default search action
Shigeaki Harada
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Kengo Urata, Ryota Nakamura, Shigeaki Harada:
Distributionally Robust Virtual Network Allocation Under Uncertainty of Renewable Energy Power with Wasserstein Metric. ICC 2024: 2859-2864 - 2023
- [j13]Kotaro Hatanaka, Tatsuaki Kimura, Yuka Komai, Keisuke Ishibashi, Masahiro Kobayashi, Shigeaki Harada:
Extraction and Prediction of User Communication Behaviors From DNS Query Logs Based on Nonnegative Tensor Factorization. IEEE Trans. Netw. Serv. Manag. 20(3): 2611-2624 (2023) - [c20]Ryota Nakamura, Kengo Urata, Shigeaki Harada:
A Heuristic Spatio-Temporal Scheduling for Virtual Network Allocation Considering Renewable Energy. GLOBECOM 2023: 2742-2747 - 2022
- [j12]Akito Suzuki, Ryoichi Kawahara, Shigeaki Harada:
Cooperative Multi-Agent Deep Reinforcement Learning for Dynamic Virtual Network Allocation With Traffic Fluctuations. IEEE Trans. Netw. Serv. Manag. 19(3): 1982-2000 (2022) - [j11]Ryota Nakamura, Ryoichi Kawahara, Takefumi Wakayama, Shigeaki Harada:
Virtual Network Control for Power Bills Reduction and Network Stability. IEEE Trans. Netw. Serv. Manag. 19(4): 4338-4349 (2022) - [c19]Kengo Urata, Ryota Nakamura, Shigeaki Harada:
Robust Virtual Network Allocation under Uncertainty of Traffic Demands and Renewable Energy Power. GLOBECOM 2022: 4830-4835 - 2021
- [c18]Akito Suzuki, Ryoichi Kawahara, Shigeaki Harada:
Cooperative Multi-Agent Deep Reinforcement Learning for Dynamic Virtual Network Allocation. ICCCN 2021: 1-11 - 2020
- [j10]Shigeaki Harada, Keisuke Ishibashi, Ryoichi Kawahara:
Modeling Upper Layer Reaction to QoS Degradation as a Congestion Avoidance Mechanism. IEICE Trans. Commun. 103-B(4): 302-311 (2020) - [j9]Akito Suzuki, Ryoichi Kawahara, Masahiro Kobayashi, Shigeaki Harada, Yousuke Takahashi, Keisuke Ishibashi:
Extendable NFV-Integrated Control Method Using Reinforcement Learning. IEICE Trans. Commun. 103-B(8): 826-841 (2020) - [c17]Akito Suzuki, Shigeaki Harada:
Safe Multi-Agent Deep Reinforcement Learning for Dynamic Virtual Network Allocation. GLOBECOM 2020: 1-7
2010 – 2019
- 2019
- [j8]Keisuke Ishibashi, Shigeaki Harada, Ryoichi Kawahara:
Inferring Latent Traffic Demand Offered to an Overloaded Link with Modeling QoS-Degradation Effect. IEICE Trans. Commun. 102-B(4): 790-798 (2019) - [i1]Akito Suzuki, Ryoichi Kawahara, Masahiro Kobayashi, Shigeaki Harada, Yousuke Takahashi, Keisuke Ishibashi:
Extendable NFV-Integrated Control Method Using Reinforcement Learning. CoRR abs/1912.09022 (2019) - 2018
- [c16]Akito Suzuki, Masahiro Kobayashi, Yousuke Takahashi, Shigeaki Harada, Keisuke Ishibashi, Ryoichi Kawahara:
Extendable NFV-Integrated Control Method Using Reinforcement Learning. ICC 2018: 1-7 - 2016
- [j7]Tatsuya Mori, Takeru Inoue, Akihiro Shimoda, Kazumichi Sato, Shigeaki Harada, Keisuke Ishibashi, Shigeki Goto:
Statistical estimation of the names of HTTPS servers with domain name graphs. Comput. Commun. 94: 104-113 (2016) - 2013
- [j6]Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada:
Optimally Identifying Worm-Infected Hosts. IEICE Trans. Commun. 96-B(8): 2084-2094 (2013) - [j5]Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Haruhisa Hasegawa:
Analyzing influence of network topology on designing ISP-operated CDN. Telecommun. Syst. 52(2): 969-977 (2013) - 2011
- [j4]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori, Shigeaki Harada, Haruhisa Hasegawa:
Optimally designing caches to reduce P2P traffic. Comput. Commun. 34(7): 883-897 (2011) - [j3]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori, Shigeaki Harada, Haruhisa Hasegawa:
Parallel video streaming optimizing network throughput. Comput. Commun. 34(10): 1182-1194 (2011) - [j2]Ryoichi Kawahara, Keisuke Ishibashi, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa, Shoichiro Asano:
Detection accuracy of network anomalies using sampled flow statistics. Int. J. Netw. Manag. 21(6): 513-535 (2011) - [c15]Ryoichi Kawahara, Shigeaki Harada, Noriaki Kamiyama, Tatsuya Mori, Haruhisa Hasegawa, Akihiro Nakao:
Traffic Engineering Using Overlay Network. ICC 2011: 1-6 - 2010
- [c14]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori, Shigeaki Harada, Haruhisa Hasegawa:
Optimally Designing Capacity and Location of Caches to Reduce P2P Traffic. ICC 2010: 1-6 - [c13]Noriaki Kamiyama, Ryoichi Kawahara, Tatsuya Mori, Shigeaki Harada, Haruhisa Hasegawa:
Impact of topology on parallel video streaming. NOMS 2010: 607-614
2000 – 2009
- 2009
- [c12]Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa, Ryoichi Kawahara:
Improving Deployability of Peer-Assisted CDN Platform with Incentive. GLOBECOM 2009: 1-7 - [c11]Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa:
Adaptive Bandwidth Control to Handle Long-Duration Large Flows. ICC 2009: 1-6 - 2008
- [c10]Yutaka Hirokawa, Kimihiro Yamamoto, Shigeaki Harada, Ryoichi Kawahara:
Detection of Leaps/sLumps in Traffic Volume of Internet Backbone. APNOMS 2008: 409-418 - [c9]Ryoichi Kawahara, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa, Shoichiro Asano:
Identifying Anomalous Traffic Sources Using Flow Statistics. GLOBECOM 2008: 1509-1513 - [c8]Shigeaki Harada, Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Haruhisa Hasegawa, Hideaki Yoshino:
A Method of Detecting Network Anomalies in Cyclic Traffic. GLOBECOM 2008: 2057-2061 - [c7]Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada:
Optimum Identification of Worm-Infected Hosts. IPOM 2008: 103-116 - [c6]Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino:
Extracting Worm-Infected Hosts Using White List. SAINT 2008: 68-75 - 2007
- [c5]Ryoichi Kawahara, Keisuke Ishibashi, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Shoichiro Asano:
Detection Accuracy of Network Anomalies Using Sampled Flow Statistics. GLOBECOM 2007: 1959-1964 - [c4]Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Shoichiro Asano:
A Study on Detecting Network Anomalies Using Sampled Flow Statistics. SAINT Workshops 2007: 81 - [c3]Tatsuya Mori, Ryoichi Kawahara, Noriaki Kamiyama, Shigeaki Harada:
Inferring Original Traffic Pattern from Sampled Flow Statistics. SAINT Workshops 2007: 85 - 2006
- [j1]Shigeaki Harada, Eiji Takimoto, Akira Maruoka:
Online Allocation with Risk Information. IEICE Trans. Inf. Syst. 89-D(8): 2340-2347 (2006) - [c2]Shigeaki Harada, Eiji Takimoto, Akira Maruoka:
Aggregating Strategy for Online Auctions. COCOON 2006: 33-41 - 2005
- [c1]Shigeaki Harada, Eiji Takimoto, Akira Maruoka:
Online Allocation with Risk Information. ALT 2005: 343-355
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint