default search action
Ken-ichi Baba
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c38]Sota Narikiyo, Sumiko Miyata, Ken-ichi Baba, Katsunori Yamaoka:
Characteristic Analysis of Upper Bound Call Blocking Probability of Emergency CAC for Three Types of Calls. CCWC 2024: 637-639 - [c37]Shota Okochi, Ken-ichi Baba:
Path Establishment Method with Reallocation in Elastic Optical Networks Using Superposition Coding. HPSR 2024: 93-98 - [i1]Sota Narikiyo, Sumiko Miyata, Ken-ichi Baba, Katsunori Yamaoka:
Theoretical Analysis of the Three-Dimensional CAC Considering Connection and Communication Quality. CoRR abs/2404.04894 (2024) - 2023
- [c36]Yoichiro Arii, Katsunori Yamaoka, Ken-ichi Baba:
A Two-stage Trunk Reservation Control Method corresponding to General Call Priority using Switch Outside Disaster Area. ICNC 2023: 621-625 - 2022
- [j8]Motoi Kato, Ken-ichi Baba:
A Multi-Path Routing Method with Traffic Grooming Corresponding to Path Lengths in Elastic Optical Networks. IEICE Trans. Commun. 105-B(9): 1033-1038 (2022)
2010 – 2019
- 2019
- [c35]Kenta Kawai, Kazuki Tanabe, Katsunori Yamaoka, Ken-ichi Baba:
Emergency Trunk Reservation Control Using Waiting Queue for Accommodating More General Calls. ICNC 2019: 287-291 - [c34]Tatsuya Kawase, Sumiko Miyata, Ken-ichi Baba, Katsunori Yamaoka:
A call admission control maximizing the number of general calls from non-disaster area considering the priority calls. PACRIM 2019: 1-6 - 2018
- [j7]Kazunori Ueda, Makoto Iwata, Ken-ichi Baba, Shinji Shimojo:
Multi-overlay information management for IoT-oriented P2P network applications. Int. J. Space Based Situated Comput. 8(4): 204-213 (2018) - [j6]Sumiko Miyata, Ken-ichi Baba, Katsunori Yamaoka:
Exact Mean Packet Delay for Delayed Report Messages Multipoint Control Protocol in EPON. JOCN 10(3): 209-219 (2018) - [c33]Ryota Murakami, Kazuki Tanabe, Ken-ichi Baba, Katsunori Yamaoka:
VoIP Admission Control to Increase QoS-Guaranteed Sessions by Considering State Probability. PIMRC 2018: 284-289 - [c32]Kenki Seki, Ken-ichi Baba:
Path Establishment Method considering Crosstalk in SDM Elastic Optical Networks. PSC 2018: 1-3 - 2017
- [c31]Naoki Akutsu, Ken-ichi Baba:
Resource Allocation Methods Considering Residual Link Bandwidth for Service Function Chaining Design. COMPSAC (2) 2017: 25-30 - 2016
- [j5]Kazuki Tanabe, Sumiko Miyata, Ken-ichi Baba, Katsunori Yamaoka:
Threshold Relaxation and Holding Time Limitation Method for Accepting More General Calls under Emergency Trunk Reservation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(8): 1518-1528 (2016) - [c30]Yuya Hiraiwa, Ken-ichi Baba:
A spectrum allocation method based on distributed control plane in elastic optical networks. HPSR 2016: 116-117 - 2015
- [c29]Sumiko Miyata, Ken-ichi Baba, Katsunori Yamaoka, Hirotsugu Kinoshita:
Exact Mean Packet Delay Analysis for Long-Reach Passive Optical Networks. GLOBECOM 2015: 1-6 - [c28]Sumiko Miyata, Ken-ichi Baba, Katsunori Yamaoka, Hirotsugu Kinoshita:
DR-MPCP: Delayed REPORT message for multipoint control protocol in EPON. RNDM@WMNC 2015: 237-242 - [c27]Tatsuya Fukuda, Lei Liu, Ken-ichi Baba, Shinji Shimojo, S. J. Ben Yoo:
Fragmentation-aware spectrum assignment for elastic optical networks with fully-distributed GMPLS. OFC 2015: 1-3 - [c26]Yukihiro Kunishige, Ken-ichi Baba, Shinji Shimojo:
Optical network configuration methods considering end-to-end latency in data centers. PACRIM 2015: 210-215 - 2014
- [c25]Tatsuya Fukuda, Lei Liu, Ken-ichi Baba, Shinji Shimojo, S. J. Ben Yoo:
Fully-distributed control plane for elastic optical network with GMPLS with RMSA. ECOC 2014: 1-3 - 2013
- [j4]Tatsuya Fukuda, Ken-ichi Baba:
Network Designs for Cycle-Attack-Free Logical-Tree Topologies in Optical CDM Networks. IEICE Trans. Commun. 96-B(12): 3070-3079 (2013) - [c24]Alexandre Ancel, Ingo Assenmacher, Ken-ichi Baba, Julien Cisonni, Yo Fujiso, Paulo Gonçalves, Matthieu Imbert, Koji Koyamada, P. Neyron, Kazunori Nozaki, Hiroyuki Ohsaki, Anne-Cécile Orgerie, Xavier Pelorson, Bruno Raffin, Naohisa Sakamoto, Eisaku Sakane, Shinji Shimojo, Annemie Van Hirtum, Shigeo Wada:
PetaFlow - An Example of Communication and Computational Technologies with Social Impact. COMPSAC Workshops 2013: 703-708 - [c23]Yukai Yang, Hirotake Abe, Ken-ichi Baba, Shinji Shimojo:
A Scalable Approach to Avoid Incast Problem from Application Layer. COMPSAC Workshops 2013: 713-718 - 2012
- [c22]Tatsuya Fukuda, Ken-ichi Baba, Shinji Shimojo:
A study on hybrid optical network architecture with OCDM technology. ICC 2012: 3144-3148 - 2011
- [c21]Jin Hirose, Ken-ichi Baba, Hirotake Abe:
A Protocol-Aware Network Control Method for Large-Scale Data Transfer in Long-Distance Broadband Networks. ICCCN 2011: 1-6 - [c20]Hiroyuki Ohsaki, Kazunori Nozaki, Ken-ichi Baba, Eisaku Sakane, Naohisa Sakamoto, Koji Koyamada, Shinji Shimojo:
Peta-Flow Computing: Vision and Challenges. SAINT 2011: 256-259 - [c19]Tatsuya Fukuda, Ken-ichi Baba:
Establishing paths on hierarchical logical topologies in OCDM networks. WOCN 2011: 1-5 - 2010
- [c18]Paulo Gonçalves, Xavier Grandchamp, Xavier Pelorson, Bruno Raffin, Annemie Van Hirtum, Pascale Vicat-Blanc, Ken-ichi Baba, Julien Cisonni, Yasuo Ebara, Kazunori Nozaki, Hiroyuki Ohsaki, Shigeo Wada, Takuma Kawamura, Koji Koyamada, Eisaku Sakane, Naohisa Sakamoto, Shinji Shimojo:
Petaflow - A Project Towards Information and Communication Technologies in Society. SAINT 2010: 347-350 - [c17]Takashi Suda, Manabu Higashida, Ken-ichi Baba, Kazunori Nozaki:
The Complementary Registration Method for Vocal Tract of Sibilant /s/. SAINT 2010: 355-358
2000 – 2009
- 2009
- [c16]Kazunori Ueda, Ken-ichi Baba:
Proposal of an Initial Route Establishment Method in Wireless Mesh Networks. SAINT 2009: 173-176 - 2008
- [c15]Masaaki Noro, Fumiaki Tameshige, Ken-ichi Baba, Shinji Shimojo:
Performance Evaluation of Advanced High-Speed Data Transfer Methods in Long-Distance Broadband Networks. AINA Workshops 2008: 533-540 - [c14]Naoto Ikeda, Masaaki Noro, Ken-ichi Baba, Shinji Shimojo:
A Dynamic Window Control Method of Grid Middleware for Volume Data Transfer to Make the Best Use of Reservation Bandwidth. SAINT 2008: 265-268 - [c13]Eisaku Sakane, Manabu Higashida, Shingo Okamura, Toyokazu Akiyama, Ken-ichi Baba, Shinji Shimojo, Yuuichi Teranishi:
An Authentication System Development in Application of Grid Middleware to a Nationwide Joint-Use Environment for Computing. SAINT 2008: 277-280 - 2007
- [c12]Keigo Goda, Mai Imoto, Ken-ichi Baba, Noriyuki Fujimoto, Masayuki Murata:
Design and implementation of openMP library for lambda computing environment. BROADNETS 2007: 722-731 - [c11]Hiroki Date, Kenta Yasukawa, Ken-ichi Baba, Katsunori Yamaoka:
Edge-Based TACCS: A More Scalable TACCS Based on Cooperation of High Functional Edge Nodes. CCNC 2007: 890-895 - [c10]Hiroki Date, Kenta Yasukawa, Ken-ichi Baba, Katsunori Yamaoka:
Theoretical Analysis of Difference Between Edge-Based and Core-Node-Supported TACCS. GLOBECOM 2007: 2162-2166 - [c9]Shaowei Huang, Ken-ichi Kitayama, Ken-ichi Baba, Masayuki Murata:
Impact of MAI Noise Cycle Attack on OCDM-Based Optical Networks and its Diagnostic/Mitigation Algorithm. GLOBECOM 2007: 2412-2416 - [c8]Toyokazu Akiyama, Yuuichi Teranishi, Shingo Okamura, Eisaku Sakane, Go Hasegawa, Ken-ichi Baba, Hirotaka Nakano, Shinji Shimojo:
A Report of Campus-Wide IT Authentication Platform System Development in Osaka University. SAINT Workshops 2007: 35 - 2006
- [j3]Kenta Yasukawa, Ken-ichi Baba, Katsunori Yamaoka:
Tentative Accommodating and Congestion Confirming Strategy - A Novel Admission Control Strategy for Packet Switching Networks - . IEICE Trans. Commun. 89-B(2): 373-382 (2006) - [c7]Shaowei Huang, Ken-ichi Baba, Masayuki Murata, Ken-ichi Kitayama:
Evaluation of OCDM-Switching and Code Conversion for All-Optical End-to-End Path Provisioning in Multi-granularity Networks. BROADNETS 2006 - [c6]Kazunori Nozaki, Masaaki Noro, Masashi Nakagawa, Susumu Date, Ken-ichi Baba, Steven Peltier, Toshihiro Kawaguchi, Toyokazu Akiyama, Hiroo Tamagawa, Yohsuke Tanaka, Shinji Shimojo:
Analytics challenge - Computational oral and speech science on e-science infrastructures. SC 2006: 298 - 2005
- [c5]Kenta Yasukawa, Ken-ichi Baba, Katsunori Yamaoka:
Analysis of tentative accommodating and congestion confirming strategy: a novel admission control strategy for packet switching networks. GLOBECOM 2005: 6 - [c4]Kenta Yasukawa, Ken-ichi Baba, Katsunori Yamaoka:
Concept of Admission Control in Packet Switching Networks Based on Tentative Accommodation of Incoming Flows. IWQoS 2005: 349-352 - 2004
- [j2]Shoichi Motohisa, Hiroyuki Fukuoka, Ken-ichi Baba, Shinji Shimojo:
An Effective Re-marking Scheme for Diffserv AF Service through Multiple Domains. IEICE Trans. Inf. Syst. 87-D(12): 2569-2577 (2004) - [c3]Hirohisa Nakamoto, Ken-ichi Baba, Masayuki Murata:
Shared Memory Access Method for a lambda Computing Environment. OpNeTec 2004: 210-217 - [c2]Masaaki Noro, Takahiro Kikuchi, Ken-ichi Baba, Hideki Sunahara, Shinji Shimojo:
QoS Support for VoIP Traffic to Prepare Emergency. SAINT Workshops 2004: 229-235 - 2002
- [j1]Ken-ichi Baba, Takashi Yamaguchi, Kazuhiro Gokyuu, Masayuki Murata:
A path accommodation method for reliable ring networks with optical compression TDM. Int. J. Commun. Syst. 15(2-3): 221-237 (2002)
1990 – 1999
- 1995
- [c1]Naoki Wakamiya, Ken-ichi Baba, Masayuki Murata, Hideo Miyahara:
Performance Analysis of Traffic Control Methods in Multimedia ATM LAN. INFOCOM 1995: 1027-1036
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-06 00:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint