Calculated based on number of publications stored in Pure and citations from Scopus
20002023

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2-D bitmap for summarizing inter-host communication patterns

    Ishibashi, K., Mori, T., Kawahara, R., Toyama, K., Osawa, S. & Asano, S., 2007, 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W. IEEE Computer Society, p. 83-86 4 p. 4090154. (SAINT - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Adaptive bandwidth control to handle long-duration large flows

    Kawahara, R., Mori, T., Kamiyama, N., Harada, S. & Hasegawa, H., 2009 Nov 19, Proceedings - 2009 IEEE International Conference on Communications, ICC 2009. 5198696. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A First Look at Brand Indicators for Message Identification (BIMI)

    Yajima, M., Chiba, D., Yoneya, Y. & Mori, T., 2023, Passive and Active Measurement - 24th International Conference, PAM 2023, Proceedings. Brunstrom, A., Flores, M. & Fiore, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 479-495 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13882 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • A First Look at COVID-19 Domain Names: Origin and Implications

    Kawaoka, R., Chiba, D., Watanabe, T., Akiyama, M. & Mori, T., 2021, Passive and Active Measurement - 22nd International Conference, PAM 2021, Proceedings. Hohlfeld, O., Lutu, A. & Levin, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 39-53 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12671 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A method of bandwidth dimensioning and management for aggregated TCP flows with heterogeneous access links

    Kawahara, R., Ishibashi, K., Mori, T., Ozawa, T., Sumita, S. & Abe, T., 2004, Networks 2004 - 11th International Telecommunications Network Strategy and Planning Symposium. VDE VERLAG GMBH, p. 15-20 6 p. (Networks 2004 - 11th International Telecommunications Network Strategy and Planning Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A method of detecting network anomalies in cyclic traffic

    Harada, S., Kawahara, R., Mori, T., Kamiyama, N., Hasegawa, H. & Yoshino, H., 2008 Dec 1, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 2057-2061 5 p. 4698171. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A method of detecting performance degradation at TCP flow level from sampled packet streams

    Kawahara, R., Ishibashi, K., Mori, T. & Abe, T., 2005 Nov 15, 2005 Workshop on High Performance Switching and Routing, HPSR 2005. p. 157-161 5 p. (2005 Workshop on High Performance Switching and Routing, HPSR 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Analyzing influence of network topology on designing ISP-operated CDN

    Kamiyama, N., Mori, T., Kawahara, R., Harada, S. & Hasegawa, H., 2010, Proceedings of 2010 14th International Telecommunications Network Strategy and Planning Symposium, Networks 2010. 5624931. (Proceedings of 2010 14th International Telecommunications Network Strategy and Planning Symposium, Networks 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A periodic combined-content distribution mechanism in peer-assisted content delivery networks

    Maki, N., Shinkuma, R., Mori, T., Kamiyama, N. & Kawahara, R., 2013 Aug 14, International Telecommunication Union - Proceedings of the 2013 ITU Kaleidoscope Academic Conference: Building Sustainable Communities, K 2013. p. 217-224 8 p. 6533770. (International Telecommunication Union - Proceedings of the 2013 ITU Kaleidoscope Academic Conference: Building Sustainable Communities, K 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A study on detecting network anomalies using sampled flow statistics

    Kawahara, R., Mori, T., Kamiyama, N., Harada, S. & Asano, S., 2007 Dec 1, 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W. 4090152. (SAINT - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • AutoBLG: Automatic URL blacklist generator using search space expansion and filters

    Sun, B., Akiyama, M., Yagi, T., Hatada, M. & Mori, T., 2016 Feb 11, 20th IEEE Symposium on Computers and Communication, ISCC 2015. Institute of Electrical and Electronics Engineers Inc., p. 625-631 7 p. 7405584. (Proceedings - IEEE Symposium on Computers and Communications; vol. 2016-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Autonomic load balancing for flow monitoring

    Kamiyama, N., Mori, T. & Kawahara, R., 2012, 2012 IEEE International Conference on Communications, ICC 2012. p. 2684-2688 5 p. 6363789. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • BotDetector: A robust and scalable approach toward detecting malware-infected devices

    Mizuno, S., Hatada, M., Mori, T. & Goto, S., 2017 Jul 28, 2017 IEEE International Conference on Communications, ICC 2017. Debbah, M., Gesbert, D. & Mellouk, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 7997372. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Careless participants are essential for our phishing study: Understanding the impact of screening methods

    Matsuura, T., Hasegawa, A. A., Akiyama, M. & Mori, T., 2021 Oct 11, Proceedings - EuroUSEC 2021: 2021 European Symposium on Usable Security. Association for Computing Machinery, p. 36-47 12 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Citations (Scopus)
  • Characterizing promotional attacks in mobile app store

    Sun, B., Luo, X., Akiyama, M., Watanabe, T. & Mori, T., 2017, Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Proceedings. Kim, D. S., Li, G., Zhang, X. & Batten, L. (eds.). Springer Verlag, p. 113-127 15 p. (Communications in Computer and Information Science; vol. 719).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Characterizing traffic flows originating from large-scale video sharing services

    Mori, T., Kawahara, R., Hasegawa, H. & Shimogawa, S., 2010 May 14, Traffic Monitoring and Analysis - Second International Workshop, TMA 2010, Proceedings. p. 17-31 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6003 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Clone or relative? Understanding the origins of similar Android apps

    Ishii, Y., Watanabe, T., Akiyama, M. & Mori, T., 2016 Mar 11, IWSPA 2016 - Proceedings of the 2016 ACM International Workshop on Security and Privacy Analytics, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 25-32 8 p. (IWSPA 2016 - Proceedings of the 2016 ACM International Workshop on Security and Privacy Analytics, co-located with CODASPY 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?

    Mori, K., Watanabe, T., Zhou, Y., Akiyama Hasegawa, A., Akiyama, M. & Mori, T., 2019 Jun, Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. Institute of Electrical and Electronics Engineers Inc., p. 159-171 13 p. 8802462. (Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Cyber-Physical Firewall: Monitoring and Controlling the Threats Caused by Malicious Analog Signals

    Iijima, R., Takehisa, T. & Mori, T., 2022 May 17, Proceedings of the 19th ACM International Conference on Computing Frontiers 2022, CF 2022. Association for Computing Machinery, p. 296-304 9 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design of an MPEG-4 general audio coder for improving speech quality

    Moriya, T., Jin, A., Iwakami, N. & Mori, T., 2000, 2000 IEEE Workshop on Speech Coding - Proceedings: Meeting the Challenges of the New Millennium. Institute of Electrical and Electronics Engineers Inc., p. 139-141 3 p. 878429. (2000 IEEE Workshop on Speech Coding - Proceedings: Meeting the Challenges of the New Millennium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Detecting and Classifying Android PUAs by Similarity of DNS queries

    Hatada, M. & Mori, T., 2017 Sept 7, Proceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference Workshops, COMPSAC 2017. Demartini, C., Yang, J-J., Ahamed, S. I., Conte, T., Akiyama, T., Reisman, S., Takakura, H., Hasan, K., Claycomb, W., Nakamura, M., Tovar, E., Zhang, Z., Liu, L., Lung, C-H. & Cimato, S. (eds.). IEEE Computer Society, p. 590-595 6 p. 8029995. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Detecting malicious websites by learning IP address features

    Chiba, D., Tobe, K., Mori, T. & Goto, S., 2012, Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 29-39 11 p. 6305258. (Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • Detection accuracy of network anomalies using sampled flow statistics

    Kawahara, R., Ishibashi, K., Mori, T., Kamiyama, N., Harada, S. & Asano, S., 2007, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings. p. 1959-1964 6 p. 4411286. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Discovering HTTPSified Phishing Websites Using the TLS Certificates Footprints

    Sakurai, Y., Watanabe, T., Okuda, T., Akiyama, M. & Mori, T., 2020 Sept, Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. Institute of Electrical and Electronics Engineers Inc., p. 522-531 10 p. 9229674. (Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Discovering similar malware samples using API call topics

    Fujino, A., Murakami, J. & Mori, T., 2015 Jul 14, 2015 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015. Institute of Electrical and Electronics Engineers Inc., p. 140-147 8 p. 7157960. (2015 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Citations (Scopus)
  • Distributed Random Number Generation Method on Smart Contracts

    Sako, K., Matsuo, S. & Mori, T., 2022 Jul 8, 2022 4th Blockchain and Internet of Things Conference, BIOTC 2022. Association for Computing Machinery, p. 1-10 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • DomainChroma: Providing Optimal Countermeasures against Malicious Domain Names

    Chiba, D., Akiyama, M., Yagi, T., Yada, T., Mori, T. & Goto, S., 2017 Sept 7, Proceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference, COMPSAC 2017. IEEE Computer Society, Vol. 1. p. 643-648 6 p. 8029671

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Domain profiler: Discovering domain names abused in future

    Chiba, D., Yagi, T., Akiyama, M., Shibahara, T., Yada, T., Mori, T. & Goto, S., 2016 Sept 29, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 491-502 12 p. 7579766

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Citations (Scopus)
  • Don't throw me away: Threats caused by the abandoned internet resources used by android apps

    Pariwono, E., Akiyama, M., Chiba, D. & Mori, T., 2018 May 29, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 147-158 12 p. (ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Efficient timeout checking mechanism for traffic control

    Kamiyama, N., Mori, T., Kawahara, R. & Lua, E. K., 2007 Dec 1, Proceedings of 16th International Conference on Computer Communications and Networks 2007, ICCCN 2007. p. 327-333 7 p. 4317840. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Eiger: Automated IOC generation for accurate and interpretable endpoint malware detection

    Kurogome, Y., Otsuki, Y., Kawakoya, Y., Iwamura, M., Hayashi, S., Mori, T. & Sen, K., 2019 Dec 9, Proceedings - 35th Annual Computer Security Applications Conference, ACSAC 2019. Association for Computing Machinery, p. 687-701 15 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    11 Citations (Scopus)
  • Estimating flow rate from sampled packet streams for detection of performance degradation at TCP flow level

    Kawahara, R., Mori, T., Ishibashi, K., Kamiyama, N. & Abe, T., 2006 Dec 1, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151076. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Estimating top N hosts in cardinality using small memory resources

    Ishibashi, K., Mori, T., Kawahara, R., Hirokawa, Y., Kobayashi, A., Yamamoto, K. & Sakamoto, H., 2006 Jan 1, ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops. Zhou, X. & Barga, R. S. (eds.). Institute of Electrical and Electronics Engineers Inc., 1623824. (ICDEW 2006 - Proceedings of the 22nd International Conference on Data Engineering Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Expected traffic reduction by content-oriented incentive in peer-assisted content delivery networks

    Maki, N., Nishio, T., Shinkuma, R., Takahashi, T., Mori, T., Kamiyama, N. & Kawahara, R., 2013 May 1, International Conference on Information Networking 2013, ICOIN 2013. p. 450-455 6 p. 6496421. (International Conference on Information Networking).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Extracting worm-infected hosts using white list

    Kamiyama, N., Mori, T., Kawahara, R., Harada, S. & Yoshino, H., 2008, Proceedings - 2008 International Symposium on Applications and the Internet, SAINT 2008. p. 68-75 8 p. 4604545. (Proceedings - 2008 International Symposium on Applications and the Internet, SAINT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Few-mode fiber for optical MIMO transmission with low computational complexity

    Sakamoto, T., Mori, T., Yamamoto, T. & Yamamoto, F., 2013, Next-Generation Optical Communication: Components, Sub-Systems, and Systems II. 86470B. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 8647).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • How is e-mail sender authentication used and misused?

    Mori, T., Takahashi, Y., Sato, K. & Ishibashi, K., 2011, Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2011. p. 31-37 7 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Identifying elephant flows through periodically sampled packets

    Mori, T., Uchida, M., Kawahara, R., Pan, J. & Goto, S., 2004, Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004. Association for Computing Machinery, p. 115-120 6 p. (Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    150 Citations (Scopus)
  • Impact of topology on parallel video streaming

    Kamiyania, N., Kawahara, R., Mori, T., Harada, S. & Hasegawa, H., 2010, Proceedings of the 2010 IEEE/IFIP Network Operations and Management Symposium, NOMS 2010. IEEE Computer Society, p. 607-614 8 p. 5488436. (Proceedings of the 2010 IEEE/IFIP Network Operations and Management Symposium, NOMS 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Improving deployability of peer-assisted CDN platform with incentive

    Mori, T., Kamiyama, N., Harada, S., Hasegawa, H. & Kawahara, R., 2009 Dec 1, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5425962. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Increasing the darkness of darknet traffic

    Haga, Y., Saso, A., Mori, T. & Goto, S., 2015, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7416973. (2015 IEEE Global Communications Conference, GLOBECOM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Inferring original traffic pattern from sampled flow statistics

    Mori, T., Kawahara, R., Kamiyama, N. & Harada, S., 2007 Dec 1, 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W. 4090156. (SAINT - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Inferring popularity of domain names with DNS traffic: exploiting cache timeout heuristics

    Shimoda, A., Ishibashi, K., Sato, K., Tsujino, M., Inoue, T., Shimura, M., Takebe, T., Takahashi, K., Mori, T. & Goto, S., 2015, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7417638. (2015 IEEE Global Communications Conference, GLOBECOM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • ISP-Operated CDN

    Kamiyama, N., Mori, T., Kawahara, R., Harada, S. & Hasegawa, H., 2009 Oct 12, IEEE INFOCOM Workshops 2009. 5072157. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis

    Chang, C. M., Hsiao, H. C., Lynar, T. & Mori, T., 2022 Apr 25, WWW 2022 - Companion Proceedings of the Web Conference 2022. Association for Computing Machinery, Inc, p. 201-204 4 p. (WWW 2022 - Companion Proceedings of the Web Conference 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Limiting pre-distribution and clustering users on multicast pre-distribution VoD

    Kamiyama, N., Kawahara, R., Mori, T. & Hasegawa, H., 2011 Sept 19, Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011. p. 706-709 4 p. 5990661. (Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Loss recovery method for content pre-distribution in VoD service

    Kamiyama, N., Kawahara, R. & Mori, T., 2014, Proceedings of World Telecommunications Congress 2014, WTC 2014. Institute of Electrical and Electronics Engineers Inc., 6840006. (Proceedings of World Telecommunications Congress 2014, WTC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Measuring Adoption of DNS Security Mechanisms with Cross-Sectional Approach

    Yajima, M., Chiba, D., Yoneya, Y. & Mori, T., 2021, 2021 IEEE Global Communications Conference, GLOBECOM 2021 - Proceedings. Institute of Electrical and Electronics Engineers Inc., (2021 IEEE Global Communications Conference, GLOBECOM 2021 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Modal gain controllable all-fiber type multimode fiber amplifier

    Wada, M., Sakamoto, T., Mori, T., Hanzawa, N., Yamamoto, T. & Yamamoto, F., 2013, 2013 18th OptoElectronics and Communications Conference Held Jointly with 2013 International Conference on Photonics in Switching, OECC/PS 2013. 6597395. (2013 18th OptoElectronics and Communications Conference Held Jointly with 2013 International Conference on Photonics in Switching, OECC/PS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Multicast pre-distribution in VoD services

    Kamiyama, N., Kawahara, R., Mori, T. & Hasegawa, H., 2011 Sept 19, 2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability, CQR 2011. 5996079. (2011 IEEE International Workshop Technical Committee on Communications Quality and Reliability, CQR 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)