default search action
Hitoshi Aida
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c25]Momoko Shiraishi, Hitoshi Aida:
Money Transfer on Transaction Signature-Based Ledger. FPS 2022: 338-354
2010 – 2019
- 2017
- [j9]Mohamad Samir A. Eid, Hitoshi Aida:
Trustworthy DDoS Defense: Design, Proof of Concept Implementation and Testing. IEICE Trans. Inf. Syst. 100-D(8): 1738-1750 (2017) - [c24]Mohamad Samir A. Eid, Hitoshi Aida:
Secure Double-Layered Defense against HTTP-DDoS Attacks. COMPSAC (2) 2017: 572-577 - 2016
- [j8]Hui Jing, Hitoshi Aida:
A Graphical Game Theoretic Approach to Optimization of Energy Efficiency in Multihop Wireless Sensor Networks. IEICE Trans. Commun. 99-B(8): 1789-1798 (2016) - 2015
- [j7]Aurélio Akira Mello Matsui, Hitoshi Aida:
A DSL for Contract-centric Compatibility Assessment in Distributed Services. J. Inf. Process. 23(1): 41-57 (2015) - 2014
- [j6]Hui Jing, Hitoshi Aida:
Realistic Analysis of Energy Efficiency in Multihop Wireless Sensor Networks. IEICE Trans. Inf. Syst. 97-D(12): 3016-3024 (2014) - 2011
- [c23]Hui Jing, Hitoshi Aida:
An analytical approach to optimization of throughput for IEEE 802.15.4 slotted CSMA/CA networks. CCNC 2011: 1021-1025 - 2010
- [c22]Mohamad Samir A. Eid, Hitoshi Aida:
Securely Hiding the Real Servers from DDoS Floods. SAINT 2010: 165-168 - [c21]Kazuhiro Yamada, Yosuke Sakai, Takanobu Suzuki, Yoshihiro Kawahara, Tohru Asami, Hitoshi Aida:
A Communication System with a Fast Handover under a High Speed Mobile Environment. VTC Fall 2010: 1-5
2000 – 2009
- 2009
- [c20]Shinya Kambori, Hitoshi Aida:
E-mail-based Information Utilization System. SAINT 2009: 290-291 - 2008
- [c19]Hitoshi Aida, Shinya Kambori:
Effective Use of Heterogeneous Wireless Links in High Speed Railways by Predictive Scheduling. SAINT 2008: 459-462 - 2006
- [j5]Kultida Rojviboonchai, Toru Osuga, Hitoshi Aida:
A Study on Rate-Based Multi-Path Transmission Control Protocol (R-M/TCP) Using Packet Scheduling Algorithm. IEICE Trans. Inf. Syst. 89-D(1): 124-131 (2006) - 2005
- [c18]Kultida Rojviboonchai, Toru Osuga, Hitoshi Aida:
R-M/TCP: Protocol for Reliable Multi-Path Transport over the Internet. AINA 2005: 801-806 - [c17]Kultida Rojviboonchai, Fan Yang, Qian Zhang, Hitoshi Aida, Wenwu Zhu:
AMTP: a multipath multimedia streaming protocol for mobile ad hoc networks. ICC 2005: 1246-1250 - 2002
- [j4]Soichiro Hidaka, Terumasa Aoki, Hitoshi Aida, Tadao Saito:
Implementation and performance evaluation of a FIFO queue class library for time warp. Syst. Comput. Jpn. 33(9): 90-98 (2002) - [c16]Hiroaki Morino, Thai Thach Bao, Hoaison Nguyen, Hitoshi Aida, Tadao Saito:
A scalable multistage packet switch for terabit IP router based on deflection routing and shortest path routing. ICC 2002: 2179-2185 - 2001
- [c15]Saneyasu Yamaguchi, Masao Takimoto, Hitoshi Aida, Tadao Saito:
Cooperative Backgroud Task Spaces and its Evaluation. DEXA Workshop 2001: 227-231 - [c14]Ryokichi Onishi, Saneyasu Yamaguchi, Hiroaki Morino, Hitoshi Aida, Tadao Saito:
The Multi-Agent System for Dynamic Network Routing. ISADS 2001: 375-382 - [c13]Tamaree Nalin, Isobe Takashi, Hiroaki Morino, Hitoshi Aida, Tadao Saito:
A Scalable and High Capacity Router on Multi-Dimension Crossbar Switch Principle. LCN 2001: 375-376 - 2000
- [c12]Hitoshi Aida, Yosuke Tamura, Yoshito Tobe, Hideyuki Tokuda:
Wireless Packet Scheduling with Signal-to-Noise Ratio Monitoring. LCN 2000: 32-41 - [c11]Thai Thach Bao, Hiroaki Morino, Hitoshi Aida, Tadao Saito:
Distributed Input and Deflection Routing Based Packet Switch Using Shuffle Pattern Network. NETWORKING 2000: 74-84
1990 – 1999
- 1999
- [c10]Takanori Hayashi, Shin'ichiro Yamasaki, Naoto Morita, Hitoshi Aida, Masato Takeichi, Norihisa Doi:
Effects of IP packet loss and picture frame reduction on MPEG1 subjective quality. MMSP 1999: 515-520 - [c9]Hiroaki Morino, Hitoshi Aida, Tadao Saito:
Distributed Routing Algorithm in Clos Network of Variable Bit Rate TDM Switch. SMARTNET 1999: 177-189 - 1998
- [c8]Soichiro Hidaka, Terumasa Aoki, Hitoshi Aida, Tadao Saito:
A FIFO Queue Class Library as a State Variable of Time Warp Logical Processes. ISCOPE 1998: 151-158 - 1996
- [j3]Intae Ryoo, Hitoshi Aida, Tadao Saito:
Design and performance analysis of a new RTM algorithm for VBR traffic in ATM networks. Comput. Commun. 19(3): 205-215 (1996) - [c7]Shiro Kawai, Hitoshi Aida, Tadao Saito:
Designing Interface Toolkit with Dynamic Selectable Modality. International ACM Conference on Assistive Technologies 1996: 72-79 - [c6]Tsuyoshi Tamaki, Hitoshi Aida, Tadao Saito:
A proposal of reserved channel dynamic channel assignment algorithm for multimedia mobile communication systems. PIMRC 1996: 628-632 - 1995
- [c5]Masato Oguchi, Hitoshi Aida, Tadao Saito:
A Proposal for a DSM Architecture Suitable for a Widely Distributed Environment and its Evaluation. HPDC 1995: 32-39 - [c4]Intae Ryoo, Hitoshi Aida, Hitoshi Saito:
Simulation study of a run-time bandwidth assignment technique for delay sensitive traffic in high-speed network. ICNP 1995: 40-46 - 1994
- [c3]Makoto Amamiya, Masahiko Satoh, Akifumi Makinouchi, Ken-Ichi Hagiwara, Taiichi Yuasa, Hitoshi Aida, Kazunori Ueda, Keijiro Araki, Tetsuo Ida, Takanobu Baba:
Research on programming languages for massively parallel processing. ISPAN 1994: 443-450 - 1992
- [j2]Akiko Nakahara, Hitoshi Aida, Tadao Saito:
Performance evaluation of communication networks based on FSM specifications of protocols. Syst. Comput. Jpn. 23(13): 1-14 (1992) - 1990
- [c2]Hitoshi Aida, Joseph A. Goguen, José Meseguer:
Compiling Concurrent Rewriting onto the Rewrite Rule Machine. CTRS 1990: 320-332
1980 – 1989
- 1984
- [c1]Tohru Moto-Oka, Hidehiko Tanaka, Hitoshi Aida, Keiji Hirata, Tsutomu Maruyama:
The Architecture of a Parallel Inference Engine - PIE. FGCS 1984: 479-488 - 1983
- [j1]Hitoshi Aida, Hidehiko Tanaka, Tohru Moto-Oka:
A Prolog Extension for Handling Negative Knowledge. New Gener. Comput. 1(1): 87-91 (1983)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint