default search action
Yasuyuki Tanaka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Hiroto Fujita, Yasuyuki Tanaka, Kosuke Mori, Fumio Teraoka:
BROF : An Efficient Tree Construction Method Using Passive Link Quality Estimation for a Wireless Sensor Network. J. Inf. Process. 32: 319-330 (2024) - 2022
- [j10]Yasuyuki Tanaka, Pascale Minet, Malisa Vucinic, Xavier Vilajosana, Thomas Watteyne:
YSF: A 6TiSCH Scheduling Function Minimizing Latency of Data Gathering in IIoT. IEEE Internet Things J. 9(11): 8607-8615 (2022) - [j9]Yasuyuki Tanaka, Toshio Ito, Fumio Teraoka:
6TiSCH Scheduling Function Design Suite founded on Contiki-NG. J. Inf. Process. 30: 669-678 (2022) - [j8]George Oikonomou, Simon Duquennoy, Atis Elsts, Joakim Eriksson, Yasuyuki Tanaka, Nicolas Tsiftes:
The Contiki-NG open source operating system for next generation IoT devices. SoftwareX 18: 101089 (2022) - 2021
- [c15]Yasuyuki Tanaka, Pascale Minet, Thomas Watteyne, Fumio Teraoka:
Accelerating 6TiSCH Network Formation. DCOSS 2021: 18-24 - [c14]Hiroto Fujita, Yasuyuki Tanaka, Kosuke Mori, Fumio Teraoka:
Efficient RPL Tree Construction Using Passive Link Quality Estimation. CANDAR (Workshops) 2021: 8-14 - 2020
- [j7]Yasuyuki Tanaka, Keoma Brun-Laguna, Thomas Watteyne:
Trace-based simulation for 6TiSCH. Internet Technol. Lett. 3(4) (2020) - [c13]Yasuyuki Tanaka, Ba Hai Le, Victor Kobayashi, Camilo López, Thomas Watteyne, Mina Rady:
Demo: Blink - Room-Level Localization Using SmartMesh IP. EWSN 2020: 198-199
2010 – 2019
- 2019
- [j6]Yasuyuki Tanaka, Pascale Minet, Thomas Watteyne:
6LoWPAN Fragment Forwarding. IEEE Commun. Stand. Mag. 3(1): 35-39 (2019) - [j5]Esteban Municio, Glenn Daneels, Malisa Vucinic, Steven Latré, Jeroen Famaey, Yasuyuki Tanaka, Keoma Brun-Laguna, Kazushi Muraoka, Xavier Vilajosana, Thomas Watteyne:
Simulating 6TiSCH networks. Trans. Emerg. Telecommun. Technol. 30(3) (2019) - [j4]Pascale Minet, Yasuyuki Tanaka:
Optimal Number of Message Transmissions for Probabilistic Guarantee of Latency in the IoT. Sensors 19(18): 3970 (2019) - [c12]Keoma Brun-Laguna, Pascale Minet, Yasuyuki Tanaka:
Optimized Scheduling for Time-Critical Industrial IoT. GLOBECOM 2019: 1-6 - [c11]Yasuyuki Tanaka, Keoma Brun-Laguna, Thomas Watteyne:
Demo: Simulating a 6TiSCH Network using Connectivity Traces from Testbeds. INFOCOM Workshops 2019: 921-922 - [c10]Yasuyuki Tanaka, Shingo Kashima:
SeedsMiner: Accurate URL Blacklist-Generation Based on Efficient OSINT Seed Collection. WI (Companion) 2019: 250-255 - 2018
- [c9]Fabian Rincon, Yasuyuki Tanaka, Thomas Watteyne:
On the Impact of WiFi on 2.4 GHz Industrial IoT Networks. ICII 2018: 33-39 - 2017
- [j3]Yasuyuki Tanaka, Mitsuaki Akiyama, Atsuhiro Goto:
Analysis of malware download sites by focusing on time series variation of malware. J. Comput. Sci. 22: 301-313 (2017) - [c8]Yasuyuki Tanaka, Atsuhiro Goto:
Suspicious FQDN Evaluation based on Variations in Malware Download URLs. ASONAM 2017: 811-818 - 2016
- [c7]Izuru Kume, Masahide Nakamura, Yasuyuki Tanaka, Etsuya Shibayama:
Evaluation of diagnosis support methods in program debugging by trace analysis: An exploratory study. ICIS 2016: 1-6 - [c6]Yasuyuki Tanaka, Atsuhiro Goto:
Analysis of malware download sites by focusing on time series variation of malware. ISCC 2016: 173-179 - 2014
- [c5]Hidenori Nakai, Kiyoshi Honda, Hironori Washizaki, Yoshiaki Fukazawa, Ken Asoh, Kaz Takahashi, Kentarou Ogawa, Maki Mori, Takashi Hino, Yosuke Hayakawa, Yasuyuki Tanaka, Shinichi Yamada, Daisuke Miyazaki:
Initial Industrial Experience of GQM-Based Product-Focused Project Monitoring with Trend Patterns. APSEC (2) 2014: 43-46 - [c4]Hidenori Nakai, Kiyoshi Honda, Hironori Washizaki, Yoshiaki Fukazawa, Ken Asoh, Kaz Takahashi, Kentarou Ogawa, Maki Mori, Takashi Hino, Yosuke Hayakawa, Yasuyuki Tanaka, Shinichi Yamada, Daisuke Miyazaki:
Continuous Product-Focused Project Monitoring with Trend Patterns and GQM. APSEC (2) 2014: 69-74 - [c3]Kiyoshi Honda, Hidenori Nakai, Hironori Washizaki, Yoshiaki Fukazawa, Ken Asoh, Kazuyoshi Takahashi, Kentarou Ogawa, Maki Mori, Takashi Hino, Yosuke Hayakawa, Yasuyuki Tanaka, Shinichi Yamada, Daisuke Miyazaki:
Predicting Time Range of Development Based on Generalized Software Reliability Model. APSEC (1) 2014: 351-358 - [c2]Yasuyuki Tanaka, Atsuhiro Goto:
n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the Network. SafeConfig 2014: 33-36 - 2012
- [c1]Yasuyuki Tanaka, Yoshiki Terashima, Mitsuru Kanda, Yoshihiro Ohba:
A security architecture for communication between smart meters and HAN devices. SmartGridComm 2012: 460-464
2000 – 2009
- 2006
- [j2]Yasuyuki Tanaka, Mitsunobu Kunishi, Fumio Teraoka:
PMPATH: A Policy Routing System for Multihomed End-Hosts. IEICE Trans. Inf. Syst. 89-D(1): 219-227 (2006) - [j1]Shunsuke Saito, Yasuyuki Tanaka, Mitsunobu Kunishi, Yoshifumi Nishida, Fumio Teraoka:
AMS: An Adaptive TCP Bandwidth Aggregation Mechanism for Multi-homed Mobile Hosts. IEICE Trans. Inf. Syst. 89-D(12): 2838-2847 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint