default search action
Nariyoshi Yamai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Tatsuya Sato, Taku Shimosawa, Nariyoshi Yamai:
BillingOpsSC: Smart Contract-based Service Billing Management Method for Consortium Blockchain-based Systems. J. Inf. Process. 32: 605-617 (2024) - [c67]Satoru Sunahara, Yong Jin, Katsuyoshi Iida, Nariyoshi Yamai, Yoshiaki Takai:
Privacy Preserved Achievement Method for OCSP Status and Supported Protocols in Full-DoH Architecture. COMPSAC 2024: 1554-1555 - [c66]Akihiro Takai, Yusei Katsura, Nariyoshi Yamai, Rei Nakagawa, Vasaka Visoottiviseth:
Quick Blocking Operation of IDS/SDN Cooperative Firewall Systems by Reducing Communication Overhead. ICACT 2024: 1514-1520 - [c65]Tomoya Kawana, Rei Nakagawa, Nariyoshi Yamai:
Communication Multiplexing of Server with QUIC and SDN in Multihomed Networks. ICOIN 2024: 345-350 - 2023
- [c64]Nariyoshi Yamai, Yong Jin, Toshio Murakami, Rei Nakagawa:
Verification Method of Associated Domain Names Using Certificates by Applying DNS over TLS to Authoritative Servers. COMPSAC 2023: 1000-1001 - [c63]Tatsuya Sato, Taku Shimosawa, Nariyoshi Yamai:
BillingOpsSC: Smart Contract-based Service Billing Management Method for Consortium Blockchain-based Systems. COMPSAC 2023: 1101-1106 - [c62]Toshio Murakami, Kenta Shimabukuro, Nao Sato, Rei Nakagawa, Yong Jin, Nariyoshi Yamai:
Trustworthy Name Resolution Using TLS Certificates with DoT-enabled Authoritative DNS Servers. COMPSAC 2023: 1121-1126 - [c61]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Trigger-based Blocking Mechanism for Access to Email-derived Phishing URLs with User Alert. ICEIC 2023: 1-6 - [c60]Perakorn Nimitkul, Akihiro Takai, Nariyoshi Yamai, Rei Nakagawa, Songpon Teerakanok:
The Study on the Blocking Time Reduction of the IDS/SON Cooperative Firewall System. QRS Companion 2023: 549-554 - 2022
- [c59]Tomoya Nakano, Rei Nakagawa, Nariyoshi Yamai:
Mitigating Congestion with Decentralized Traffic Shaping for Adaptive Video Streaming over ICN. AINTEC 2022: 36-43 - [c58]Akihiro Takai, Nariyoshi Yamai, Rei Nakagawa:
Fast Blocking of Malicious Traffic by Excluding Benign Flow Monitoring in IDS/SDN Cooperative Firewall Systems. AINTEC 2022: 62-69 - [c57]Nay Myat Min, Vasaka Visoottiviseth, Songpon Teerakanok, Nariyoshi Yamai:
OWASP IoT Top 10 based Attack Dataset for Machine Learning. ICACT 2022: 317-322 - [c56]Yong Jin, Kazuya Iguchi, Nariyoshi Yamai, Masahiko Tomoishi:
Acceleration of a Client Based DNSSEC Validation System in Parallel with Two Full-Service Resolvers. ICACT 2022: 387-392 - [c55]Yusei Katsura, Pranpariya Sakarin, Nariyoshi Yamai, Hiroyuki Kimiyama, Vasaka Visoottiviseth:
Quick Blocking Operation of Firewall System Cooperating with IDS and SDN. ICACT 2022: 393-398 - [c54]Yong Jin, Zhengxu Jin, Nariyoshi Yamai, Rei Nakagawa:
An OpenFlow based Optimal Selection Mechanism for Multiple Web Servers. ICCCM 2022: 263-268 - 2021
- [j26]Kenta Yokogi, Naoya Kitagawa, Nariyoshi Yamai:
IoT-oriented Secure Data Sharing Using Public Cloud. J. Inf. Process. 29: 747-756 (2021) - [c53]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Secure Remote Monitoring and Cipher Data Sharing for IoT Healthcare System with Privacy Preservation. ICCBDC 2021: 46-51 - [c52]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification. ICHMI 2021: 47-56 - [c51]Hiroki Kashiwazaki, Takuro Ozaki, Hajime Shimada, Yusuke Komiya, Eisaku Sakane, Kazuhiro Mishima, Shiu Sakashita, Nariyoshi Yamai, Yoshiaki Kitaguchi, Kensuke Miyashita:
Japanese Activities to bring online academic meetings against COVID-19: How We Learned to Stop Worrying and Love the Online Meetings. SIGUCCS 2021: 54-59 - 2020
- [j25]Kazuhiko Kinoshita, Masahiko Aihara, Nariyoshi Yamai, Takashi Watanabe:
Joint Bandwidth Assignment and Routing for Power Saving on Large File Transfer with Time Constraints. IEICE Trans. Commun. 103-B(4): 431-439 (2020) - [j24]Nariyoshi Yamai:
Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2019. J. Inf. Process. 28: 537 (2020) - [c50]Kanako Konno, Naoya Kitagawa, Nariyoshi Yamai:
False Positive Detection in Sender Domain Authentication by DMARC Report Analysis. ICISS 2020: 38-42 - [c49]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
A Detour Strategy for Visiting Phishing URLs Based on Dynamic DNS Response Policy Zone. ISNCC 2020: 1-6
2010 – 2019
- 2019
- [j23]Takahiro Shimizu, Naoya Kitagawa, Kohta Ohshima, Nariyoshi Yamai:
WhiteRabbit: Scalable Software-Defined Network Data-Plane Verification Method Through Time Scheduling. IEEE Access 7: 97296-97306 (2019) - [c48]Kenya Dan, Naoya Kitagawa, Shuji Sakuraba, Nariyoshi Yamai:
Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log. COMPSAC (1) 2019: 896-899 - [c47]Ryuji Asakura, Reido Horigome, Nariyoshi Yamai, Naoya Kitagawa, Satoshi Ohzahata:
A Traffic Distribution System Among Multiple Terminals Using MPTCP in Multihomed Network Environment. COMPSAC (1) 2019: 900-903 - [c46]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
Anomaly Detection by Monitoring Unintended DNS Traffic on Wireless Network. PACRIM 2019: 1-6 - [e2]Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1. IEEE 2019, ISBN 978-1-7281-2607-4 [contents] - [e1]Vladimir Getov, Jean-Luc Gaudiot, Nariyoshi Yamai, Stelvio Cimato, J. Morris Chang, Yuuichi Teranishi, Ji-Jiang Yang, Hong Va Leong, Hossain Shahriar, Michiharu Takemoto, Dave Towey, Hiroki Takakura, Atilla Elçi, Susumu Takeuchi, Satish Puri:
43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2. IEEE 2019, ISBN 978-1-7281-2607-4 [contents] - 2018
- [j22]Kazuhiko Kinoshita, Masahiko Aihara, Shiori Kono, Nariyoshi Yamai, Takashi Watanabe:
Joint Bandwidth Scheduling and Routing Method for Large File Transfer with Time Constraint and Its Implementation. IEICE Trans. Commun. 101-B(3): 763-771 (2018) - [j21]Hiroya Ikarashi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Kiyohiko Okayama:
Design and Implementation of SDN-Based Proactive Firewall System in Collaboration with Domain Name Resolution. IEICE Trans. Inf. Syst. 101-D(11): 2633-2643 (2018) - [c45]Masami Fukuyama, Nariyoshi Yamai, Satoshi Ohzahata, Naoya Kitagawa:
Throughput Improvement of MPTCP by Selective Bicasting with Cross-Layer Control in Wireless Environment. COMPSAC (2) 2018: 204-209 - [c44]Kenta Yokogi, Naoya Kitagawa, Nariyoshi Yamai:
Access Control Model for IoT Environment Including Automated Configuration. COMPSAC (2) 2018: 616-621 - [c43]Behrooz A. Shirazi, Nariyoshi Yamai:
Message from the NCIW Program Co-chairs. COMPSAC (1) 2018: 887 - [c42]Reido Horigome, Nariyoshi Yamai, Naoya Kitagawa, Satoshi Ohzahata:
Alternating Primary Subflow in MPTCP by External Program without Kernel Modification. COMPSAC (1) 2018: 962-965 - [c41]Yong Jin, Kunitaka Kakoi, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi:
A Client Based Anomaly Traffic Detection and Blocking Mechanism by Monitoring DNS Name Resolution with User Alerting Feature. CW 2018: 351-356 - [c40]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
A Client Based DNSSEC Validation Mechanism with Recursive DNS Server Separation. ICTC 2018: 148-153 - 2017
- [j20]Yong Jin, Kunitaka Kakoi, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi:
A Client Based DNSSEC Validation System with Adaptive Alert Mechanism Considering Minimal Client Timeout. IEICE Trans. Inf. Syst. 100-D(8): 1751-1761 (2017) - [c39]Kunitaka Kakoi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi:
