default search action
Yuichi Ohsita
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Akishige Ikoma, Yuichi Ohsita, Masayuki Murata:
Resource Allocation Considering Impact of Network on Performance in a Disaggregated Data Center. IEEE Access 12: 67600-67618 (2024) - [j23]Akishige Ikoma, Yuichi Ohsita, Masayuki Murata:
Optical network topology design to execute many tasks simultaneously in a disaggregated data center. J. Opt. Commun. Netw. 16(7): 764-780 (2024) - [j22]Hideyuki Shimonishi, Daichi Kominami, Yuichi Ohsita, Hiroshi Yoshida, Kousuke Nogami, Dai Kanetomo, Masayuki Murata:
Probabilistic Representation and Its Application of Digital-Twin of Spatio-Temporal Real-World Toward Trustable Cyber-Physical Interactions. IEEE Netw. 38(6): 130-137 (2024) - [c33]Koichi Owaki, Matsuki Yamamoto, Nattaon Techasarntikul, Yuichi Ohsita, Hideyuki Shimonishi, Kouki Higashioka, Yoshihisa Toshima, Takanori Ogura, Shinji Shimojo:
Proposal of a Scalable Building Operating System Architecture and Data Model Toward Software-Defined Building. COMPSAC 2024: 1586-1591 - [c32]Ade Kurniawan, Yuichi Ohsita, Masayuki Murata:
Toward robust systems against sensor-based adversarial examples based on the criticalities of sensors. ICAIC 2024: 1-5 - [c31]Keita Hara, Risa Yoshida, Daichi Kominami, Yuichi Ohsita, Michiko Kaihotsu, Masayuki Murata:
Indoor environment control method for improving well-being using human thermal stress estimated by Yuragi learning. ICCE 2024: 1-6 - [c30]Kazuki Kimura, Yuichi Ohsita, Masayuki Murata, Shinya Yasuda, Taichi Kumagai, Hiroshi Yoshida, Dai Kanetomo:
Prediction of moving obstacles utilizing edge-cloud cooperation based on probabilistic representation of space. ICCE 2024: 1-6 - [c29]Fengkai Liu, Yuichi Ohsita, Kenji Kashima, Shinya Yasuda, Taichi Kumagai, Hiroshi Yoshida, Dai Kanetomo, Masayuki Murata:
Anticipatory Robot Navigation: Incorporating Estimated Obstacle Behaviors with the Social Force Model. ICCE 2024: 1-6 - [c28]Takumi Nagahara, Nattaon Techasarntikul, Yuichi Ohsita, Hideyuki Shimonishi:
Visualization of three-dimensional radio wave conditions for indoor drone teleoperation support. ISMAR-Adjunct 2024: 379-380 - 2023
- [j21]Betty Wutzl, Kenji Leibnitz, Daichi Kominami, Yuichi Ohsita, Michiko Kaihotsu, Masayuki Murata:
Analysis of the Correlation between Frontal Alpha Asymmetry of Electroencephalography and Short-Term Subjective Well-Being Changes. Sensors 23(15): 7006 (2023) - [c27]Akishige Ikoma, Yuichi Ohsita, Masayuki Murata:
Disaggregated Micro Data Center: Resource Allocation Considering Impact of Network on Performance. CCNC 2023: 360-365 - 2022
- [j20]Ade Kurniawan, Yuichi Ohsita, Masayuki Murata:
Experiments on Adversarial Examples for Deep Learning Model Using Multimodal Sensors. Sensors 22(22): 8642 (2022) - 2021
- [j19]Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata:
Platform Utilizing Similar Users' Data to Detect Anomalous Operation of Home IoT Without Sharing Private Information. IEEE Access 9: 130615-130626 (2021) - [c26]Yun Fan, Toshiki Shibahara, Yuichi Ohsita, Daiki Chiba, Mitsuaki Akiyama, Masayuki Murata:
Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions. IWSEC 2021: 99-118 - [i1]Masaaki Yamauchi, Masahiro Tanaka, Yuichi Ohsita, Masayuki Murata, Kensuke Ueda, Yoshiaki Kato:
Smart-home anomaly detection using combination of in-home situation and user behavior. CoRR abs/2109.14348 (2021) - 2020
- [j18]Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata, Kensuke Ueda, Yoshiaki Kato:
Anomaly Detection in Smart Home Operation From User Behaviors and Home Conditions. IEEE Trans. Consumer Electron. 66(2): 183-192 (2020) - [c25]Taiga Hokaguchi, Yuichi Ohsita, Toshiki Shibahara, Daiki Chiba, Mitsuaki Akiyama, Masayuki Murata:
Detecting Malware-infected Hosts Using Templates of Multiple HTTP Requests. CCNC 2020: 1-2 - [c24]Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata:
Platform Utilizing Others' Behavior Data to Detect Anomalous Operation Hiding Private Information. ICCE-TW 2020: 1-2
2010 – 2019
- 2019
- [j17]Kodai Satake, Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata:
Traffic Engineering and Traffic Monitoring in the Case of Incomplete Information. IEICE Trans. Commun. 102-B(1): 111-121 (2019) - [c23]Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata, Kensuke Ueda, Yoshiaki Kato:
Anomaly Detection for Smart Home Based on User Behavior. ICCE 2019: 1-6 - [c22]Kodai Satake, Yuichi Ohsita, Masayuki Murata:
Predictive Traffic Engineering Incorporatingreal-World Information Inspired by the Cognitiveprocess of the Human Brain. ICTC 2019: 543-548 - 2018
- [j16]Yousuke Takahashi, Keisuke Ishibashi, Masayuki Tsujino, Noriaki Kamiyama, Kohei Shiomoto, Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata:
Separating Predictable and Unpredictable Flows via Dynamic Flow Mining for Effective Traffic Engineering. IEICE Trans. Commun. 101-B(2): 538-547 (2018) - [j15]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Taiga Hokaguchi, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Event De-Noising Convolutional Neural Network for Detecting Malicious URL Sequences from Proxy Logs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2149-2161 (2018) - [j14]Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata, Yousuke Takahashi, Keisuke Ishibashi, Kohei Shiomoto, Tomoaki Hashimoto:
Hierarchical Model Predictive Traffic Engineering. IEEE/ACM Trans. Netw. 26(4): 1754-1767 (2018) - 2017
- [c21]Toshiki Shibahara, Kohei Yamanishi, Yuta Takata, Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Yuichi Ohsita, Masayuki Murata:
Malicious URL sequence detection using event de-noising convolutional neural network. ICC 2017: 1-7 - [c20]Yosuke Akishita, Yuichi Ohsita, Masayuki Murata:
Network power saving based on Pareto optimal control with evolutionary approach. ICNC 2017: 587-593 - [c19]Kodai Satake, Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata:
Traffic engineering cooperating with traffic monitoring for the case with incomplete information. ITNAC 2017: 1-7 - 2016
- [j13]Yuya Tarutani, Yuichi Ohsita, Masayuki Murata:
Placement of Virtual Storages for Distributed Robust Cloud Storage. IEICE Trans. Commun. 99-B(4): 885-893 (2016) - [j12]Yuichi Ohsita, Takamichi Nishijima, Yuki Koizumi, Masayuki Murata:
Energy Saving Through a Buffer Control Approach for a Data Center Network With Hybrid Optoelectronic Routers. JOCN 8(7): 462-475 (2016) - [c18]Yousuke Takahashi, Keisuke Ishibashi, Masayuki Tsujino, Noriaki Kamiyama, Kohei Shiomoto, Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata:
Separating predictable and unpredictable flows via dynamic flow mining for effective traffic engineering. ICC 2016: 1-7 - [c17]Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata, Yousuke Takahashi, Keisuke Ishibashi, Kohei Shiomoto, Tomoaki Hashimoto:
Hierarchical traffic engineering based on model predictive control. ICNC 2016: 1-7 - [c16]Ali Kashif Bashir, Yuichi Ohsita, Masayuki Murata:
Abstraction Layer Based Virtual Data Center Architecture for Network Function Chaining. ICDCS Workshops 2016: 31-36 - [c15]Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata, Yousuke Takahashi, Keisuke Ishibashi, Kohei Shiomoto, Tomoaki Hashimoto:
Framework for traffic engineering under uncertain traffic information. ICTC 2016: 264-266 - [c14]Kota Kawashima, Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata:
Dynamic placement of virtual network functions based on model predictive control. NOMS 2016: 1037-1042 - 2015
- [j11]Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata, Yousuke Takahashi, Keisuke Ishibashi, Kohei Shiomoto:
Traffic prediction for dynamic traffic engineering. Comput. Networks 85: 36-50 (2015) - [j10]Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata, Yousuke Takahashi, Noriaki Kamiyama, Keisuke Ishibashi, Kohei Shiomoto, Tomoaki Hashimoto:
Traffic Engineering Based on Model Predictive Control. IEICE Trans. Commun. 98-B(6): 996-1007 (2015) - [j9]Noriaki Kamiyama, Yousuke Takahashi, Keisuke Ishibashi, Kohei Shiomoto, Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata:
Effective Flow Aggregation for Traffic Engineering. IEICE Trans. Commun. 98-B(10): 2049-2059 (2015) - [c13]Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata, Yousuke Takahashi, Keisuke Ishibashi, Kohei Shiomoto, Tomoaki Hashimoto:
Traffic engineering based on stochastic model predictive control for uncertain traffic change. IM 2015: 1165-1170 - [c12]Noriaki Kamiyama, Yousuke Takahashi, Keisuke Ishibashi, Kohei Shiomoto, Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata:
Optimizing Cache Location and Route on CDN Using Model Predictive Control. ITC 2015: 37-45 - [r1]Yuichi Ohsita, Masayuki Murata:
Optical Data Center Networks: Architecture, Performance, and Energy Efficiency. Handbook on Data Centers 2015: 351-391 - 2014
- [j8]Masahiro Yoshinari, Yuichi Ohsita, Masayuki Murata:
Virtual Network Reconfiguration With Adaptability to Traffic Changes. JOCN 6(6): 523-535 (2014) - [j7]Yuya Tarutani, Yuichi Ohsita, Masayuki Murata:
Virtual Network Reconfiguration for Reducing Energy Consumption in Optical Data Centers. JOCN 6(10): 925-942 (2014) - [c11]Noriaki Kamiyama, Yousuke Takahashi, Keisuke Ishibashi, Kohei Shiomoto, Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata:
Flow aggregation for traffic engineering. GLOBECOM 2014: 1936-1941 - [c10]Yoshihiro Tsuji, Yuichi Ohsita, Masayuki Murata:
Data structure enabling retrieval of time series of traffic with the requested granularity. ICCS 2014: 549-553 - 2013
- [c9]Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata, Yousuke Takahashi, Keisuke Ishibashi, Kohei Shiomoto:
Traffic prediction for dynamic traffic engineering considering traffic variation. GLOBECOM 2013: 1570-1576 - 2012
- [j6]Yuya Tarutani, Yuichi Ohsita, Shin'ichi Arakawa, Masayuki Murata:
Optical-Layer Traffic Engineering With Link Load Estimation for Large-Scale Optical Networks. JOCN 4(1): 38-52 (2012) - [c8]Yuya Tarutani, Yuichi Ohsita, Masayuki Murata:
A virtual network to achieve low energy consumption in optical large-scale datacenter. ICCS 2012: 45-49 - [c7]Yuichi Ohsita, Masayuki Murata:
Data Center Network Topologies Using Optical Packet Switches. ICDCS Workshops 2012: 57-64 - 2011
- [c6]Takashi Miyamura, Shin'ichi Arakawa, Yuichi Ohsita, Kohei Shiomoto, Shohei Kamamura, Masayuki Murata:
Dynamic resource allocation mechanism for managed self-organization. APNOMS 2011: 1-4 - [c5]Yuichi Ohsita, Takashi Miyamura, Shin'ichi Arakawa, Kohei Shiomoto, Masayuki Murata:
Hierarchical Dynamic Traffic Engineering Considering the Upper Bounds of Link Utilizations. GLOBECOM 2011: 1-6 - 2010
- [j5]Yuichi Ohsita, Takashi Miyamura, Shin'ichi Arakawa, Shingo Ata, Eiji Oki, Kohei Shiomoto, Masayuki Murata:
Gradually reconfiguring virtual network topologies based on estimated traffic matrices. IEEE/ACM Trans. Netw. 18(1): 177-189 (2010)
2000 – 2009
- 2009
- [j4]Yuichi Ohsita, Takashi Miyamura, Shin'ichi Arakawa, Eiji Oki, Kohei Shiomoto, Masayuki Murata:
Estimation of Current Traffic Matrices from Long-Term Traffic Variations. IEICE Trans. Commun. 92-B(1): 171-183 (2009) - 2008
- [j3]Yuichi Ohsita, Shingo Ata, Masayuki Murata:
Deployable Overlay Network for Defense against Distributed SYN Flood Attacks. IEICE Trans. Commun. 91-B(8): 2618-2630 (2008) - [c4]Yuichi Ohsita, Takashi Miyamura, Shin'ichi Arakawa, Eiji Oki, Kohei Shiomoto, Masayuki Murata:
Estimating current traffic matrices accurately by using long-term variations information. BROADNETS 2008: 404-411 - 2007
- [j2]Yuichi Ohsita, Shingo Ata, Masayuki Murata:
Identification of Attack Nodes from Traffic Matrix Estimation. IEICE Trans. Commun. 90-B(10): 2854-2864 (2007) - [c3]Yuichi Ohsita, Takashi Miyamura, Shin'ichi Arakawa, Shingo Ata, Eiji Oki, Kohei Shiomoto, Masayuki Murata:
Gradually Reconfiguring Virtual Network Topologies Based on Estimated Traffic Matrices. INFOCOM 2007: 2511-2515 - 2006
- [j1]Yuichi Ohsita, Shingo Ata, Masayuki Murata:
Detecting Distributed Denial-of-Service Attacks by Analyzing TCP SYN Packets Statistically. IEICE Trans. Commun. 89-B(10): 2868-2877 (2006) - 2005
- [c2]Yuichi Ohsita, Shingo Ata, Masayuki Murata:
Deployable overlay network for defense against distributed SYN flood attacks. ICCCN 2005: 407-412 - 2004
- [c1]Yuichi Ohsita, Shingo Ata, Masayuki Murata:
Detecting distributed denial-of-service attacks by analyzing TCP SYN packets statistically. GLOBECOM 2004: 2043-2049
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint