan Gigabit Network 11). SAINT Workshops 2006: 18-21 - [c14]Nobuo Okabe, Shoichi Sakane, Masahiro Ishiyama, Atsushi Inoue, Hiroshi Esaki:
A Prototype of a Secure Autonomous Bootstrap Mechanism for Control Networks. SAINT 2006: 56-62 - [c13]Kenjiro Cho, Kensuke Fukuda, Hiroshi Esaki, Akira Kato:
The impact and implications of the growth in residential user-to-user traffic. SIGCOMM 2006: 207-218 - 2005
- [c12]Ichiro Yamauchi, Takashi Miyake, Yukiji Mikamo, Junichi Shimada, Kazumasa Kobayashi, Hiroshi Esaki:
JGN II (Japan Gigabit Network II): A Research and Development System for Advanced Broadband Networks. SAINT Workshops 2005: 34-37 - 2004
- [c11]Hiroshi Esaki:
Multi-Homing and Multi-Path Architecture Using Mobile IP and NEMO Framework. SAINT 2004: 6 - [c10]Yukiji Mikamo, Hisayoshi Hayashi, Takashi Miyake, Satoshi Katsuno, Kazumasa Kobayashi, Hiroshi Esaki:
An Evaluation of IPv6 Multicast Router in JGN IPv6 Networks. SAINT Workshops 2004: 146-152 - [c9]Mitsuru Kanda, Kazunori Miyazawa, Hiroshi Esaki:
USAGI IPv6 IPsec Development for Linux. SAINT Workshops 2004: 159-164 - [c8]Satoshi Uda, Nobuo Ogashiwa, Kenichi Nagami, Kuniaki Kondo, Ikuo Nakagawa, Yoichi Shinoda, Hiroshi Esaki:
Design and Implementation of Overlaying Multi-Homing Architecture. SAINT Workshops 2004: 165-172 - 2003
- [c7]Kazumasa Kobayashi, Kazuhiko Nakamura, Hisayoshi Hayashi, Yoshinori Kitatsuji, Satoshi Katsuno, Yukiji Mikamo, Akihiko Machizawa, Hiroshi Esaki:
JGN IPv6 Network. SAINT Workshops 2003: 161-166 - [c6]Hiroshi Esaki, Akira Kato, Jun Murai:
R&D Activities and Testbed Operatio in WIDE Project. SAINT Workshops 2003: 172-177 - [c5]Shoichi Sakane, Nobuo Okabe, Kenichi Kamada, Hiroshi Esaki:
Applying Kerberos to the Communication Environment for Information Appliances. SAINT Workshops 2003: 214-217 - [c4]Kengo Nagahashi, Hiroshi Esaki, Jun Murai:
BGP Integrity Check for the Conflict Origin AS Prefix in the Inter-domain Routing. SAINT 2003: 276-282 - [c3]Satoshi Katsuno, Katsuyuki Yamazaki, Takahiro Kubo, Hiroshi Esaki:
Measurement and Analysis of Multimedia Application and IPv6 ADSL Internet Access Network. SAINT 2003: 402-405 - 2002
- [c2]Ikuo Nakagawa, Hiroshi Esaki, Kenichi Nagami:
A Design of a Next Generation IX using MPLS Technology. SAINT 2002: 238-245 - 1997
- [c1]Hiroshi Esaki, Shigeo Matsuzawa, Akiyoshi Mogi, Ken-ichi Ngami, Tatsuya Jinmei, Toru Kon'no, Yasuhiro Katsube:
Cell-switch router (CSR): label-switching router supporting standard ATM interfaces. Broadband Networking Technologies 1997: 2-10
Editorship
- 2014
- [e1]Hiroshi Esaki:
International Conference of Future Internet 2014, CFI '14, Tokyo, Japan, June 18-20, 2014. ACM 2014, ISBN 978-1-4503-2942-2 [contents]
Informal and Other Publications
- 2024
- [i21]Ye Tao, Hongyi Wu, Ehsan Javanmardi, Manabu Tsukada, Hiroshi Esaki:
Zero-Knowledge Proof of Distinct Identity: a Standard-compatible Sybil-resistant Pseudonym Extension for C-ITS. CoRR abs/2403.14020 (2024) - [i20]Yuze Jiang, Ehsan Javanmardi, Manabu Tsukada, Hiroshi Esaki:
Accurate Cooperative Localization Utilizing LiDAR-equipped Roadside Infrastructure for Autonomous Driving. CoRR abs/2407.08384 (2024) - [i19]Hideya Ochiai, Riku Nishihata, Eisuke Tomiyama, Yuwei Sun, Hiroshi Esaki:
Detection of Global Anomalies on Distributed IoT Edges with Device-to-Device Communication. CoRR abs/2407.11308 (2024) - 2023
- [i18]Ye Tao, Ehsan Javanmardi, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki:
Flowsim: A Modular Simulation Platform for Microscopic Behavior Analysis of City-Scale Connected Autonomous Vehicles. CoRR abs/2306.05738 (2023) - [i17]Yuze Jiang, Ehsan Javanmardi, Jin Nakazato, Manabu Tsukada, Hiroshi Esaki:
Roadside LiDAR Assisted Cooperative Localization for Connected Autonomous Vehicles. CoRR abs/2311.07913 (2023) - [i16]Ye Tao, Ehsan Javanmardi, Pengfei Lin, Jin Nakazato, Yuze Jiang, Manabu Tsukada, Hiroshi Esaki:
Zero-Knowledge Proof of Traffic: A Deterministic and Privacy-Preserving Cross Verification Mechanism for Cooperative Perception Data. CoRR abs/2312.07948 (2023) - 2022
- [i15]Hideya Ochiai, Yuwei Sun, Qingzhe Jin, Nattanon Wongwiwatchai, Hiroshi Esaki:
Wireless Ad Hoc Federated Learning: A Fully Distributed Cooperative Machine Learning. CoRR abs/2205.11779 (2022) - [i14]Naoya Tezuka, Hideya Ochiai, Yuwei Sun, Hiroshi Esaki:
Resilience of Wireless Ad Hoc Federated Learning against Model Poisoning Attacks. CoRR abs/2211.03489 (2022) - [i13]Ye Tao, Yuze Jiang, Pengfei Lin, Manabu Tsukada, Hiroshi Esaki:
zk-PoT: Zero-Knowledge Proof of Traffic for Privacy Enabled Cooperative Perception. CoRR abs/2211.07875 (2022) - 2021
- [i12]Masaya Mizutani, Manabu Tsukada, Hiroshi Esaki:
AutoMCM: Maneuver Coordination Service with Abstracted Functions for Autonomous Driving. CoRR abs/2107.06627 (2021) - [i11]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Decentralized Deep Learning for Mobile Edge Computing: A Survey on Communication Efficiency and Trustworthiness. CoRR abs/2108.03980 (2021) - [i10]Yuwei Sun, Hideya Ochiai, Hiroshi Esaki:
Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks. CoRR abs/2108.09062 (2021) - [i9]Yichuan Chen, Manabu Tsukada, Hiroshi Esaki:
Reinforcement Learning Based Optimal Camera Placement for Depth Observation of Indoor Scenes. CoRR abs/2110.11106 (2021) - [i8]Manabu Tsukada, Shimpei Arii, Hideya Ochiai, Hiroshi Esaki:
Misbehavior Detection Using Collective Perception under Privacy Considerations. CoRR abs/2111.03461 (2021) - [i7]Yuyi Cai, Manabu Tsukada, Hideya Ochiai, Hiroshi Esaki:
MAC address randomization tolerant crowd monitoring system using Wi-Fi packets. CoRR abs/2112.02161 (2021) - [i6]Kosuke Nakagawa, Manabu Tsukada, Keiichi Shima, Hiroshi Esaki:
WebRTC-based measurement tool for peer-to-peer applications and preliminary findings with real users. CoRR abs/2112.02163 (2021) - 2017
- [i5]Manabu Tsukada, Keiko Ogawa, Masahiro Ikeda, Takuro Sone, Kenta Niwa, Shoichiro Saito, Takashi Kasuya, Hideki Sunahara, Hiroshi Esaki:
Software Defined Media: Virtualization of Audio-Visual Services. CoRR abs/1702.07452 (2017) - 2007
- [i4]Kenichi Nagami, Satoshi Uda, Nobuo Ogashiwa, Hiroshi Esaki, Ryuji Wakikawa, Hiroyuki Ohnishi:
Multi-homing for small scale fixed network Using Mobile IP and NEMO. RFC 4908: 1-10 (2007) - 2001
- [i3]Kenichi Nagami, Yasuhiro Katsube, Noritoshi Demizu, Hiroshi Esaki, Paul Doolan:
VCID Notification over ATM link for LDP. RFC 3038: 1-19 (2001) - 1997
- [i2]Yasuhiro Katsube, Kenichi Nagami, Hiroshi Esaki:
Toshiba's Router Architecture Extensions for ATM : Overview. RFC 2098: 1-18 (1997) - [i1]Kenichi Nagami, Yasuhiro Katsube, Yasuro Shobatake, Akiyoshi Mogi, Shigeo Matsuzawa, Tatsuya Jinmei, Hiroshi Esaki:
Toshiba's Flow Attribute Notification Protocol (FANP) Specification. RFC 2129: 1-19 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint