default search action
Hideharu Kojima
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Seiya Ookura, Hideharu Kojima, Naoto Yanai:
Performance Evaluation of ID-Based Aggregate Signature Scheme Based on Lattice for Wireless Multi-hop Secure Routing Protocols. ICICT 2024: 462-467 - 2022
- [c23]Keitaro Watanabe, Hideharu Kojima, Yuichi Sudo, Naoto Yanai, Tatsuhiro Tsuchiya:
Implementation and Evaluation of Leader Election in the Population Protocol Model Using an Emulation Environment. DASC/PiCom/CBDCom/CyberSciTech 2022: 1-6 - [c22]Takumi Okano, Hideharu Kojima, Naoto Yanai, Tatsuhiro Tsuchiya:
Implementing Access Control in Chaincodes on Hyperledger Fabric with Attribute-Based Encryption. ICSA Companion 2022: 193-196 - 2020
- [j7]Tatsuya Konishi, Hideharu Kojima, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
Finding Minimum Locating Arrays Using a CSP Solver. Fundam. Informaticae 174(1): 27-42 (2020) - [j6]Tatsuya Konishi, Hideharu Kojima, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
Using simulated annealing for locating array construction. Inf. Softw. Technol. 126: 106346 (2020) - [c21]Hideharu Kojima, Naoto Yanai:
A Model Checking Method for Secure Routing Protocols by SPIN with State Space Reduction. IPDPS Workshops 2020: 627-635
2010 – 2019
- 2019
- [j5]Hideharu Kojima, Naoto Yanai, Jason Paul Cruz:
ISDSR+: Improving the Security and Availability of Secure Routing Protocol. IEEE Access 7: 74849-74868 (2019) - [c20]Hideharu Kojima, Naoto Yanai:
A State Space Reduction Method for Model Checking of Wireless Multi-Hop Network Routing Protocols Focusing on Topologies. CANDAR Workshops 2019: 14-20 - [c19]Hideharu Kojima, Naoto Yanai:
A State Space Suppression Method for Formal Verification of Secure Routing Protocols With SPIN. ISSRE Workshops 2019: 124-125 - [c18]Shinnosuke Shimizu, Hideharu Kojima, Naoto Yanai, Tatsuhiro Tsuchiya:
Implementation and Evaluation of ISDSR in Emulation Environments. WCNC 2019: 1-6 - [i2]Tatsuya Konishi, Hideharu Kojima, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
Finding minimum locating arrays using a CSP solver. CoRR abs/1904.07480 (2019) - [i1]Tatsuya Konishi, Hideharu Kojima, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
Using simulated annealing for locating array construction. CoRR abs/1909.13090 (2019) - 2018
- [j4]Hideharu Kojima, Tatsuhiro Tsuchiya, Yasumasa Fujisaki:
The Aggregation Point Placement Problem for Power Distribution Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(7): 1074-1082 (2018) - [j3]Satoshi Fujimoto, Hideharu Kojima, Tatsuhiro Tsuchiya:
Controlling Occurrence Frequencies of Parameter Values in Pair-Wise Testing. Int. J. Softw. Eng. Knowl. Eng. 28(7): 983-1000 (2018) - 2017
- [j2]Hideharu Kojima, Yuta Nagashima, Tatsuhiro Tsuchiya:
State space reduction techniques for model checking of MANET protocols. Int. J. Netw. Comput. 7(1): 29-49 (2017) - [c17]Hideharu Kojima, Naoto Yanai:
Performance Evaluation for the Signature Algorithm of ISDSR on Raspberry Pi. CANDAR 2017: 230-236 - [c16]Tatsuya Konishi, Hideharu Kojima, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
Finding Minimum Locating Arrays Using a SAT Solver. ICST Workshops 2017: 276-277 - 2016
- [c15]Hideharu Kojima, Yuta Nagashima, Tatsuhiro Tsuchiya:
Model Checking Techniques for State Space Reduction in MANET Protocol Verification. IPDPS Workshops 2016: 509-516 - 2014
- [c14]Yuki Matsui, Hideharu Kojima, Tatsuhiro Tsuchiya:
Modeling the Interaction of Power Line and SCADA Networks. HASE 2014: 261-262 - [c13]Satoshi Fujimoto, Hideharu Kojima, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
Applying Parameter Value Weighting to a Practical Application. ISSRE Workshops 2014: 130-131 - [c12]Takahiro Nagamoto, Hideharu Kojima, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
Locating a Faulty Interaction in Pair-wise Testing. PRDC 2014: 155-156 - [c11]Yasuhiro Hirasaki, Hideharu Kojima, Tatsuhiro Tsuchiya:
Applying Random Testing to Constrained Interaction Testing. SEKE 2014: 193-198 - 2013
- [c10]Satoshi Fujimoto, Hideharu Kojima, Tatsuhiro Tsuchiya:
A Value Weighting Method for Pair-wise Testing. APSEC (1) 2013: 99-105 - 2012
- [c9]Yuki Matsui, Hideharu Kojima, Tatsuhiro Tsuchiya:
Maximizing Availability of Consistent Data in Unreliable Networks. ICPADS 2012: 117-123 - [c8]Koki Morii, Koji Taketa, Yuichiro Mori, Hideharu Kojima, Eitaro Kohno, Shinji Inoue, Tomoyuki Ohta, Yoshiaki Kakuda:
A New Generation Children Tracking System Using Bluetooth MANET Composed of Android Mobile Terminals. UIC/ATC 2012: 405-407 - 2011
- [c7]Yuichiro Mori, Hideharu Kojima, Eitaro Kohno, Shinji Inoue, Tomoyuki Ohta, Yoshiaki Kakuda, Atsushi Ito:
A Self-Configurable New Generation Children Tracking System Based on Mobile Ad Hoc Networks Consisting of Android Mobile Terminals. ISADS 2011: 339-342 - [c6]Hideharu Kojima, Tomoyuki Ohta, Yoshiaki Kakuda:
A Transition Reduction Method for FSM of MANET Routing Protocol with Blacklist. ISADS 2011: 611-616 - 2010
- [c5]Akihiro Yamanouchi, Takeshi Hashimoto, Tomoyuki Ohta, Hideharu Kojima, Yoshiaki Kakuda:
Resource Management Middleware Using Mobile Agents for Mobile Ad Hoc Networks. ICDCS Workshops 2010: 1-6
2000 – 2009
- 2009
- [j1]Hideharu Kojima, Juichi Takahashi, Tomoyuki Ohta, Yoshiaki Kakuda:
An Equivalent Division Method for Reducing Test Cases in State Transition Testing of MANET Protocols. IEICE Trans. Commun. 92-B(3): 794-806 (2009) - [c4]Hideharu Kojima, Yoshiaki Kakuda, Juichi Takahashi, Tomoyuki Ohta:
A model for concurrent states and its coverage criteria. ISADS 2009: 363-368 - 2008
- [c3]Juichi Takahashi, Hideharu Kojima, Zengo Furukawa:
Coverage Based Testing for Concurrent Software. ICDCS Workshops 2008: 533-538 - 2007
- [c2]Hideharu Kojima, Tomoyuki Ohta, Yoshiaki Kakuda:
State Transition Model for Test Sequence Generation of MANET Clustering Protocols. ICDCS Workshops 2007: 55 - 2001
- [c1]Hideharu Kojima, Rolf Adams:
jShio - A Customization Language Compiler-Compiler. OOIS 2001: 345-354
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint