default search action
Satoshi Fukumoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c38]Yuki Yamanaka, Masayuki Arai, Yoshikazu Nagamura, Satoshi Fukumoto:
Toward Improvement and Evaluation of Reconstruction Capability of CapsNet-Based Wafer Map Defect Pattern Classifier. ITC-Asia 2023: 1-6 - 2021
- [c37]Itsuki Fujita, Yoshikazu Nagamura, Masayuki Arai, Satoshi Fukumoto:
Note on CapsNet-Based Wafer Map Defect Pattern Classification. ATS 2021: 37-42 - 2020
- [j15]Ryohei Sato, Satoshi Fukumoto:
Response-Time Analysis for Controller Area Networks With Randomly Occurring Messages. IEEE Trans. Veh. Technol. 69(4): 3893-3902 (2020)
2010 – 2019
- 2018
- [j14]Yudai Komori, Kazuya Sakai, Satoshi Fukumoto:
Fast and secure tag authentication in large-scale RFID systems using skip graphs. Comput. Commun. 116: 77-89 (2018) - [c36]Ryota Mizuhara, Kazuya Sakai, Satoshi Fukumoto:
A Collaborative-Task Assignment Algorithm for Mobile Crowdsourcing in Opportunistic Networks. ICC 2018: 1-6 - [c35]Yuki Takeuchi, Kazuya Sakai, Satoshi Fukumoto:
Detecting Ransomware using Support Vector Machines. ICPP Workshops 2018: 1:1-1:6 - [c34]Shohei Karaguchi, Kazuya Sakai, Satoshi Fukumoto:
Quality-Aware Task Assignment in Opportunistic Network-Based Crowdsourcing. IPCCC 2018: 1-7 - 2017
- [j13]Aromhack Saysanasongkham, Satoshi Fukumoto, Masayuki Arai:
Fault masking issue on a dependable processor using BIST under highly electromagnetic environment. Int. J. Comput. Sci. Eng. 14(4): 309-320 (2017) - [c33]Yudai Komori, Kazuya Sakai, Satoshi Fukumoto:
RFID Tag Grouping Protocols Made Private. DSN Workshops 2017: 105-106 - [c32]Mamoru Ohara, Satoshi Fukumoto:
Off-Path Caching for File Versioning in Named Data Networking. DSN Workshops 2017: 107-108 - [c31]Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto:
Contact avoidance routing in delay tolerant networks. INFOCOM 2017: 1-9 - [c30]Muneyuki Nakamura, Koji Konomi, Mamoru Ohara, Kazuya Sakai, Satoshi Fukumoto:
Electromagnetic Noise Tolerant Hybrid Communication Protocol for CANs. PRDC 2017: 284-291 - 2016
- [j12]Aromhack Saysanasongkham, Satoshi Fukumoto:
The Reliability Analysis of the 1-out-of-2 System in Which Two Modules Do Mutual Cooperation in Recovery Mode. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(9): 1730-1734 (2016) - [c29]Mamoru Ohara, Satoshi Fukumoto:
An Experimental Implementation of Software Rejuvenation in Time Warp Simulation. ISSRE Workshops 2016: 104-110 - [c28]Takahisa Anada, Mayu Tadaki, Yukari Shiwaku, Takashi Nakamura, Masanori Nakamura, Masaru Kojima, Tatsuo Arai, Satoshi Fukumoto, Osamu Suzuki:
The effect of three-dimensional culture on the ameloblastic differentiation of dental epithelial cells. MHS 2016: 1-2 - [c27]Yudai Komori, Kazuya Sakai, Satoshi Fukumoto:
Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems. WASA 2016: 1-12 - 2015
- [c26]Kazuya Sakai, Min-Te Sun, Satoshi Fukumoto:
Energy-Aware Priority for Tree-Based CDS Protocols. ICPP Workshops 2015: 1-7 - [c25]Satoshi Fukumoto, Masayuki Arai, Kazuya Sakai:
Side Effect Mitigation Algorithm for Cache Maintenance in Opportunistic Networks. ICPP Workshops 2015: 8-13 - [c24]Satoshi Fukumoto, Mamoru Ohara:
Software Rejuvenation Schemes for Time Warp-Based PDES. PRDC 2015: 313-314 - [c23]Aromhack Saysanasongkham, Satoshi Fukumoto:
A Dual-FPGA Architecture with Rejuvenation for Realtime Applications. PRDC 2015: 315-316 - [c22]Mamoru Ohara, Satoshi Fukumoto:
A Client-Based Replication Protocol for Multiversion Cloud File Storage. SRDS Workshop 2015: 1-6 - 2014
- [c21]Muneyuki Nakamura, Mamoru Ohara, Aromhack Saysanasongkham, Masayuki Arai, Kazuya Sakai, Satoshi Fukumoto:
Hybrid ARQ for DC-DC Converter Noise in Controller Area Networks. ICPP Workshops 2014: 375-379 - [c20]Satoshi Fukumoto, Tomoki Endo, Mamoru Ohara, Masayuki Arai:
Study on Routing Protocol for Structured P2P Network Taking Account of the Nodes Which Behave Like a Byzantine Fault. PRDC 2014: 31-32 - 2013
- [j11]Ryo Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Checkpoint Time Arrangement Rotation in Hybrid State Saving with a Limited Number of Periodical Checkpoints. IEICE Trans. Inf. Syst. 96-D(1): 141-145 (2013) - [c19]Aromhack Saysanasongkham, Kenta Imai, Masayuki Arai, Satoshi Fukumoto, Keiji Wada:
An adaptive approach to dependable circuits for a digital power control. DSN 2013: 1-2 - [c18]Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto:
A Note on Influence of DC-DC Converter Noise in CAN Networks. PRDC 2013: 134-135 - 2012
- [c17]Aromhack Saysanasongkham, Masahiko Negishi, Masayuki Arai, Satoshi Fukumoto:
A Dependable Processor by Using Built-in Self Test to Tolerate Periodical Transient Faults under Highly Electromagnetic Environment. PRDC 2012: 127-134 - 2010
- [c16]Takahiko Ikeda, Mamoru Ohara, Satoshi Fukumoto, Masayuki Arai, Kazuhiko Iwasaki:
A Distributed Data Replication Protocol for File Versioning with Optimal Node Assignments. PRDC 2010: 117-124
2000 – 2009
- 2008
- [j10]Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Study on Expansion of Convolutional Compactors over Galois Field. IEICE Trans. Inf. Syst. 91-D(3): 706-712 (2008) - [j9]Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Study on Test Data Reduction Combining Illinois Scan and Bit Flipping. IEICE Trans. Inf. Syst. 91-D(3): 720-725 (2008) - [j8]Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki, Tatsuru Matsuo, Takahisa Hiraide, Hideaki Konishi, Michiaki Emori, Takashi Aikyo:
Test Data Compression for Scan-Based BIST Aiming at 100x Compression Rate. IEICE Trans. Inf. Syst. 91-D(3): 726-735 (2008) - [j7]Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Analysis of Probabilistic Trapezoid Protocol for Data Replication. Inf. Media Technol. 3(3): 498-511 (2008) - [j6]Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Analysis of Probabilistic Trapezoid Protocol for Data Replication. J. Inf. Process. 16: 50-63 (2008) - [c15]Hideo Kohinata, Masayuki Arai, Satoshi Fukumoto:
An Experimental Study on Latch Up Failure of CMOS LSI. SSIRI 2008: 215-216 - 2006
- [j5]Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Extension of coefficients for (n, k, m) convolutional-code-based packet loss recovery. Comput. Math. Appl. 51(2): 247-256 (2006) - [j4]Mamoru Ohara, Ryo Suzuki, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Analytical Model on Hybrid State Saving with a Limited Number of Checkpoints and Bound Rollbacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(9): 2386-2395 (2006) - [c14]Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Expansion of Convolutional Compactors over Galois Field. ATS 2006: 401-408 - [c13]Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki, Tatsuru Matsuo, Takahisa Hiraide, Hideaki Konishi, Michiaki Emori, Takashi Aikyo:
Test Data Compression of 100x for Scan-Based BIST. ITC 2006: 1-10 - 2005
- [j3]Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Reliability Analysis of a Convolutional-Code-Based Packet Level FEC under Limited Buffer Size. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(4): 1047-1054 (2005) - [c12]Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Analysis of Probabilistic Trapezoid Protocol for Data Replication. DSN 2005: 782-791 - [c11]Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Analysis of error-masking and X-masking probabilities for convolutional compactors. ITC 2005: 10 - 2004
- [j2]Kenichi Ichino, Ko-ichi Watanabe, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Application of Partially Rotational Scan Technique with Tester IP for Processor Circuits. IEICE Trans. Inf. Syst. 87-D(3): 586-591 (2004) - [c10]Masayuki Arai, Harunobu Kurokawa, Kenichi Ichino, Satoshi Fukumoto, Kazuhiko Iwasaki:
Seed Selection Procedure for LFSR-Based BIST with Multiple Scan Chains and Phase Shifters. Asian Test Symposium 2004: 190-195 - [c9]Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Finding a Recovery Line in Uncoordinated Checkpointing. ICDCS Workshops 2004: 628-633 - [c8]Masayuki Arai, Tabito Suzuki, Mamoru Ohara, Satoshi Fukumoto, Kazuhiko Iwasaki, Hee Yong Youn:
Analysis of Read and Write Availability for Generalized Hybrid Data Replication Protocol. PRDC 2004: 143-150 - 2003
- [j1]Kenichi Ichino, Ko-ichi Watanabe, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Seed Selection Procedure for LFSR-Based Random Pattern Generators. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(12): 3063-3071 (2003) - [c7]Kenichi Ichino, Ko-ichi Watanabe, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
A seed selection procedure for LFSR-based random pattern generators. ASP-DAC 2003: 869-874 - [c6]Yuki Yamagata, Kenichi Ichino, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki, Masayuki Satoh, Hiroyuki Itabashi, Takashi Murai, Nobuyuki Otsuka:
Implementation of Memory Tester Consisting of SRAM-Based Reconfigurable Cells. Asian Test Symposium 2003: 28-31 - 2002
- [c5]Masayuki Arai, Hitoshi Kurosu, Mamoru Ohara, Ryo Suzuki, Satoshi Fukumoto, Kazuhiko Iwasaki:
Experiment for High-Assurance Video Conference System over the Internet. HASE 2002: 137-142 - [c4]Ryo Suzuki, Satoshi Fukumoto, Kazuhiko Iwasaki:
Adaptive Checkpointing for Time Warp Technique with a Limited Number of Checkpoints. ICDCS Workshops 2002: 95-100 - [c3]Masayuki Arai, Hitoshi Kurosu, Satoshi Fukumoto, Kazuhiko Iwasaki:
Evaluation of Convolutional-Code-Based FEC under Limited Recovery Time and Its Application to Real-time Transmission. PRDC 2002: 239-246 - 2001
- [c2]Kenichi Ichino, Takeshi Asakawa, Satoshi Fukumoto, Kazuhiko Iwasaki, Seiji Kajihara:
Hybrid BIST Using Partially Rotational Scan. Asian Test Symposium 2001: 379-384 - [c1]Masayuki Arai, Anna Yamamoto, Anna Yamaguchi, Satoshi Fukumoto, Kazuhiko Iwasaki:
Analysis of Using Convolutional Codes to Recover Packet Losses over Burst Erasure Channels. PRDC 2001: 258-265
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint