Search Results - "Takizawa, Makoto"

Refine Results
  1. 1

    The hidden charm pentaquarks are the hidden color-octet uud baryons? by Takeuchi, Sachiko, Takizawa, Makoto

    Published in Physics letters. B (10-01-2017)
    “…The I(JP)=12(12−), 12(32−), and 12(52−)uudcc‾ pentaquarks are investigated by the quark cluster model. This model, which reproduces the mass spectra of the…”
    Get full text
    Journal Article
  2. 2

    Implementation and evaluation of the information flow control for the Internet of Things by Nakamura, Shigenari, Enokido, Tomoya, Takizawa, Makoto

    Published in Concurrency and computation (10-10-2021)
    “…In the Internet of Things, the CBAC (capability‐based access control) model is proposed to make devices securely accessed. Here, an owner of a device issues a…”
    Get full text
    Journal Article
  3. 3

    Time‐based legality of information flow in the capability‐based access control model for the Internet of Things by Nakamura, Shigenari, Enokido, Tomoya, Takizawa, Makoto

    Published in Concurrency and computation (10-12-2021)
    “…Summary The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the…”
    Get full text
    Journal Article
  4. 4
  5. 5

    X(3872) Revisited: The Roles of OPEP and the Quark Degrees of Freedom by Takeuchi, Sachiko, Yamaguchi, Yasuhiro, Hosaka, Atsushi, Takizawa, Makoto

    Published in Few-body systems (01-12-2021)
    “…The X (3872) is investigated by employing the quark-hadron hybrid model, that consists of the c c ¯ core, D ( ∗ ) D ¯ ∗ , J / ψ ω , and J / ψ ρ two-meson…”
    Get full text
    Journal Article
  6. 6

    Information Flow Control Based on Capability Token Validity for Secure IoT: Implementation and Evaluation by Nakamura, Shigenari, Enokido, Tomoya, Takizawa, Makoto

    Published in Internet of things (Amsterdam. Online) (01-09-2021)
    “…In the CBAC (Capability-Based Access Control) model proposed for realizing the secure IoT (Internet of Things), authorizers issue subjects capability tokens,…”
    Get full text
    Journal Article
  7. 7

    Purpose-Based Information Flow Control for Cyber Engineering by Enokido, T, Takizawa, M

    “…Cyber engineering is getting more significant in not only manufacturing but also business applications. Information management technologies play a key role in…”
    Get full text
    Journal Article
  8. 8

    The Redundant Energy Consumption Laxity Based Algorithm to Perform Computation Processes for IoT Services by Enokido, Tomoya, Takizawa, Makoto

    Published in Internet of things (Amsterdam. Online) (01-03-2020)
    “…There are various kinds of Internet of Things (IoT) services like home management services. In the IoT services, a large volume of data is gathered from…”
    Get full text
    Journal Article
  9. 9
  10. 10

    Read-abortion (RA) based synchronization protocols to prevent illegal information flow by Nakamura, Shigenari, Duolikun, Dilawaer, Takizawa, Makoto

    Published in Journal of computer and system sciences (01-12-2015)
    “…In information systems, data in an object may illegally flow into another object through manipulations of the objects. First, we define a legal information…”
    Get full text
    Journal Article
  11. 11

    Simple estimation and energy‐aware migration models of virtual machines in a server cluster by Watanabe, Ryo, Duolikun, Dilawaer, Takizawa, Makoto

    Published in Concurrency and computation (10-11-2018)
    “…Summary In order to realize green society, it is critical to reduce electric energy consumed by servers in clusters. In our previous studies, these types of…”
    Get full text
    Journal Article
  12. 12

    Capability token selection algorithms to implement lightweight protocols by Nakamura, Shigenari, Enokido, Tomoya, Takizawa, Makoto

    Published in Internet of things (Amsterdam. Online) (01-08-2022)
    “…The IoT (Internet of Things) is now one of the most significant infrastructure and has to be secure against malicious accesses. Especially, it is critical to…”
    Get full text
    Journal Article
  13. 13

    Energy-Efficient Delay Time-Based Process Allocation Algorithm for Heterogeneous Server Clusters by Enokido, Tomoya, Takizawa, Makoto

    “…Various types of scalable and high performance computing systems are developed to realize distributed applications. In order to realize not only scalable but…”
    Get full text
    Conference Proceeding Journal Article
  14. 14

    Energy-efficient dynamic clusters of servers by Duolikun, Dilawaer, Enokido, Tomoya, Aikebaier, Ailixier, Takizawa, Makoto

    Published in The Journal of supercomputing (01-05-2015)
    “…Electric power consumed by servers has to be reduced in order to realize green societies. We consider computation (CP) and storage (ST) types of application…”
    Get full text
    Journal Article
  15. 15

    Visual CAPTCHA application in linguistic cryptography by Ogiela, Urszula, Takizawa, Makoto, Ogiela, Lidia

    Published in Concurrency and computation (25-01-2018)
    “…Summary This paper presents an idea of linguistic cryptography and linguistic techniques for data analysis. The main aspects are using parts of divided…”
    Get full text
    Journal Article
  16. 16

    Energy consumption laxity-based quorum selection for distributed object-based systems by Enokido, Tomoya, Duolikun, Dilawaer, Takizawa, Makoto

    Published in Evolutionary intelligence (01-03-2020)
    “…In object based systems, an object is an unit of computation resource. Distributed applications are composed of multiple objects. Objects in an application are…”
    Get full text
    Journal Article
  17. 17

    Evaluation of struggle strategy in Genetic Algorithms for ground stations scheduling problem by Xhafa, Fatos, Herrero, Xavier, Barolli, Admir, Barolli, Leonard, Takizawa, Makoto

    Published in Journal of computer and system sciences (01-11-2013)
    “…Ground station scheduling problem arises in spacecraft operations and aims to allocate ground stations to spacecraft to make possible the communication between…”
    Get full text
    Journal Article Publication
  18. 18

    Power consumption and processing models of servers in computation and storage based applications by Inoue, Takuro, Aikebaier, Ailixier, Enokido, Tomoya, Takizawa, Makoto

    Published in Mathematical and computer modelling (01-09-2013)
    “…The electric power consumption of information systems has to be reduced in addition to increasing the performance and fault tolerance in order to realize green…”
    Get full text
    Journal Article
  19. 19

    Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments by Waluyo, Agustinus Borgy, Taniar, David, Rahayu, Wenny, Aikebaier, Ailixier, Takizawa, Makoto, Srinivasan, Bala

    Published in Journal of computer and system sciences (01-11-2012)
    “…In a decentralised system like P2P where each individual peers are considerably autonomous, the notion of mutual trust between peers is critical. In addition,…”
    Get full text
    Journal Article
  20. 20

    Application of fuzzy logic for IoT node elimination and selection in opportunistic networks: performance evaluation of two fuzzy-based systems by Cuka, Miralda, Elmazi, Donald, Ikeda, Makoto, Matsuo, Keita, Barolli, Leonard, Takizawa, Makoto

    Published in World wide web (Bussum) (01-05-2021)
    “…Opportunistic Networks (OppNets) are a sub-class of DTN, designed as a specialized ad hoc network suitable for applications such as emergency responses. Unlike…”
    Get full text
    Journal Article