default search action
Toshio Hirotsu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Kazuto Kobori, Chunghan Lee, Toshio Hirotsu:
Performance evaluation of portable time synchronization method using eBPF. Concurr. Comput. Pract. Exp. 36(8) (2024) - 2022
- [c54]Chunghan Lee, Reina Yoshitani, Toshio Hirotsu:
Enhancing Packet Tracing of Microservices in Container Overlay Networks using eBPF. AINTEC 2022: 53-61 - [c53]Kazuto Kobori, Chunghan Lee, Toshio Hirotsu:
A Portable Time Synchronization Method using eBPF. CANDARW 2022: 20-25 - [c52]Kensho Yamamoto, Toshio Hirotsu:
File system to support secure cloud-based sharing. ISPA/BDCloud/SocialCom/SustainCom 2022: 155-162 - 2021
- [c51]Toshihiro Sato, Toshio Hirotsu:
A Flexible P4-Based Pin-Point In-Band Network Monitoring. APNOMS 2021: 258-261
2010 – 2019
- 2019
- [c50]Yuji Sato, Shota Ueno, Toshio Hirotsu:
Distributed Multi-objective Particle Swarm Optimization using Time-delayed Virtual Global Best Method. IJCCI 2019: 21-30 - 2018
- [c49]Ryosuke Nagai, Wataru Kurihara, Shun Higuchi, Toshio Hirotsu:
Design and Implementation of an OpenFlow-Based TCP SYN Flood Mitigation. MobileCloud 2018: 37-42 - 2013
- [c48]Chunghan Lee, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura:
Performance Implications of Task Scheduling by Predicting Network Throughput on the Internet. TrustCom/ISPA/IUCC 2013: 1089-1098 - 2012
- [j7]Chunghan Lee, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura:
Analytical Modeling of Network Throughput Prediction on the Internet. IEICE Trans. Inf. Syst. 95-D(12): 2870-2878 (2012) - 2011
- [j6]Chunghan Lee, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura:
Traffic Anomaly Analysis and Characteristics on a Virtualized Network Testbed. IEICE Trans. Inf. Syst. 94-D(12): 2353-2361 (2011) - [j5]Romain Fontugne, Toshio Hirotsu, Kensuke Fukuda:
A Visualization Tool for Exploring Multi-scale Network Traffic Anomalies. J. Networks 6(4): 577-586 (2011) - [c47]Kensuke Takahashi, Toshio Hirotsu, Toshiharu Sugawara:
Adaptive Routing Point Control in Virtualized Local Area Networks Using Particle Swarm Optimizations. ICTAI 2011: 352-360 - [c46]Chunghan Lee, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura:
Estimating Traffic Anomalies for Throughput Prediction on Network Virtualization. SAINT 2011: 267-273 - 2010
- [j4]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Shin-ya Sato, Osamu Akashi, Satoshi Kurihara:
Fluctuated peer selection policy and its performance in large-scale multi-agent systems. Web Intell. Agent Syst. 8(3): 255-268 (2010) - [c45]Chunghan Lee, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura:
Analysis of Anomalies on a Virtualized Network Testbed. CIT 2010: 297-304 - [c44]Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Toshiharu Sugawara:
A PCA Analysis of Daily Unwanted Traffic. AINA 2010: 377-384 - [c43]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara:
Effect of probabilistic task allocation based on statistical analysis of bid values. AAMAS 2010: 1603-1604 - [c42]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara:
Adaptive probabilistic task allocation in large-scale multi-agent systems and its evaluation. GECCO 2010: 1311-1312 - [c41]Toshiharu Sugawara, Toshio Hirotsu, Kensuke Fukuda:
Probabilistic Award Strategy for Contract Net Protocol in Massively Multi-agent Systems. ICAART (2) 2010: 165-171 - [c40]Toshio Hirotsu, Shinnosuke Nishitani, Hirotake Abe, Kyoji Umemura, Kensuke Fukuda, Satoshi Kurihara, Toshiharu Sugawara:
A Light-Weight Autonomous Power Saving Method for Wireless Sensor Networks. ICAS 2010: 188-193 - [c39]Toshio Hirotsu, Satoshi Kurihara, Kensuke Fukuda, Osamu Akashi, Hirotake Abe, Toshiharu Sugawara:
Dynamic and distributed routing control for virtualized local area networks. LCN 2010: 212-215 - [c38]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara:
Effect of Alternative Distributed Task Allocation Strategy Based on Local Observations in Contract Net Protocol. PRIMA 2010: 90-104
2000 – 2009
- 2009
- [c37]Miyuki Hanaoka, Kenji Kono, Toshio Hirotsu:
Performance Improvement by Means of Collaboration between Network Intrusion Detection Systems. CNSR 2009: 262-269 - [c36]Kensuke Takahashi, Satoshi Kurihara, Toshio Hirotsu, Toshiharu Sugawara:
Estimation of Sensor Network Topology Using Ant Colony Optimization. ICANNGA 2009: 263-272 - [c35]Shin-ya Sato, Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara, Toshiharu Sugawara:
Estimating Relevance of Items on Basis of Proximity of User Groups on Blogspace. Web Intelligence 2009: 157-164 - 2008
- [j3]Osamu Akashi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara:
Policy-based BGP-control architecture for inter-AS routing adjustment. Comput. Commun. 31(13): 2996-3002 (2008) - [c34]Romain Fontugne, Toshio Hirotsu, Kensuke Fukuda:
An image processing approach to traffic anomaly detection. AINTEC 2008: 17-26 - [c33]Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda:
Adaptive manager-side control policy in contract net protocol for massively multi-agent systems. AAMAS (3) 2008: 1433-1436 - [c32]Toshiharu Sugawara, Toshio Hirotsu, Satoshi Kurihara, Kensuke Fukuda:
Controling Contract Net Protocol by Local Observation for Large-Scale Multi-Agent Systems. CIA 2008: 206-220 - [c31]Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Toshiharu Sugawara:
Correlation Among Piecewise Unwanted Traffic Time Series. GLOBECOM 2008: 1616-1620 - [c30]Shin-ya Sato, Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara, Toshiharu Sugawara:
Co-occurrence Analysis Focused on Blogger Communities. Web Intelligence 2008: 372-376 - 2007
- [j2]Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato:
Capability-based egress network access control by using DNS server. J. Netw. Comput. Appl. 30(4): 1275-1282 (2007) - [c29]Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda, Toshihiro Takada:
Conflict estimation of abstract plans for multiagent systems. AAMAS 2007: 125 - [c28]Toshiharu Sugawara, Toshio Hirotsu, Satoshi Kurihara, Kensuke Fukuda:
Performance variation due to interference among a large number of self-interested agents. IEEE Congress on Evolutionary Computation 2007: 766-773 - [c27]Osamu Akashi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara:
Analysis of Diagnostic Capability for Hijacked Route Problem. IPOM 2007: 37-48 - [c26]Osamu Akashi, Atsushi Terauchi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara:
Lisp-based agent platform and applications for inter-domain network management. ILC 2007: 14 - [c25]Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda, Toshihiro Takada:
Effective Selection of Abstract Plans for Multi-Agent Systems. SGAI Conf. 2007: 223-236 - [c24]Shin-ya Sato, Kensuke Fukuda, Satoshi Kurihara, Toshio Hirotsu, Toshiharu Sugawara:
Generating Extensional Definitions of Concepts from Ostensive Definitions by Using Web. WISE 2007: 583-592 - [p2]Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara, Osamu Akashi, Shin-ya Sato, Toshiharu Sugawara:
The Impact of Network Model on Performance of Load-balancing. Emergent Intelligence of Networked Agents 2007: 23-37 - [p1]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Shin-ya Sato, Satoshi Kurihara:
Improvements in Performance of Large-Scale Multi-Agent Systems Based on the Adaptive/ Non-Adaptive Agent Selection. Emergent Intelligence of Networked Agents 2007: 217-230 - 2006
- [c23]Osamu Akashi, Kensuke Fukuda, Satoshi Kurihara, Toshio Hirotsu, Toshiharu Sugawara:
Application of a Massively Multi-Agent System to Internet Routing Management. MMAS/LSMAS/CCMMS 2006: 131-145 - [c22]Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda, Shin-ya Sato, Osamu Akashi:
Total performance by local agent selection strategies in multi-agent systems. AAMAS 2006: 601-608 - [c21]Kensuke Fukuda, Toshio Hirotsu, Satoshi Kurihara, Shin-ya Sato, Osamu Akashi, Toshiharu Sugawara:
Dependency of Network Structures in Agent Selection and Deployment. IAT 2006: 37-44 - [c20]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Shin-ya Sato, Satoshi Kurihara:
Multi-Agent Systems Performance by Adaptive/Non-Adaptive Agent Selection. IAT 2006: 555-559 - [c19]Toshiharu Sugawara, Kensuke Fukuda, Toshio Hirotsu, Shin-ya Sato, Satoshi Kurihara:
Adaptive Agent Selection in Large-Scale Multi-Agent Systems. PRICAI 2006: 818-822 - [c18]Osamu Akashi, Kensuke Fukuda, Toshio Hirotsu, Toshiharu Sugawara:
Policy-based BGP control architecture for autonomous routing management. INM@SIGCOMM 2006: 77-82 - 2005
- [c17]Toshiharu Sugawara, Satoshi Kurihara, Toshio Hirotsu, Kensuke Fukuda, Toshihiro Takada:
Predicting possible conflicts in hierarchical planning for multi-agent systems. AAMAS 2005: 813-820 - [c16]Osamu Akashi, Atsushi Terauchi, Kensuke Fukuda, Toshio Hirotsu, Mitsuru Maruyama, Toshiharu Sugawara:
Detection and Diagnosis of Inter-AS Routing Anomalies by Cooperative Intelligent Agents. DSOM 2005: 181-192 - [c15]Kensuke Fukuda, Shin-ya Sato, Osamu Akashi, Toshio Hirotsu, Satoshi Kurihara, Toshiharu Sugawara:
On the Use of Hierarchical Power-law Network Topology for Server Selection and Allocation in Multi-Agent Systems. IAT 2005: 81-88 - [c14]Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato:
Capability-Based Egress Network Access Control for Transferring Access Rights. ICITA (2) 2005: 488-495 - [c13]Shinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kazuhiko Kato, Kozo Itano:
Name-Level Approach for Egress Network Access Control. ICN (2) 2005: 284-296 - [c12]Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Toshiharu Sugawara:
Time and Space Correlation in BGP Messages. ICOIN 2005: 215-222 - [c11]Atsushi Terauchi, Osamu Akashi, Mitsuru Maruyama, Kensuke Fukuda, Toshiharu Sugawara, Toshio Hirotsu, Satoshi Kurihara:
ARTISTE: Agent Organization Management System for Multi-Agent Systems. PRIMA 2005: 207-221 - [c10]Péter Surányi, Hirotake Abe, Toshio Hirotsu, Yasushi Shinjo, Kazuhiko Kato:
General Virtual Hosting via Lightweight User-Level Virtualization. SAINT 2005: 229-236 - 2004
- [c9]Toshiharu Sugawara, Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Shigemi Aoyagi, Toshihiro Takada:
Reusing Coordination and Negotiation Strategies in Multi-Agent Systems for Ubiquitous Network Environment. AAMAS 2004: 496-503 - [c8]Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Shin-ya Sato, Toshiharu Sugawara:
How Collective Intelligence Emerge in Complex Environment? BioADIT 2004: 484-495 - [c7]Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Shigemi Aoyagi, Toshihiro Takada, Toshiharu Sugawara:
Multi-agent Human-Environment Interaction Framework for the Ubiquitous Environment. MMAS 2004: 217-223 - 2003
- [c6]Satoshi Kurihara, Kensuke Fukuda, Toshio Hirotsu, Osamu Akashi, Shin-ya Sato, Toshiharu Sugawara:
Simple but efficient collaboration in a complex competitive situation. AAMAS 2003: 1042-1043 - [c5]Kenichi Kourai, Toshio Hirotsu, Koji Sato, Osamu Akashi, Kensuke Fukuda, Toshiharu Sugawara, Shigeru Chiba:
Secure and Manageable Virtual Private Networks for End-users. LCN 2003: 385-394 - [c4]Osamu Akashi, Toshio Hirotsu, Koji Sato, Kenichi Kourai, Mitsuro Maruyama, Toshiharu Sugawara:
Agents Support for Flexible Inter-AS Policy Control. SAINT Workshops 2003: 294-298 - [c3]Toshihiro Takada, Satoshi Kurihara, Toshio Hirotsu, Toshiharu Sugawara:
Proximity Mining: Finding Proximity using Sensor Data History. WMCSA 2003: 129-138 - 2002
- [c2]Koji Sato, Toshio Hirotsu, Kensuke Fukuda, Osamu Akashi, Toshiharu Sugawara:
Clea: A framework for the Coordination of Applications and Networks. JCIS 2002: 948-951
1990 – 1999
- 1995
- [j1]Toshio Hirotsu, Hiroko Fujii, Mario Tokoro:
A multiversion mechanism for intra-object concurrency. Distributed Syst. Eng. 2(4): 192-201 (1995) - [c1]Toshio Hirotsu, Hiroko Fujii, Mario Tokoro:
A Multiversion Concurrent Object Model for Distributed and Multiuser Environments. ICDCS 1995: 271-278
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint