default search action
Keita Kawano
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c20]Kazuhiko Kinoshita, Kazuki Ginnan, Keita Kawano, Hiroki Nakayama, Tsunemasa Hayashi, Takashi Watanabe:
Channel Assignment and Access System Selection in Heterogeneous Wireless Network with Unlicensed Bands. APNOMS 2020: 96-101
2010 – 2019
- 2019
- [j8]Kazuhiko Kinoshita, Kazuki Ginnan, Keita Kawano, Hiroki Nakayama, Tsunemasa Hayashi, Takashi Watanabe:
Public WLAN Virtualization for Multiple Services. IEICE Trans. Commun. 102-B(4): 832-844 (2019) - 2017
- [j7]Kazuhiko Kinoshita, Yukika Maruyama, Keita Kawano, Takashi Watanabe:
A Spectrum Sharing Method Based on Users' Behavior and Providers' Profit. IEICE Trans. Commun. 100-B(10): 1928-1938 (2017) - [c19]Kazuki Ginnan, Keita Kawano, Kazuhiko Kinoshita, Hiroki Nakayama, Tsunemasa Hayashi, Takashi Watanabe:
Backhaul virtualization for multiple services in public WLANs. APNOMS 2017: 175-180 - [c18]Kazuki Ginnan, Keita Kawano, Kazuhiko Kinoshita, Takashi Watanabe:
Access point virtualization for multiple services in heterogeneous WLANs. CCNC 2017: 704-707 - [c17]Kazuhiko Kinoshita, Shusaku Shibata, Keita Kawano, Takashi Watanabe:
A CoMP clustering method in consideration of spectrum sharing for fairness improvement. ICUMT 2017: 137-142 - 2016
- [c16]Shusaku Shibata, Kazuhiko Kinoshita, Keita Kawano, Takashi Watanabe:
A fair spectrum sharing method in consideration of CoMP. NOMS 2016: 1137-1142 - 2015
- [j6]Daisuke Okamoto, Keita Kawano, Nariyoshi Yamai, Tokumi Yokohira:
Strict Application Execution Control with Hierarchical Group Management Using Digital Certificates on Educational Windows PCs. J. Inf. Process. 23(4): 449-457 (2015) - 2014
- [j5]Keita Kawano, Daisuke Okamoto, Masanori Fujiwara, Nariyoshi Yamai:
A Flexible Execution Control Method of Application Software for Educational Windows PCs. J. Inf. Process. 22(2): 161-174 (2014) - [j4]Nariyoshi Yamai, Masayuki Matsuoka, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Masato Minda:
Domain Registration Date Retrieval System for Improving Spam Mail Discrimination. J. Inf. Process. 22(3): 480-485 (2014) - [c15]Koki Okamoto, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Tokumi Yokohira:
Performance Improvement of SCTP Communication Using Selective Bicasting on Lossy Multihoming Environment. COMPSAC 2014: 551-557 - 2013
- [c14]Gada, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura:
E-Mail Priority Delivery System with Dynamic Whitelist in the Layer 3 Switch. COMPSAC Workshops 2013: 581-586 - [c13]Masayuki Matsuoka, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Masato Minda:
Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination. COMPSAC Workshops 2013: 587-592 - [c12]Daisuke Okamoto, Masanori Fujiwara, Keita Kawano, Nariyoshi Yamai:
Target Application Grouping Function Considering Software Updates on Application Execution Control System. COMPSAC Workshops 2013: 627-632 - 2012
- [c11]Masanori Fujiwara, Keita Kawano, Nariyoshi Yamai:
An Execution Control System for Application Software Reducing Administrative Burden of Educational PCs. SAINT 2012: 375-380 - [c10]Shuji Suwa, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura, Keita Kawano, Gada:
Spam Mail Discrimination System Based on Behavior of DNS Servers Associated with URLs. SAINT 2012: 381-386 - 2011
- [j3]Kazuhiko Kinoshita, Yuichi Kanamori, Keita Kawano, Koso Murakami:
A Dynamic Spectrum Assignment Method for Call Blocking Probability Reduction in WiFi/WiMAX Integrated Networks. IEICE Trans. Commun. 94-B(12): 3498-3504 (2011) - 2010
- [c9]Kazuhiko Kinoshita, Yuichi Kanamori, Keita Kawano, Koso Murakami:
A Dynamic Spectrum Assignment Method Based on Call Blocking Probability Prediction in WiFi/WiMAX Integrated Networks. ICCCN 2010: 1-6 - [c8]Takumi Seike, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura:
A Solution for Mail Forwarding Problem of SPF by Tracing Recipient Addresses. SAINT 2010: 129-132
2000 – 2009
- 2009
- [c7]Masashi Nakagawa, Kazuhiko Kinoshita, Koso Murakami, Keita Kawano:
A spectrum assignment method based on genetic algorithm in WiMAX/WiFi integrated network. StudentWorkshop@CoNEXT 2009: 11-12 - [c6]Yuichi Kanamori, Keita Kawano, Kazuhiko Kinoshita, Koso Murakami:
An Effective Dynamic Spectrum Assignment in WiFi/WiMAX Integrated Networks. ICN 2009: 150-155 - 2008
- [j2]Keita Kawano, Kazuhiko Kinoshita, Nariyoshi Yamai:
A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks. IEICE Trans. Commun. 91-B(7): 2272-2278 (2008) - [c5]Keita Kawano, Kazuhiko Kinoshita, Nariyoshi Yamai:
A distributed mobility management scheme for large-scale Mobile Networks. LCN 2008: 500-501 - 2007
- [c4]Masanori Yoshimoto, Keita Kawano, Kazuhiko Kinoshita, Takahiro Matsuda, Koso Murakami:
Handoff Performance Enhancement for TCP-based Streaming Services in Heterogeneous Networks. LCN 2007: 703-710 - 2006
- [j1]Keita Kawano, Kazuhiko Kinoshita, Koso Murakami:
Multilevel Hierarchical Mobility Management in Densely Meshed Networks. IEICE Trans. Commun. 89-B(7): 2002-2011 (2006) - [c3]Tsuyoshi Yamada, Shoji Yoshimura, Keita Kawano, Kazuhiko Kinoshita, Koso Murakami:
A Multicast Tree Reconstruction Method for Many-to-Many Mobile Communications with Delay Constraint. LCN 2006: 525-526 - 2005
- [c2]Shoji Yoshimura, Hajime Ueno, Keita Kawano, Kazuhiko Kinoshita, Koso Murakami:
Mobile multicast routing for broadband communication services. ICCCN 2005: 598- - 2002
- [c1]Keita Kawano, Kazuhiko Kinoshita, Koso Murakami:
A multilevel hierarchical distributed IP mobility management scheme for wide area networks. ICCCN 2002: 480-484
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint