default search action
Tetsuya Yokotani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Seiji Kozaki, Hiroshi Mineno, Yuta Tachikawa, Ryo Murakami, Yuuki Hatanaka, Tetsuya Yokotani, Takeshi Suehiro, Kenichi Nakura, Satoshi Shirai:
Resource control of access networks responding to a dynamic change in application requirements. ICOIN 2024: 132-137 - 2023
- [j6]Kazuhiro Kosaka, Yuto Noda, Tetsuya Yokotani, Koichi Ishibashi:
Implementation and Evaluation of the Control Mechanism Among Distributed MQTT Brokers. IEEE Access 11: 134211-134216 (2023) - [c23]Atsuko Yokotani, Hiroshi Mineno, Yuuki Hatanaka, Tetsuya Yokotani:
Traffic Aggregation for the Surveillance Service Using the PON Technology with Dedicated Bandwidth. IoTaIS 2023: 203-208 - 2022
- [c22]Fuya Aoki, Koichi Ishibashi, Tetsuya Yokotani:
Prototype implementation of downward transfer method by tunneling for a large-scale data collection system using MQTT. APCC 2022: 439-444 - [c21]Eisei Yoshida, Suzuka Kobayashi, Hiroaki Mukai, Natthaphol Uthumphirat, Yuki Nakamura, Nao Ogino, Tetsuya Yokotani:
Proposal and prototyping on wildlife tracking system using infrared sensors. ICOIN 2022: 292-297 - [c20]Yuto Noda, Koichi Ishibashi, Tetsuya Yokotani:
A proposal on the control mechanism among distributed MQTT brokers over wide area networks. IoTaIS 2022: 70-75 - [c19]Tetsuya Yokotani, Stefano Giordano:
IoT Platform: Technology, Use Cases, and Standardization. WF-IoT 2022: 1-2 - 2021
- [c18]Eisei Yoshida, Tetsuya Yokotani, Koichi Ishibashi, Hiroaki Mukai:
Proposals on the Root Data Domain Gateway and System Operations for IoT Data Interoperability. ICOIN 2021: 408-412 - 2020
- [c17]Keitaro Terada, Shuichi Ohno, Hiroaki Mukai, Koichi Ishibashi, Tetsuya Yokotani:
Proposal of MQTT distributed broker control mechanism. ICOIN 2020: 402-404
2010 – 2019
- 2019
- [j5]Tetsuya Yokotani:
Foreword. IEICE Trans. Commun. 102-B(7): 1229 (2019) - [c16]Tetsuya Yokotani, Kazuya Kawai:
Concepts and requirements of IoT networks using IoT Data Exchange Platform toward International standards. CSCN 2019: 1-6 - [c15]Koichi Fukuoka, Miyuki Yamamoto, Tetsuya Yokotani, Masashi Saito, Yoshiaki Terashima:
Network Behavior Estimation Method for Wireless Ad-Hoc Networks by Analyzing Data Transmission Traffic. ICMU 2019: 1-4 - [c14]Keitaro Terada, Hiroaki Mukai, Tetsuya Yokotani:
Enhancement of MAC Protocol for Power Reduction in LoRa WAn. ICOIN 2019: 324-326 - [c13]Daiki Takemura, Atsusuke Murata, Kensei Miyakoshi, Tetsuya Yokotani, Yasunori Kobayashi, Yasuhiro Kobayashi:
System Designing and Plototyping on IoT for a Factory. ICOIN 2019: 327-329 - [c12]Yuya Sasaki, Tetsuya Yokotani, Hiroaki Mukai:
MQTT over VLAN for Reduction of Overhead on Information Discovery. ICOIN 2019: 354-356 - [c11]Yoshiki Kuwabara, Yudai Matsuno, Kan Akutsu, Hiroaki Mukai, Tetsuya Yokotani:
Evaluation of Multiplexing on the Characteristics of Surveillance Camera Data Traffic. ICOIN 2019: 363-365 - [c10]Keitaro Terada, Eisei Yoshida, Koichi Ishibashi, Hiroaki Mukai, Tetsuya Yokotani:
Implementation of IoT Networks Based on MQTT for Wildlife Monitoring System. IoTaIS 2019: 161-166 - 2018
- [c9]Yuya Sasaki, Tetsuya Yokotani, Hiroaki Mukai:
Proposals on IoT Communication through MQTT over L2 Network and their Performance Evaluation. IIT 2018: 30-35 - 2017
- [j4]Toshinori Tsuboi, Tomohiro Taniguchi, Tetsuya Yokotani:
Technical Features and Approaches on Optical Access Networks for Various Applications. IEICE Trans. Commun. 100-B(9): 1606-1613 (2017) - [c8]Yoshiki Kuwabara, Tetsuya Yokotani, Hiroaki Mukai:
Hardware emulation of IoT devices and verification of application behavior. APCC 2017: 1-6 - 2016
- [c7]Tetsuya Yokotani, Yuya Sasaki:
Transfer protocols of tiny data blocks in IoT and their performance evaluation. WF-IoT 2016: 54-57 - 2012
- [c6]Yukimasa Nagai, Toshinori Hori, Yosuke Yokoyama, Naoki Shimizu, Akira Otsuka, Tetsuya Yokotani:
Advanced wireless cooperation mechanisms for interference mitigation in the 2.4 GHz ISM band. CCNC 2012: 364-365
2000 – 2009
- 2009
- [j3]Hiroaki Mukai, Yoshifumi Hotta, Tetsuya Yokotani, Akira Takahashi, Kiyoshi Shimokasa:
PON with Automatic Protection switching for high reliable communication. Opt. Switch. Netw. 6(3): 163-170 (2009) - 2000
- [j2]Tetsuya Yokotani, Tatsuki Ichihashi, Shuichi Tonami:
New signaling procedures in ATM networks for advance resource reservation. Telecommun. Syst. 15(1-2): 129-144 (2000)
1990 – 1999
- 1998
- [c5]Tetsuya Yokotani, Ken Murakami, Tatsuki Ichihashi, Shuichi Tonami:
New Approach of Resource Management to Provide Integrated Services over ATM Networks. LCN 1998: 120-129 - 1997
- [c4]Qin Zheng, Tetsuya Yokotani, Tatsuki Ichihashi, Yasunoni Nemoto:
Connection Admission Control for Hard Real-Time Communication in ATM Networks. ICDCS 1997: 217-224 - [c3]Tetsuya Yokotani, Tatsuki Ichihashi, Masayuki Yabe:
An Ultra Light Weight CAC Mechanism (UL-CAC) for Soft Guarantee in ATM Networks. LCN 1997: 432-440 - 1996
- [c2]Tetsuya Yokotani, Tatsuki Ichihashi:
A Proposal of Flow Control Mechanism for Multicast ABR and its Performance. LCN 1996: 182-190 - 1995
- [c1]Tetsuya Yokotani, Tatsuki Ichihashi, Michihiro Ishizaka:
Congestion control of multi-cast connections in ATM networks. LCN 1995: 38-47 - 1993
- [j1]Tetsuya Yokotani, Hiroyuki Sato, Shigeo Nakatsuka:
A Study on a Performance Improvement Algorithm in DQDB MAN. Comput. Networks ISDN Syst. 25(10): 1107-1117 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint