default search action
Kouji Hirata
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j24]Gen Tabei, Yusuke Ito, Tomotaka Kimura, Kouji Hirata:
Design of Multi-Armed Bandit-Based Routing for in-Network Caching. IEEE Access 11: 82584-82600 (2023) - [j23]Hideyoshi Miura, Tomotaka Kimura, Hirohisa Aman, Kouji Hirata:
Game-theoretic approach to epidemic modeling of countermeasures against future malware evolution. Comput. Commun. 206: 160-171 (2023) - [c41]Hideyoshi Miura, Shoya Abukawa, Tomotaka Kimura, Kouji Hirata:
Approximate modeling of malware diffusion on wireless mobile devices. APSIPA ASC 2023: 2144-2148 - [c40]Ippei Tayuki, Gen Tabei, Kouji Hirata:
Content prefetching method to utilize reinforcement learning-based routing for in-network caching. ICCE-Taiwan 2023: 467-468 - [c39]Ryo Kaneko, Hideyoshi Miura, Tomotaka Kimura, Kouji Hirata:
Optimization of UAV placement with task offloading for UAV-based edge computing systems. ICCE-Taiwan 2023: 469-470 - [c38]Yuto Hazama, Hideyoshi Miura, Tomotaka Kimura, Kouji Hirata:
Node-based epidemic modeling for countermeasure strategies against future malware evolution. ICCE-Taiwan 2023: 643-644 - 2022
- [j22]Hideyoshi Miura, Kouji Hirata, Takuji Tachibana:
P4-based design of fast failure recovery for software-defined networks. Comput. Networks 216: 109274 (2022) - [c37]Ehito Okada, Kouji Hirata, Takuji Tachibana:
Design of a load balancing method for multiple routing configurations. ICCE-TW 2022: 215-216 - [c36]Mikoto Tsunematsu, Katsuki Uno, Hideyoshi Miura, Kouji Hirata:
Server placement method with conditional generative adversarial networks for designing edge computing systems. ICCE-TW 2022: 217-218 - [c35]Gen Tabei, Kouji Hirata:
Joint optimization of server and content placement for in-network caching. ICCE-TW 2022: 219-220 - 2021
- [j21]Takanori Kudo, Tomotaka Kimura, Yutaka Fukuchi, Kouji Hirata:
Static routing and spectrum allocation method for design of low-power elastic optical networks with multifiber environments. Opt. Switch. Netw. 40: 100604 (2021) - [c34]Takeru Misugi, Kouji Hirata, Takuji Tachibana:
Implementation of a fast failure recovery method considering load distribution for network slicing. APSIPA ASC 2021: 1895-1898 - [c33]Gen Tabei, Yusuke Ito, Tomotaka Kimura, Kouji Hirata:
Multi-Armed Bandit-based Routing Method for In-network Caching. APSIPA ASC 2021: 1899-1902 - [c32]Hideyoshi Miura, Tomotaka Kimura, Kouji Hirata:
Inhibition modeling of future malware diffusion with an evolutionary game theory. APSIPA ASC 2021: 1908-1911 - 2020
- [j20]Kouji Hirata, Hiroshi Yamamoto, Shohei Kamamura, Toshiyuki Oka, Yoshihiko Uematsu, Hideki Maeda, Miki Yamamoto:
System Design for Traveling Maintenance in Wide-Area Telecommunication Networks. IEICE Trans. Commun. 103-B(4): 363-374 (2020) - [j19]Kouji Hirata, Tomotaka Kimura, Yutaka Fukuchi, Masahiro Muraguchi:
Design of low-power all-optical networks under the constraint of four-wave mixing. Int. J. Commun. Syst. 33(11) (2020) - [c31]Shota Nangu, Tomotaka Kimura, Kouji Hirata:
Optimization of virtual machine placement for balancing network and server load in edge computing environments. APSIPA 2020: 1536-1540 - [c30]Yurina Nagasawa, Keita Kishioka, Tomotaka Kimura, Kouji Hirata:
Prediction method of malware infection spreading considering network scale. APSIPA 2020: 1541-1544 - [c29]Ayaka Takeda, Tomotaka Kimura, Kouji Hirata:
Joint optimization of edge server and virtual machine placement in edge computing environments. APSIPA 2020: 1545-1548 - [c28]Yusuke Ito, Yusuke Wada, Tomotaka Kimura, Kouji Hirata, Masahiro Muraguchi:
A Caching Scheme Based on Popularity and Generation Time of Feedback Information in Edge Computing. ICCE-TW 2020: 1-2 - [c27]Hideyoshi Miura, Tomotaka Kimura, Kouji Hirata:
Modeling of malware diffusion with the FLIPIT game. ICCE-TW 2020: 1-2 - [c26]Yurina Nagasawa, Tomotaka Kimura, Kouji Hirata:
Prioritization method of link protection with convolutional neural networks. ICCE-TW 2020: 1-2 - [c25]Katsuki Uno, Tomotaka Kimura, Kouji Hirata:
Estimation method of malware infection spreading with graph convolutional networks. ICCE-TW 2020: 1-2
2010 – 2019
- 2019
- [j18]Tomotaka Kimura, Takaya Suzuki, Kouji Hirata, Masahiro Muraguchi:
Residual Capacity-Aware Virtual Machine Assignment for Reducing Network Loads in Multi-tenant Data Center Networks. J. Netw. Syst. Manag. 27(4): 949-971 (2019) - [c24]Kouji Hirata, Takuji Tachibana:
Implementation of multiple routing configurations on software-defined networks with P4. APSIPA 2019: 13-16 - [c23]Koki Shimizu, Yuya Kumai, Kimiko Motonaka, Tomotaka Kimura, Kouji Hirata:
Evaluation of countermeasure against future malware evolution with deterministic modeling. APSIPA 2019: 17-21 - [c22]Tomotaka Kimura, Akira Noguchi, Kouji Hirata, Masahiro Muraguchi:
Trajectory estimation method using sparsely deployed anchor nodes. ICCE-TW 2019: 1-2 - [c21]Hiroto Kondo, Tomotaka Kimura, Yutaka Fukuchi, Kouji Hirata:
Static routing and spectrum allocation for mitigating crosstalk in multi-core fiber networks. ICCE-TW 2019: 1-2 - [c20]Yurina Nagasawa, Tomotaka Kimura, Takanori Kudo, Kouji Hirata:
Estimation method of network availability with convolutional neural networks. ICCE-TW 2019: 1-2 - [c19]Ayaka Takeda, Tomotaka Kimura, Kouji Hirata:
Evaluation of edge cloud server placement for edge computing environments. ICCE-TW 2019: 1-2 - [c18]Yuya Kumai, Koki Hongyo, Tomotaka Kimura, Kouji Hirata:
Infection Dynamics of Self-Evolving Botnets with Deterministic Modeling. ICOIN 2019: 408-410 - [c17]Taketo Fukushima, Masamitsu Iio, Kouji Hirata, Miki Yamamoto:
Popularity-Based Content Cache Management for in-Network Caching. ICOIN 2019: 411-413 - 2018
- [j17]Takanori Kudo, Tomotaka Kimura, Yoshiaki Inoue, Hirohisa Aman, Kouji Hirata:
Stochastic modeling of self-evolving botnets with vulnerability discovery. Comput. Commun. 124: 101-110 (2018) - [j16]Koichi Yoshioka, Kouji Hirata, Miki Yamamoto:
Flow-Based Routing for Flow Entry Aggregation in Software-Defined Networking. IEICE Trans. Commun. 101-B(1): 49-57 (2018) - [j15]Tomotaka Kimura, Kouji Hirata, Masahiro Muraguchi:
Adaptive access-point and channel selection method using Markov approximation. Int. J. Distributed Sens. Networks 14(2) (2018) - [c16]Keita Kishioka, Koki Hongyo, Tomotaka Kimura, Takanori Kudo, Yoshiaki Inoue, Kouji Hirata:
Prediction Method of Infection Spreading with CNN for Self-evolving Botnets. APSIPA 2018: 1810-1815 - [c15]Takahiro Nogiwa, Kouji Hirata:
Identification of TCP congestion control algorithms with convolution neural networks. ICOIN 2018: 663-665 - [c14]Wataru Morita, Daisuke Sugahara, Kouji Hirata, Miki Yamamoto:
AQM with multi-queue for microburst in data center networks. INFOCOM Workshops 2018: 379-384 - 2017
- [c13]Masamitsu Iio, Kouji Hirata, Miki Yamamoto:
Distributed cache management considering content popularity for in-network caching. APCC 2017: 1-6 - [c12]Masaaki Takezaki, Kouji Hirata:
Static lightpath establishment method with multi-path routing in elastic optical networks. ICOIN 2017: 109-111 - [c11]Koichi Yoshioka, Kouji Hirata, Miki Yamamoto:
Routing method with flow entry aggregation for software-defined networking. ICOIN 2017: 157-162 - [c10]Kouji Hirata, Miki Yamamoto:
Data center traffic engineering using Markov approximation. ICOIN 2017: 173-178 - [c9]Tomotaka Kimura, Kouji Hirata, Masahiro Muraguchi:
Dynamic access-point selection method using Markov approximation. ICOIN 2017: 332-337 - [c8]Kai Morita, Kouji Hirata:
Dynamic spectrum allocation method for reducing crosstalk in multi-core fiber networks. ICOIN 2017: 686-688 - 2016
- [j14]Kenta Matsushima, Kouji Hirata, Miki Yamamoto:
Fairness Improvement of Multiple-Bottleneck Flow in Data Center Networks. IEICE Trans. Commun. 99-B(7): 1445-1454 (2016) - [j13]Kouji Hirata, Kohei Ito, Yutaka Fukuchi, Masahiro Muraguchi:
Design of low power all-optical networks with dynamic lightpath establishment. J. Commun. Networks 18(4): 551-558 (2016) - [c7]Takanori Kudo, Tomotaka Kimura, Yoshiaki Inoue, Hirohisa Aman, Kouji Hirata:
Behavior analysis of self-evolving botnets. CITS 2016: 1-5 - 2015
- [j12]Yutaka Fukuchi, Kouji Hirata, Joji Maeda:
Numerical Analyses of All-Optical Retiming Switches Using Cascade of Second Harmonic Generation and Difference Frequency Mixing in Periodically Poled Lithium Niobate Waveguides. IEICE Trans. Electron. 98-C(12): 1143-1149 (2015) - [c6]Kouji Hirata, Kohei Ito, Yutaka Fukuchi, Masahiro Muraguchi:
Dynamic lightpath establishment for achieving low power all-optical networks. APNOMS 2015: 215-220 - [c5]Kouji Hirata, Yutaka Fukuchi, Masahiro Muraguchi:
Design of all-optical networks considering power consumption and four-wave mixing. CITS 2015: 1-5 - [c4]Takaya Suzuki, Tomotaka Kimura, Kouji Hirata, Masahiro Muraguchi:
Adaptive virtual machine assignment for multi-tenant data center networks. CITS 2015: 1-5 - 2013
- [j11]Kouji Hirata, Minoru Kawahara:
Group replica caching scheme for optical grid networks. Opt. Switch. Netw. 10(3): 223-232 (2013) - [j10]Kouji Hirata, Yutaka Fukuchi, Masahiro Muraguchi:
Dynamic lightpath establishment considering four-wave mixing in multifiber WDM networks. Photonic Netw. Commun. 26(2-3): 120-130 (2013) - 2012
- [j9]Dewiani, Kouji Hirata, Khamisi Kalegele, Yoshinobu Higami, Shin-ya Kobayashi:
Dynamic Routing and Wavelength Assignment with Backward Reservation in Wavelength-routed Multifiber WDM Networks. J. Networks 7(9): 1441-1448 (2012) - [j8]Kouji Hirata, Dewiani:
Dynamic Routing and Wavelength Assignment in Multifiber WDM Networks with Wavelength Conversion Capability. Netw. Commun. Technol. 1(2): 36-47 (2012) - [j7]Kouji Hirata, Minoru Kawahara:
Contention resolution considering multicast traffic in optically burst-switched WDM networks. Photonic Netw. Commun. 23(2): 157-165 (2012) - [c3]Dewiani, Kouji Hirata, Yoshinobu Higami, Shin-ya Kobayashi:
Dynamic routing and wavelength assignment in multifiber WDM networks with sparse wavelength conversion. ICTC 2012: 567-572 - 2011
- [j6]Kouji Hirata, Minoru Kawahara:
Parallel and multi-wavelength downloading in optical grid networks. Photonic Netw. Commun. 22(3): 245-253 (2011) - [c2]Kouji Hirata, Minoru Kawahara:
Replica caching scheme according to status of neighboring nodes in optical grid networks. NOF 2011: 112-116 - 2010
- [j5]Kouji Hirata, Khamisi Kalegele, Yoshinobu Higami, Shin-ya Kobayashi:
Dynamic Parallel Downloading with Network Coding in $\lambda$-Grid Networks. J. Commun. 5(5): 425-435 (2010) - [j4]Kouji Hirata, Khamisi Kalegele, Yoshinobu Higami, Shin-ya Kobayashi:
Replica Selection and Downloading based on Wavelength Availability in λ-grid Networks. J. Commun. 5(9): 692-702 (2010) - [j3]Kouji Hirata, Takahiro Matsuda, Tetsuya Takine:
Three-Domain Burst Scheduling in Optically Burst-Switched WDM Networks. JOCN 2(6): 332-343 (2010)
2000 – 2009
- 2007
- [j2]Kouji Hirata, Takahiro Matsuda, Hiroshi Nagamochi, Tetsuya Takine:
Contention-Free lambda-Planes in Optically Burst-Switched WDM Networks. IEICE Trans. Commun. 90-B(9): 2524-2531 (2007) - [j1]Kouji Hirata, Takahiro Matsuda, Tetsuya Takine:
Dynamic burst discarding scheme for deflection routing in optical burst switching networks. Opt. Switch. Netw. 4(2): 106-120 (2007) - 2006
- [c1]Kouji Hirata, Takahiro Matsuda, Hiroshi Nagamochi, Tetsuya Takine:
Contention-Free l-Planes in Optically Burst-Switched WDM Networks. GLOBECOM 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint