default search action
Yuuki Takano
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Sai Veerya Mahadevan, Yuuki Takano, Atsuko Miyaji:
PRSafe: A Domain Specific Language Created with LLVM. J. Inf. Process. 32: 207-222 (2024) - [c20]Ryuta Kambe, Benjamin Gilby, Yuuki Takano:
A Formally Verified Leader Election Algorithm for Autonomous Driving Systems. RTCSA 2024: 67-72 - 2023
- [c19]Yuuki Takano:
Deadlock- and Starvation-free Formally Verified Client Library for Robots. ICSRS 2023: 488-497 - 2022
- [c18]Nobuyuki Kanaya, Yu Tsuda, Yuuki Takano, Yoshitada Fujiwara, Ryoichi Isawa, Daisuke Inoue:
NEMIANA: Cross-Platform Execution Migration for Debugging. AST@ICSE 2022: 138-147 - 2021
- [c17]Sai Veerya Mahadevan, Yuuki Takano, Atsuko Miyaji:
PRSafe: Primitive Recursive Function based Domain Specific Language using LLVM. ICEIC 2021: 1-4 - [c16]Seitaro Mishima, Kazuhisa Nakasho, Yuuki Takano, Atsuko Miyaji:
A Practical Parallel Computation in a Scalable Multiparty Private Set Intersection. CANDAR (Workshops) 2021: 332-338 - 2020
- [c15]Seitaro Mishima, Kazuhisa Nakasho, Kousuke Takeuchi, Naohiro Hayaishi, Yuuki Takano, Atsuko Miyaji:
Development and Application of Privacy-preserving Distributed Medical Data Integration System. ICCE-TW 2020: 1-2 - [p1]Akinori Kawachi, Atsuko Miyaji, Kazuhisa Nakasho, Yiying Qi, Yuuki Takano:
Secure Primitive for Big Data Utilization. Security Infrastructure Technology for Integrated Utilization of Big Data 2020: 35-63
2010 – 2019
- 2019
- [c14]Nobuyuki Kanaya, Yu Tsuda, Yuuki Takano, Daisuke Inoue:
Byakko: Automatic Whitelist Generation based on Occurrence Distribution of Features of Network Traffic. IEEE BigData 2019: 3190-3199 - 2017
- [c13]Ryosuke Miura, Yuuki Takano, Shinsuke Miwa, Tomoya Inoue:
GINTATE: Scalable and Extensible Deep Packet Inspection System for Encrypted Network Traffic: Session Resumption in Transport Layer Security Communication Considered Harmful to DPI. SoICT 2017: 234-241 - 2016
- [c12]Kunio Akashi, Tomoya Inoue, Shingo Yasuda, Yuuki Takano, Yoichi Shinoda:
NETorium: high-fidelity scalable wireless network emulator. AINTEC 2016: 25-32 - [c11]Yuuki Takano, Ryosuke Miura:
FARIS: Fast and Memory-Efficient URL Filter by Domain Specific Machine. ICITCS 2016: 1-7 - [c10]Shingo Yasuda, Ryosuke Miura, Satoshi Ohta, Yuuki Takano, Toshiyuki Miyachi:
Alfons: A Mimetic Network Environment Construction System. TRIDENTCOM 2016: 59-69 - 2015
- [j5]Razvan Beuran, Shingo Yasuda, Tomoya Inoue, Yuuki Takano, Toshiyuki Miyachi, Yoichi Shinoda:
Towards an Interactive Experiment Framework: DynamiQ. EAI Endorsed Trans. Cloud Syst. 1(4): e1 (2015) - [j4]Razvan Beuran, Shingo Yasuda, Tomoya Inoue, Yuuki Takano, Toshiyuki Miyachi, Yoichi Shinoda:
DynamiQ: A Tool for Dynamic Emulation of Networks. EAI Endorsed Trans. Self Adapt. Syst. 1(2): e1 (2015) - [c9]Yuuki Takano, Ryosuke Miura, Shingo Yasuda, Kunio Akashi, Tomoya Inoue:
SF-TAP: Scalable and Flexible Traffic Analysis Platform Running on Commodity Hardware. LISA 2015: 25-36 - 2014
- [c8]Nobuchika Sakata, Yuuki Takano, Shogo Nishida:
Remote Collaboration with Spatial AR Support. HCI (2) 2014: 148-157 - [c7]Yuuki Takano, Satoshi Ohta, Takeshi Takahashi, Ruo Ando, Tomoya Inoue:
MindYourPrivacy: Design and implementation of a visualization system for third-party Web tracking. PST 2014: 48-56 - [c6]Takeshi Takahashi, Joona Kannisto, Jarmo Harju, Akira Kanaoka, Yuuki Takano, Shin'ichiro Matsuo:
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme. SERVICES 2014: 121-128 - 2012
- [j3]Akiya Inoue, Yuuki Takano, Takeshi Kurosawa, Motoi Iwashita, Ken Nishimastu:
Mobile-carrier Choice Modeling Framework Under Competitive Conditions. Inf. Media Technol. 7(3): 1259-1265 (2012) - [j2]Akiya Inoue, Yuuki Takano, Takeshi Kurosawa, Motoi Iwashita, Ken Nishimatsu:
Mobile-carrier Choice Modeling Framework Under Competitive Conditions. J. Inf. Process. 20(3): 585-591 (2012) - 2011
- [c5]Tomoya Inoue, Yuuki Takano, Shinsuke Miwa, Yoichi Shinoda:
A design and implementation of nickname-based sockets for applications inside NATed network. AINTEC 2011: 48-55 - 2010
- [c4]Yuuki Takano, Akiya Inoue, Takeshi Kurosawa, Motoi Iwashita, Ken Nishimatsu:
Customer Segmentation in Mobile Carrier Choice Modeling. ACIS-ICIS 2010: 111-116
2000 – 2009
- 2007
- [j1]Atsuko Miyaji, Yuuki Takano:
Evaluation of the Security of RC6 against the Chi2-Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 22-28 (2007) - 2006
- [c3]Yuuki Takano, Naoki Isozaki, Yoichi Shinoda:
Multipath Key Exchange on P2P Networks. ARES 2006: 748-755 - 2005
- [c2]Atsuko Miyaji, Yuuki Takano:
On the Success Probability of chi2-attack on RC6. ACISP 2005: 61-74 - 2004
- [c1]Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano:
Success Probability in Chi2-Attacks. ACNS 2004: 310-325
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint