Search Results - "Mizutani, Kimihiro"

Refine Results
  1. 1

    Effective TCP Flow Management Based on Hierarchical Feedback Learning in Complex Data Center Network by Mizutani, Kimihiro

    Published in Sensors (Basel, Switzerland) (13-01-2022)
    “…Many studies focusing on improving Transmission Control Protocol (TCP) flow control realize a more effective use of bandwidth in data center networks. They are…”
    Get full text
    Journal Article
  2. 2

    Stateless Node Failure Information Propagation Scheme for Stable Overlay Networks by Mizutani, Kimihiro

    Published in IEEE access (2021)
    “…A structured overlay technology has the advantages for fault tolerance and computation resource (i.e., node) discovery in distributed data storage and its…”
    Get full text
    Journal Article
  3. 3

    The Deep Learning Vision for Heterogeneous Network Traffic Control: Proposal, Challenges, and Future Perspective by Kato, Nei, Fadlullah, Zubair Md, Mao, Bomin, Tang, Fengxiao, Akashi, Osamu, Inoue, Takeru, Mizutani, Kimihiro

    Published in IEEE wireless communications (01-06-2017)
    “…Recently, deep learning, an emerging machine learning technique, is garnering a lot of research attention in several computer science areas. However, to the…”
    Get full text
    Journal Article
  4. 4

    Routing or Computing? The Paradigm Shift Towards Intelligent Computer Network Packet Transmission Based on Deep Learning by Bomin Mao, Fadlullah, Zubair Md, Fengxiao Tang, Kato, Nei, Akashi, Osamu, Inoue, Takeru, Mizutani, Kimihiro

    Published in IEEE transactions on computers (01-11-2017)
    “…Recent years, Software Defined Routers (SDRs) (programmable routers) have emerged as a viable solution to provide a cost-effective packet processing platform…”
    Get full text
    Journal Article
  5. 5

    On Removing Routing Protocol from Future Wireless Networks: A Real-time Deep Learning Approach for Intelligent Traffic Control by Fengxiao Tang, Bomin Mao, Fadlullah, Zubair Md, Kato, Nei, Akashi, Osamu, Inoue, Takeru, Mizutani, Kimihiro

    Published in IEEE wireless communications (01-02-2018)
    “…Recently, deep learning has appeared as a breakthrough machine learning technique for various areas in computer science as well as other disciplines. However,…”
    Get full text
    Journal Article
  6. 6

    A Comprehensive Evaluation of Generating a Mobile Traffic Data Scheme without a Coarse-Grained Process Using CSR-GAN by Tokunaga, Tomoki, Mizutani, Kimihiro

    Published in Sensors (Basel, Switzerland) (01-03-2022)
    “…Large-scale mobile traffic data analysis is important for efficiently planning mobile base station deployment plans and public transportation plans. However,…”
    Get full text
    Journal Article
  7. 7

    Efficient Virtual Network Optimization Across Multiple Domains Without Revealing Private Information by Mano, Toru, Inoue, Takeru, Ikarashi, Dai, Hamada, Koki, Mizutani, Kimihiro, Akashi, Osamu

    “…Building optimal virtual networks across multiple domains is an essential technology for offering flexible network services. However, existing research is…”
    Get full text
    Journal Article
  8. 8

    Fast packet classification algorithm for network-wide forwarding behaviors by Inoue, Takeru, Mano, Toru, Mizutani, Kimihiro, Minato, Shin-ichi, Akashi, Osamu

    Published in Computer communications (01-01-2018)
    “…Packet classification has been a key technology to quickly identify an action to be taken on a packet at a switch. Several advanced applications, most of which…”
    Get full text
    Journal Article
  9. 9

    Rethinking Packet Classification for Global Network View of Software-Defined Networking by Inoue, Takeru, Mano, Toru, Mizutani, Kimihiro, Minato, Shin-Ichi, Akashi, Osamu

    “…In software-defined networking, applications are allowed to access a global view of the network so as to provide sophisticated functionalities, such as…”
    Get full text
    Conference Proceeding
  10. 10

    An Overlay-Based Data Mining Architecture Tolerant to Physical Network Disruptions by Suto, Katsuya, Nishiyama, Hiroki, Kato, Nei, Mizutani, Kimihiro, Akashi, Osamu, Takahara, Atsushi

    “…Management scheme for highly scalable big data mining has not been well studied in spite of the fact that big data mining provides many valuable and important…”
    Get full text
    Journal Article
  11. 11

    Towards a Low-Delay Edge Cloud Computing through a Combined Communication and Computation Approach by Rodrigues, Tiago Gama, Suto, Katsuya, Nishiyama, Hiroki, Kato, Nei, Mizutani, Kimihiro, Inoue, Takeru, Akashi, Osamu

    “…There are many applications which cannot be executed by mobile devices due to their limitations in memory, processing, battery, among others. One solution to…”
    Get full text
    Conference Proceeding
  12. 12

    An Effective Fuel Cost‐Less Bus Driver Allocation Scheme by Using Genetic Algorithm by Miura, Riku, Mizutani, Kimihiro

    “…In this paper, we propose a cost‐effective driver allocation scheme based on the Genetic Algorithm (GA) aimed at improving fuel efficiency for bus companies…”
    Get full text
    Journal Article
  13. 13

    A Proposal of a Novel Automatic Checkout System Reducing Additional Item Information Relearning Cost by Hanamitsu, Daisuke, Mizutani, Kimihiro

    “…Recently, a retail industry has trended to adopt automatic checkout systems for enhancing customer sales. Typically, an automatic checkout system employs an…”
    Get full text
    Journal Article
  14. 14

    State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow's Intelligent Network Traffic Control Systems by Fadlullah, Zubair Md, Fengxiao Tang, Bomin Mao, Kato, Nei, Akashi, Osamu, Inoue, Takeru, Mizutani, Kimihiro

    Published in IEEE Communications surveys and tutorials (01-01-2017)
    “…Currently, the network traffic control systems are mainly composed of the Internet core and wired/wireless heterogeneous backbone networks. Recently, these…”
    Get full text
    Journal Article
  15. 15

    A Novel Non-Supervised Deep-Learning-Based Network Traffic Control Method for Software Defined Wireless Networks by Mao, Bomin, Tang, Fengxiao, Fadlullah, Zubair Md, Kato, Nei, Akashi, Osamu, Inoue, Takeru, Mizutani, Kimihiro

    Published in IEEE wireless communications (01-08-2018)
    “…SDN has been regarded as the next-generation network paradigm as it decouples complex network management from packet forwarding, which significantly simplifies…”
    Get full text
    Journal Article
  16. 16

    Towards Extracting Semantics of Network Config Blocks by Otomo, Kazuki, Kobayashi, Satoru, Fukuda, Kensuke, Akashi, Osamu, Mizutani, Kimihiro, Esaki, Hiroshi

    “…Configuring network devices is a main task of network operators. However, understanding and consistently updating network configuration files (config) is not…”
    Get full text
    Conference Proceeding
  17. 17

    Redesigning the Nonblocking Clos Network to Increase its Capacity by Mano, Toru, Inoue, Takeru, Mizutani, Kimihiro, Akashi, Osamu

    “…The Clos network has been studied for decades as a class of nonblocking switching networks. However, the structure is based on assumptions made at the time of…”
    Get full text
    Journal Article
  18. 18

    An Efficient Approach for Training Time Minimization in Distributed Split Neural Network by Yamamoto, Eigo, Mizutani, Kimihiro

    “…In this paper, we present a novel approach for minimizing training time in distributed split neural network. This approach allocates parts of the neural…”
    Get full text
    Conference Proceeding
  19. 19

    Reducing dense virtual networks for fast embedding by Mano, Toru, Inoue, Takeru, Mizutani, Kimihiro, Akashi, Osamu

    “…Virtual network embedding has been intensively studied for a decade. The time complexity of most conventional methods has been reduced to the cube of the…”
    Get full text
    Conference Proceeding
  20. 20

    A Geometric Windowing Algorithm in Network Data-Plane Verification by Chen, Richard, Mano, Toru, Inoue, Takeru, Mizutani, Kimihiro, Nagata, Hisashi, Akashi, Osamu

    “…Network verification is attracting attention as a key technology to detect configuration errors before deploying the network. In verification, a set of packets…”
    Get full text
    Conference Proceeding Journal Article