Cache Function Activation on a Client Based DNSSEC Validation and Alert System by Multithreading. COMPSAC (2) 2017: 37-42 - [c38]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
A Secure and Lightweight IoT Device Remote Monitoring and Control Mechanism Using DNS. COMPSAC (2) 2017: 282-283 - [c37]Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara, Nariyoshi Yamai, Sylvain Duquesne:
Solving 114-Bit ECDLP for a Barreto-Naehrig Curve. ICISC 2017: 231-244 - [c36]Yong Jin, Kunitaka Kakoi, Masahiko Tomoishi, Nariyoshi Yamai:
Efficient detection of suspicious DNS traffic by resolver separation per application program. ICTC 2017: 87-92 - 2016
- [c35]Kunitaka Kakoi, Yong Jin, Nariyoshi Yamai, Naoya Kitagawa, Masahiko Tomoishi:
Design and Implementation of a Client Based DNSSEC Validation and Alert System. COMPSAC Workshops 2016: 8-13 - [c34]Yong Jin, Masahiko Tomoishi, Nariyoshi Yamai:
An advanced client based DNSSEC validation and preliminary evaluations toward realization. ICTC 2016: 178-183 - [c33]Masahiko Aihara, Shiori Kono, Kazuhiko Kinoshita, Nariyoshi Yamai, Takashi Watanabe:
Joint bandwidth scheduling and routing method for large file transfer with time constraint. NOMS 2016: 1125-1130 - 2015
- [j19]Nariyoshi Yamai:
Editor's Message to Special Issue of Applications and the Internet in Conjunction with Main Topics of COMPSAC 2014. J. Inf. Process. 23(4): 381 (2015) - [j18]Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
Design and Implementation of Optimal Route Selection Mechanism for Outbound Connections on IPv6 Multihoming Environment. J. Inf. Process. 23(4): 441-448 (2015) - [j17]Daisuke Okamoto, Keita Kawano, Nariyoshi Yamai, Tokumi Yokohira:
Strict Application Execution Control with Hierarchical Group Management Using Digital Certificates on Educational Windows PCs. J. Inf. Process. 23(4): 449-457 (2015) - [c32]Kensuke Saito, Kazuhiko Kinoshita, Nariyoshi Yamai, Takashi Watanabe:
A distributed bandwidth assignment method for large file transfer with time constraints. APNOMS 2015: 279-284 - [c31]Nariyoshi Yamai, Mario Köppen, Youngseok Lee:
Message from the ADMNET 2015 Workshop Organizers. COMPSAC Workshops 2015: 120 - [c30]Tomokazu Otsuka, Gada, Nariyoshi Yamai, Kiyohiko Okayama, Yong Jin:
Design and Implementation of Client IP Notification Feature on DNS for Proactive Firewall System. COMPSAC Workshops 2015: 127-132 - 2014
- [j16]Kazuhiko Kinoshita, Nariyoshi Yamai, Koso Murakami:
A Fair and Efficient Agent Scheduling Method for Content-Based Information Retrieval with Individual Time Constraints and Its Implementation. IEICE Trans. Commun. 97-B(5): 945-951 (2014) - [j15]Keita Kawano, Daisuke Okamoto, Masanori Fujiwara, Nariyoshi Yamai:
A Flexible Execution Control Method of Application Software for Educational Windows PCs. J. Inf. Process. 22(2): 161-174 (2014) - [j14]Nariyoshi Yamai, Masayuki Matsuoka, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Masato Minda:
Domain Registration Date Retrieval System for Improving Spam Mail Discrimination. J. Inf. Process. 22(3): 480-485 (2014) - [c29]Koki Okamoto, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Tokumi Yokohira:
Performance Improvement of SCTP Communication Using Selective Bicasting on Lossy Multihoming Environment. COMPSAC 2014: 551-557 - 2013
- [j13]Yoshihiro Ohsumi, Kiyohiko Okayama, Nariyoshi Yamai:
A Configuration of Location Free Network Applicable to Location Dependent Services. Inf. Media Technol. 8(3): 749-756 (2013) - [j12]Yong Jin, Takuya Yamaguchi, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
A Site-Exit Router Selection Method Using Routing Header in IPv6 Site Multihoming. Inf. Media Technol. 8(3): 757-765 (2013) - [j11]Yoshihiro Ohsumi, Kiyohiko Okayama, Nariyoshi Yamai:
A Configuration of Location Free Network Applicable to Location Dependent Services. J. Inf. Process. 21(3): 433-440 (2013) - [j10]Yong Jin, Takuya Yamaguchi, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
A Site-Exit Router Selection Method Using Routing Header in IPv6 Site Multihoming. J. Inf. Process. 21(3): 441-449 (2013) - [c28]Takuya Yamaguchi, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Koki Okamoto, Motonori Nakamura:
An Optimal Route Selection Mechanism for Outbound Connection on IPv6 Site Multihoming Environment. COMPSAC Workshops 2013: 575-580 - [c27]Gada, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura:
E-Mail Priority Delivery System with Dynamic Whitelist in the Layer 3 Switch. COMPSAC Workshops 2013: 581-586 - [c26]Masayuki Matsuoka, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Masato Minda:
Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination. COMPSAC Workshops 2013: 587-592 - [c25]Daisuke Okamoto, Masanori Fujiwara, Keita Kawano, Nariyoshi Yamai:
Target Application Grouping Function Considering Software Updates on Application Execution Control System. COMPSAC Workshops 2013: 627-632 - 2012
- [j9]Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
An Adaptive Route Selection Mechanism Per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks. Inf. Media Technol. 7(2): 831-840 (2012) - [j8]Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
An Adaptive Route Selection Mechanism Per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks. J. Inf. Process. 20(2): 386-395 (2012) - [c24]Takuya Yamaguchi, Yong Jin, Ryoichi Tokumoto, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
Multihoming Method Using Routing Header in IPv6 Environment. SAINT 2012: 351-356 - [c23]Yoshihiro Ohsumi, Kiyohiko Okayama, Nariyoshi Yamai, Takaoki Fujiwara, Takashi Hieda:
A Location Free Network System Applicable to Geographical Terms of the Electronic Journal Site License. SAINT 2012: 357-362 - [c22]Masanori Fujiwara, Keita Kawano, Nariyoshi Yamai:
An Execution Control System for Application Software Reducing Administrative Burden of Educational PCs. SAINT 2012: 375-380 - [c21]Shuji Suwa, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura, Keita Kawano, Gada:
Spam Mail Discrimination System Based on Behavior of DNS Servers Associated with URLs. SAINT 2012: 381-386 - 2011
- [j7]Kazuhiko Kinoshita, Atsushi Narishige, Yusuke Hara, Nariyoshi Yamai, Koso Murakami:
An Efficient Agent Execution Control Method for Content-Based Information Retrieval with Time Constraints. IEICE Trans. Commun. 94-B(7): 1892-1900 (2011) - [c20]Yong Jin, Nariyoshi Yamai:
Proposal of an Adaptive Firewall System in Collaboration with Extended DNS. SAINT 2011: 222-225 - [c19]Shuji Suwa, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
DNS Resource Record Analysis of URLs in E-Mail Messages for Improving Spam Filtering. SAINT 2011: 439-444 - [c18]Yoshiki Ishikawa, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
An Identification Method of PCs behind NAT Router with Proxy Authentication on HTTP Communication. SAINT 2011: 445-450 - 2010
- [c17]Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura:
An Adaptive Route Selection Mechanism per Connection Based on Multipath DNS Round Trip Time on Multihomed Networks. SAINT 2010: 52-58 - [c16]Takumi Seike, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura:
A Solution for Mail Forwarding Problem of SPF by Tracing Recipient Addresses. SAINT 2010: 129-132 - [c15]Ryo Murakami, Nariyoshi Yamai, Kiyohiko Okayama:
A MAC-address Relaying NAT Router for PC Identification from Outside of a LAN. SAINT 2010: 237-240 - [c14]Sho Jitsuto, Yong Jin, Kiyohiko Okayama, Nariyoshi Yamai:
A Dynamic Routing Method for Inbound E-mail Delivery Considering Route and MTA Conditions on Multihomed Environment. SAINT 2010: 245-248
2000 – 2009
- 2009
- [c13]Hiroki Okada, Tran Nguyen Trung, Kazuhiko Kinoshita, Koso Murakami, Nariyoshi Yamai:
A Cooperative Routing Method for Multiple Overlay Networks. CCNC 2009: 1-2 - [c12]Yusuke Hara, Kazuhiko Kinoshita, Nariyoshi Yamai, Koso Murakami:
An efficient agent control method for information retrieval with time constraints. ISADS 2009: 189-194 - 2008
- [j6]Keita Kawano, Kazuhiko Kinoshita, Nariyoshi Yamai:
A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks. IEICE Trans. Commun. 91-B(7): 2272-2278 (2008) - [j5]Tran Nguyen Trung, Hideo Kamada, Kazuhiko Kinoshita, Nariyoshi Yamai, Tetsuya Takine, Koso Murakami:
An Efficient Agent Control Method for Time-Constrained Applications. IEICE Trans. Commun. 91-B(9): 2972-2979 (2008) - [c11]Keita Kawano, Kazuhiko Kinoshita, Nariyoshi Yamai:
A distributed mobility management scheme for large-scale Mobile Networks. LCN 2008: 500-501 - 2007
- [j4]Hui Wang, Shigeyuki Osada, Tokumi Yokohira, Kiyohiko Okayama, Nariyoshi Yamai:
Effect of Premature ACK Transmission Timing on Throughput in TCP with a Performance Enhancing Proxy. IEICE Trans. Commun. 90-B(1): 31-41 (2007) - [c10]Kiyohiko Okayama, Nariyoshi Yamai, Hayato Ishibashi, Kota Abe, Toshio Matsuura:
An Efficient Management Method of Access Policies for Hierarchical Virtual Private Networks. COMSWARE 2007 - [c9]Vijitha Ranatunga, Akira Hosokawa, Kazuhiko Kinoshita, Nariyoshi Yamai, Koso Murakami:
A Fair and Effective Scheduling Algorithm for Multi-Agent Systems. COMSWARE 2007 - 2006
- [c8]Shin Maruyama, Motonori Nakamura, Yasuo Okabe, Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashita:
Priority Control in Receiving E-mails by Giving a Separate Response to Each DNS Query. SAINT 2006: 90-93 - 2005
- [c7]Kazuhiko Kinoshita, Nariyoshi Yamai, Koso Murakami:
A Logical Network Topology Design for Mobile Agent Systems. ICN (2) 2005: 521-530 - [c6]Hideo Kamada, Kazuhiko Kinoshita, Nariyoshi Yamai, Hideki Tode, Koso Murakami:
An Efficient Agent Control Method for Time Constraint Applications. SAINT 2005: 280-286 - [c5]Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashita, Shin Maruyama, Motonori Nakamura:
A Protection Method Against Massive Error Mails Caused by Sender Spoofed Spam Mails. SAINT 2005: 384-390 - 2003
- [c4]Akira Hosokawa, Kazuhiko Kinoshita, Nariyoshi Yamai, Koso Murakami:
A Location Transparent Multi-agent System with Terminal Mobility Support. ICOIN 2003: 426-435 - [c3]Hayato Ishibashi, Kiyohiko Okayama, Nariyoshi Yamai, Kota Abe, Toshio Matsuura:
New Approach for Configuring Hierarchical Virtual Private Networks Using Proxy Gateways. ICOIN 2003: 772-782 - 2002
- [j3]Nariyoshi Yamai, Kou Nakayoshi, Hayato Ishibashi, Kota Abe, Koso Murakami, Toshio Matsuura:
NFS-based secure file sharing over multiple administrative domains with minimal administration. Syst. Comput. Jpn. 33(14): 50-58 (2002) - 2001
- [c2]Nariyoshi Yamai, Kiyohiko Okayama, Hiroshi Shimamoto, Takuji Okamoto:
A dynamic traffic sharing with minimal administration on multihomed networks. ICC 2001: 1506-1510
1990 – 1999
- 1995
- [j2]Nariyoshi Yamai, Susumu Wakabayashi, Shinji Shimojo, Hideo Miyahara:
Design and implementation of load-balancing mechanism at command level on UNIX. Syst. Comput. Jpn. 26(6): 16-26 (1995) - 1990
- [j1]Nariyoshi Yamai, Shinji Shimojo, Hideo Miyahara:
A load balancing algorithm on multiprocessor time-sharing systems. Syst. Comput. Jpn. 21(8): 1-10 (1990)
1980 – 1989
- 1989
- [c1]Nariyoshi Yamai, Tadashi Seko, Noboru Kubo, Toru Kawata:
An Effective Enumeration Algorithm of Parses for Ambiguous CFL. IWPT 1989: 286-296
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint