Zobrazeno 1 - 10
of 110
pro vyhledávání: '"Hiroaki Higaki"'
This volume comprises a collection of papers from the 12th international conference on information networking. (ICOIN-12) held in Tokyo 1998. Technical papers on communication networks and distributed systems were presented, along side internet-based
Autor:
Hiroaki Higaki, Masaaki Namekata
Publikováno v:
Proceedings of Fifth International Congress on Information and Communication Technology ISBN: 9789811558580
In wireless networks composed of numbers of mobile wireless nodes, their location information is required to be achieved for fundamental network services such as routing of data messages and determination of server nodes providing various services su
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::76d6150a37a889faa96dab68a4d98ab4
https://doi.org/10.1007/978-981-15-5859-7_43
https://doi.org/10.1007/978-981-15-5859-7_43
Autor:
Hiroaki Higaki, Naoshi Yakura
Publikováno v:
2019 International Conference on Computational Science and Computational Intelligence (CSCI).
In wireless multihop transmissions of data messages in wireless adhoc networks, it is surely assumed that both of a routing protocol and a data message transmission protocol work correctly in each intermediate wireless node. Until now, for flooding b
Autor:
Yusuke Aoi, Hiroaki Higaki
Publikováno v:
2019 International Conference on Computational Science and Computational Intelligence (CSCI).
For support of interactive multimedia applications in wireless multihop networks, a sequence of data messages are required to be transmitted simultaneously in both directions. Here, intermediate wireless nodes hold temporarily data messages in both d
Autor:
Masayoshi Hayashi, Hiroaki Higaki
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811358258
SSCC
SSCC
One of the fundamental methods for eavesdroppers to achieve a plaintext from a cryptogram is the brute force attack where possible candidates of decryption keys are exhaustively applied to the decryption algorithm. Here the only reason why the eavesd
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::668bb7e9c4853e0329a2d0ae6c719c0d
https://doi.org/10.1007/978-981-13-5826-5_28
https://doi.org/10.1007/978-981-13-5826-5_28
Autor:
Masahiro Okuri, Hiroaki Higaki
Publikováno v:
SoftCOM
In wireless sensor networks, data messages containing sensor data achieved by a sensor module in a wireless sensor node is transmitted to a stationary wireless sink node along a wireless multihop transmission route in which wireless sensor nodes them
Autor:
Masayoshi Hayashi, Hiroaki Higaki
Publikováno v:
2018 Second World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4).
Autor:
Hiroaki Higaki, Ayako Arao
Publikováno v:
Proceedings of the 2018 International Conference on Computer Science, Electronics and Communication Engineering (CSECE 2018).
Autor:
Hiroaki Higaki, Masahiro Okuri
Publikováno v:
MATEC Web of Conferences, Vol 210, p 03011 (2018)
In wireless sensor networks, data messages containing sensor data achieved by a sensor module in a wireless sensor node is transmitted to a stationary wireless sink node along a wireless multihop transmission route in which wireless sensor nodes them
Autor:
Hiroaki Higaki, Masayoshi Hayashi
Publikováno v:
Proceedings of the 2018 International Conference on Computer Science, Electronics and Communication Engineering (CSECE 2018).