default search action
Junichi Murayama
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c13]Bo Hu, Yuichi Murata, Junichi Murayama:
Security information sharing platform over multiple services. APSITT 2015: 1-3 - [c12]Pichaya Kietkaroon, Yusuke Watanabe, Junichi Murayama, Takahiro Hamada, Yuminobu Igarashi:
A dynamic IPS allocation scheme using openflow for economical secure networking. APSITT 2015: 1-3 - [c11]Takuya Suzuki, Koki Ikeda, Pichaya Kietkaroon, Junichi Murayama, Takahiro Hamada, Yuichi Murata:
Designing a fast log-tracing scheme for targeted attack prevention. APSITT 2015: 1-3 - 2014
- [j4]Takeshi Yagi, Junichi Murayama, Takeo Hariu, Sho Tsugawa, Hiroyuki Ohsaki, Masayuki Murata:
Analysis of Blacklist Update Frequency for Countering Malware Attacks on Websites. IEICE Trans. Commun. 97-B(1): 76-86 (2014) - [j3]Keiichiro Tsukamoto, Masato Ohtani, Yuki Koizumi, Hiroyuki Ohsaki, Kunio Hato, Junichi Murayama:
Virtual Content-Centric Networking. J. Networks 9(4): 807-815 (2014) - 2013
- [j2]Takeshi Yagi, Junichi Murayama, Takeo Hariu, Hiroyuki Ohsaki:
Evaluations and Analysis of Malware Prevention Methods on Websites. IEICE Trans. Commun. 96-B(12): 3091-3100 (2013) - [j1]Keiichiro Tsukamoto, Yuki Koizumi, Hiroyuki Ohsaki, Kunio Hato, Junichi Murayama:
Inferring relevant blocks on hyperlinked web page based on block-to-block similarity. Int. J. Knowl. Web Intell. 4(4): 279-299 (2013) - [c10]Bo Hu, Yuichi Sudo, Kunio Hato, Yuichi Murata, Junichi Murayama:
Cost reduction evaluation of sharing backup servers in inter-cloud. APCC 2013: 256-261 - [c9]Masato Ohtani, Keiichiro Tsukamoto, Yuki Koizumi, Hiroyuki Ohsaki, Makoto Imase, Kunio Hato, Junichi Murayama:
VCCN: Virtual content-centric networking for realizing group-based communication. ICC 2013: 3476-3480 - 2012
- [c8]Hirofumi Ichihara, Yuki Koizumi, Hiroyuki Ohsaki, Kunio Hato, Junichi Murayama, Makoto Imase:
On the integrated control of virtual machine live migration and traffic engineering for cloud computing. GLOBECOM 2012: 1629-1634
2000 – 2009
- 2009
- [c7]Tomoyasu Ogasa, Yousuke Takahashi, Hiroyuki Ohsaki, Takeshi Yagi, Junichi Murayama, Makoto Imase:
Dynamic Topology Reconfiguration Method for Service Overlay Networks Using Users' Community Information. SAINT 2009: 141-144 - 2008
- [c6]Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase, Takeshi Yagi, Junichi Murayama:
Group-Oriented Communication: Concept and Network Architecture. ICCCN 2008: 969-975 - [c5]Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase, Takeshi Yagi, Junichi Murayama:
NMF: Network Mining Framework Using Topological Structure of Complex Networks. SERVICES II 2008: 210-211 - 2006
- [c4]Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Junichi Murayama, Kazuhiro Matsuda:
Scalable IP-VPN Flow Control Mechanism Supporting Arbitrary Fairness Criteria - Part 2: Simulation and Implementation. ICC 2006: 310-316 - 2005
- [c3]Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Junichi Murayama, Kazuhiro Matsuda:
Scalable IP-VPN flow control mechanism supporting arbitrary fairness criteria. Part 1. Architecture design. ICCCN 2005: 173-178 - 2004
- [c2]Yoshihiro Hara, Hiroyuki Ohsaki, Makoto Imase, Yoshitake Tajima, Masahiro Maruyoshi, Junichi Murayama:
On Layered VPN Architecture for Enabling User-Based Multiply Associated VPNs. ICOIN 2004: 847-856
1990 – 1999
- 1999
- [c1]Masahiro Umehira, Masamitsu Nakura, Makoto Umeuchi, Junichi Murayama, Takaaki Murai, Hiroyuki Hara:
Wireless and IP integrated system architectures for broadband mobile multimedia services. WCNC 1999: 593-597
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint