Publication 2016

Refereed Journal

  1. 戸田 貴久, 斎藤 寿樹, 岩下 洋哲, 川原 純, 湊 真一, “ZDDと列挙問題 – 最新の技法とプログラミングツール,” コンピュータソフトウェア, 2016.8.31.
  2. Nobuhisa Komatsu, Masahiro Sasabe, Jun Kawahara and Shoji Kasahara, “Automatic Evacuation Guiding Scheme Based On Implicit Interactions Between Evacuees and Their Mobile Nodes,” GeoInformatica, pp. 1-15, Aug. 2016.
  3. YuanYu Zhang, Yulong Shen, Hua Wang, Jianming Yong and Xiaohong Jiang, “On Secure Wireless Communications for IoT Under Eavesdropper Collusion,” IEEE Transactions on Automation Science and Engineering , vol.13, no.3, pp. 1281-1293, Jul. 2016.
  4. Masataka Kato, Hiroyuki Masuyama, Shoji Kasahara and Yutaka Takahashi, “Effect of Energy-Saving Server Scheduling on Power Consumption for Large-Scale Data Centers,” Journal of Industrial and Management Optimization, vol.12, no.2, pp. 667-685, Apr. 2016.
  5. Tsuguhito Hirai, Hiroyuki Masuyama, Shoji Kasahara and Yutaka Takahashi, “Performance Analysis of Task Replication in Large-Scale Parallel-Distributed Processing: An Extreme Value Theory Approach,” Journal of the Operations Research Society of Japan, vol.59, no.2, pp. 174-194, Apr. 2016.
  6. Takeru Inoue, Hiroaki Iwashita, Jun Kawahara and Shin-ichi Minato, “Graphillion: software library for very large sets of labeled graphs,” International Journal on Software Tools for Technology Transfer, vol.18, no.1, pp. 57-66, Feb. 2016.

Refereed International Conference

  1. Akifumi Maeda, Shoji Kasahara and Yutaka Takahashi, “Dynamic Task Scheduling for Energy Harvesting Nodes in Wireless Sensor Networks,” Proceedings of the 11th International Conference on Queueing Theory and Network Applications (QTNA2016), 14 Dec. 2016.
  2. Apichanukul Worachate, Jun Kawahara and Shoji Kasahara, “Accuracy Improvement for Backup Tasks in Hadoop Speculative Algorithm,” 6th IEEE International Symposium on Cloud and Services Computing, pp. 500-507, 8 Dec. 2016.
  3. Jun Kawahara, Toshiki Saitoh, Hirofumi Suzuki and Ryo Yoshinaka, “Solving the longest oneway-ticket problem and enumerating letter graphs by augmenting the two representative approaches with ZDDs,” Computational Intelligence in Information Systems: Proceedings of the Computational Intelligence in Information Systems Conference (CIIS 2016), vol.532, pp. 294-305, 20 Nov. 2016.
  4. Andrei Tuchin, Masahiro Sasabe and Shoji Kasahara, “A Simple Algorithm of Centralized Flow Management for Data Centers,” The 22nd Asia-Pacific Conference on Communications, pp. 268-273, 26 Aug. 2016.
  5. Nobuhisa Komatsu, Masahiro Sasabe and Shoji Kasahara, “On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees’ Mobile Nodes,” The 13th International Conference on Mobile Web and Intelligent Information Systems, pp. 213-221, 23 Aug. 2016.
  6. Xiaochen Li, Shuangrui Zhao, YuanYu Zhang, Yulong Shen and Xiaohong Jiang, “Exact Secrecy Throughput of MANETs with Guard Zone,” 2016 International Conference on Networking and Network Applications (NaNA2016), pp. 167-172, Jul. 2016.
  7. Ji He, YuanYu Zhang, Yulong Shen and Xiaohong Jiang, “Link Selection for Secure Two-Hop Transmissions in Buffer-Aided Relay Wireless Networks,” 2016 International Conference on Networking and Network Applications (NaNA2016), pp. 64-68, Jul. 2016.
  8. Pinchang Zhang, YuanYu Zhang and Bin Yang, “Optimal Relay-Destination Pair Selection Mechanism for Secure Communications in Wireless Cooperative Relay Networks,” 2016 International Conference on Networking and Network Applications (NaNA2016), pp. 84-89, Jul. 2016.
  9. Xuening Liao, Zhenqiang Wu, YuanYu Zhang and Xiaohong Jiang, “The Delay-Security Trade-off in Two-hop Buffer-Aided Relay Wireless Network,” 2016 International Conference on Networking and Network Applications (NaNA2016), pp. 173-177, Jul. 2016.