2007 |
21 | EE | Yuuki Yamada,
Takashi Katoh,
Bhed Bahadur Bista,
Toyoo Takata:
A New Approach to Early Detection of an Unknown Worm.
AINA Workshops (1) 2007: 194-198 |
20 | EE | Michitaka Yoshimoto,
Takashi Katoh,
Bhed Bahadur Bista,
Toyoo Takata:
Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study.
NBiS 2007: 127-136 |
19 | | Shintaro Urabe,
Jiahong Wang,
Eiichiro Kodama,
Toyoo Takata:
A high collusion-resistant approach to distributed privacy-preserving data mining.
Parallel and Distributed Computing and Networks 2007: 307-312 |
2006 |
18 | EE | Tsuyoshi Chiba,
Takashi Katoh,
Bhed Bahadur Bista,
Toyoo Takata:
DoS Packet Filter Using DNS Information.
AINA (1) 2006: 116-131 |
17 | EE | Atsumu Watanabe,
Takashi Katoh,
Bhed Bahadur Bista,
Toyoo Takata:
On a Watermarking Scheme for MusicXML.
AINA (2) 2006: 894-898 |
16 | EE | Takashi Katoh,
Hiroki Kuzuno,
Takuya Kawahara,
Atsumu Watanabe,
Yushi Nakai,
Bhed Bahadur Bista,
Toyoo Takata:
AWide Area Log Analyzing System Based on Mobile Agents.
CIMCA/IAWTIC 2006: 26 |
15 | EE | Takashi Hamma,
Takashi Katoh,
Bhed Bahadur Bista,
Toyoo Takata:
An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks.
DEXA Workshops 2006: 66-70 |
14 | EE | Jiahong Wang,
Takuya Fukasawa,
Shintaro Urabe,
Toyoo Takata,
Masatoshi Miyazaki:
Mining Frequent Patterns Securely in Distributed System.
IEICE Transactions 89-D(11): 2739-2747 (2006) |
2005 |
13 | EE | Michitaka Yoshimoto,
Bhed Bahadur Bista,
Toyoo Takata:
Development of Security Scanner with High Portability and Usability.
AINA 2005: 407-410 |
2004 |
12 | EE | Michitaka Yoshimoto,
Bhed Bahadur Bista,
Toyoo Takata:
Development of Security Scanner with High Usability.
AINA (1) 2004: 139-144 |
11 | EE | Takuya Fukasawa,
Jiahong Wang,
Toyoo Takata,
Masatoshi Miyazaki:
An Effective Distributed Privacy-Preserving Data Mining Algorithm.
IDEAL 2004: 320-325 |
2003 |
10 | EE | Bhed Bahadur Bista,
Goutam Chakraborty,
Toyoo Takata:
An Efficient RP (Rendezvous Point) Replacement Mechanism for Rendezvous-Based Multicast Routing.
ICDCS Workshops 2003: 514-518 |
1999 |
9 | | Takuya Koumoto,
Toyoo Takata,
Tadao Kasami,
Shu Lin:
A Low-Weight Trellis-Based Iterative Soft-Decision Decoding Algorithm for Binary Linear Block Codes.
IEEE Transactions on Information Theory 45(2): 731-741 (1999) |
1994 |
8 | | Toyoo Takata,
Y. Yamashita,
Toru Fujiwara,
Tadao Kasami,
Shu Lin:
Suboptimum decoding of decomposable block codes.
IEEE Transactions on Information Theory 40(5): 1392-1405 (1994) |
1993 |
7 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes.
IEEE Transactions on Information Theory 39(1): 242- (1993) |
6 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On complexity of trellis structure of linear block codes.
IEEE Transactions on Information Theory 39(3): 1057- (1993) |
5 | | Toyoo Takata,
Satoshi Ujita,
Tadao Kasami,
Shu Lin:
Multistage decoding of multilevel block M-PSK modulation codes and its performance analysis.
IEEE Transactions on Information Theory 39(4): 1204-1218 (1993) |
1991 |
4 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On linear structure and phase rotation invariant properties of block M-PSK modulation codes.
IEEE Transactions on Information Theory 37(1): 164- (1991) |
3 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On multilevel block modulation codes.
IEEE Transactions on Information Theory 37(4): 965-975 (1991) |
1988 |
2 | | Tadao Kasami,
Toru Fujiwara,
Toyoo Takata,
Shu Lin:
A cascaded coding scheme for error control and its performance analysis.
IEEE Transactions on Information Theory 34(3): 448-462 (1988) |
1986 |
1 | | Toru Fujiwara,
Toyoo Takata,
Tadao Kasami,
Shu Lin:
An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11.
IEEE Transactions on Information Theory 32(5): 706- (1986) |