[1] Tohru FUJIWARA, Toyoo TAKATA, Tadao KASAMI and Shu LIN: ``An Approximation to the Weight Distribution of Binary Primitive BCH Codes with Designed Distances 9 and 11'', IEEE Transactions on Information Theory, Vol.~IT-32, No.~5, pp.~706--709 (September 1986). [2] Tadao KASAMI, Toru FUJIWARA, Toyoo TAKATA and Shu LIN: ``A Cascaded Coding Scheme for Error Control and its Performance Analysis'', IEEE Transactions on Information Theory, Vol.~IT-34, No.~3, pp.~448--462 (May 1988). [3] 高田 豊雄, 藤原 融, 嵩 忠雄, Shu LIN: ``ある縦接符号化法の誤って復号される確率の上界と正しく復号される確率の 計算法'', 電子情報通信学会論文誌 (A) Vol.~J72-A, No.~4, pp.~703--710 (平成 01--04). [4] 高田 豊雄, 宇治田 聡, 藤原 融, 嵩 忠雄, Shu LIN: ``ブロック位相偏移変調符号の線形構造と誤り特性の解析'', 電子情報通信学会論文誌 (A) , Vol.~J73-A, No.2, pp.~314--321 (平成 02--02). [5] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``A Concatenated Coded Modulation Scheme for Error Control'', IEEE Transactions on Communications, Vol.~COM-38, No.~6, pp.~752--763 (June 1990). [6] Toyoo TAKATA, Toru FUJIWARA, Tadao KASAMI and Shu LIN: ``An Error Control System with Multiple-Stage Forward Error Correction'', IEEE Transactions on Communications, Vol.~COM-38, No.~10, pp.~1799--1809 (October 1990). [7] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``Cross-Over Component Code Construction for Multi-Level Block Modulation Codes'', The Transactions of the IEICE, Vol.~E73, No.~10, pp.~1657--1665 (October 1990). [8] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``On Linear Structure and Phase Rotation Invariant Properties of Block M-PSK Modulation Codes'', IEEE Transactions on Information Theory, Vol.~IT-37, No.~1, pp.~164--167 (January 1991). [9] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``On Multi-Level Block Modulation Codes'', IEEE Transactions on Information Theory, Vol.~IT-37, No.~4, pp.~965--975 (July 1991). [10] Mitsuteru KATAOKA, Toyoo TAKATA, Tadao KASAMI and Satoshi UJITA: ``Error Performance of Multi-Stage Hard-Decision Bounded Distance Decoding for Multi-Level Block Modulation Codes'', The Transactions of the IEICE, Vol.~E74, No.~9, pp.~2555--2562 (September 1991). [11] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``On the Optimum Bit Orders with Respect to the State Complexity of Trellis Diagrams for Binary Linear Codes,'' IEEE Transactions on Information Theory, Vol.~IT-39, No.~1, pp.~242--245 (January 1993). [12] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``On Complexity of Trellis Structure of Linear Block Codes'', IEEE Transactions on Information Theory, Vol.~IT-39, No.~3, pp.~1057--1064 (May 1993). [13] Toyoo TAKATA, Tadao KASAMI, Satoshi UJITA and Shu LIN: ``Multi-Stage Decoding of Multilevel Block $M$-PSK Modulation Codes and Its Performance Analysis,'' IEEE Transactions on Information Theory, Vol.~IT-39, No.~4, pp.~1204--1218 (July 1993). [14] Tadao KASAMI, Toyoo TAKATA, Toru FUJIWARA and Shu LIN: ``On Structural Complexity of the $L$-section Minimal Trellis diagrams for Binary Linear Codes,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.~E76-A, No.~9, pp.~1411--1421 (September 1993). [15] Jiantian WU, Shu LIN, Tadao KASAMI, Toru FUJIWARA and Toyoo TAKATA: ``An Upper Bound on the Effective Error Coefficient of Two-Stage Decoding, and Good Two-Level Decompositions of Some Reed-Muller Codes,'' IEEE Transactions on Communications, Vol.~COM-42, No.~2/3/4, pp.~813--818 (February/March/April 1994). [16] Toyoo TAKATA, Tadao KASAMI, Yuji YAMASHITA, Toru FUJIWARA and Shu LIN: ``Suboptimum Decoding of Decomposable Block Codes,'' IEEE Transactions on Information Theory, Vol.~IT-40, No.~5, pp.~1392--1405 (September 1994). [17] 山本 宙, 高田 豊雄, 藤原 融, 嵩 忠雄 ``トレリス符号のブロック誤り確率の評価について,'' 電子情報通信学会論文誌(A), Vol.~J78-A, No.~6, pp.~716--721 (平成 07--06). [18] Kenichi TOMITA, Toyoo TAKATA, Tadao KASAMI and Shu LIN: ``An Improved Union Bound on Block Error Probability for Closest Coset Decoding,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.~E78-A, No.~9, pp.~1077--1085 (September 1995). [19] Tadao KASAMI, Toyoo TAKATA, Koichi YAMASHITA, Toru FUJIWARA and Shu LIN: ``On Bit Error Probability of a Concatenated Coding Scheme,'' IEEE Transactions on Communications, Vol.~COM-45, No.~5, pp.~536--543 (May 1997). [20] Robert H. MORELOS-ZARAGOZA, Nobuyuki UETSUKI, Toyoo TAKATA, Tadao KASAMI and Shu LIN: ``Error Performance of Multilevel Block Coded 8-PSK Modulations Using Unequal Error Protection Codes for the Rayleigh Fading Channel,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.~E80-A, No.~6, pp.~1143--1149 (June 1997). [21] Kenichi TOMITA, Toyoo TAKATA and Tadao KASAMI: ``An Evaluation Method of the Block Error Probability by Using a Low-Weight Sub-Trellis Diagram,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.~E80-A, No.~11, pp.~2104--2110 (November 1997). [22] Takehiko TANAKA, Yuichi KAJI, Hajime WATANABE, Toyoo TAKATA and Tadao KASAMI: ``Security Verification of Real-Time Cryptographic Protocols Using a Rewriting Approach,'' IEICE Transactions on Information and Systems, Vol.~E81-D, No.~4, pp.~355--363 (April 1998). [23] Takuya KOUMOTO, Toyoo TAKATA, Tadao KASAMI and Shu LIN: ``An Iterative Soft-Decision Decoding Algorithm,'' IEEE Transactions on Information Theory, Vol.~IT-45, No.~2, pp.~731--741 (March 1999). [24] Jun ASATANI, Kenichi TOMITA, Takuya KOUMOTO, Takata TOYOO and Tadao KASAMI: ``A Soft-Decision Iterative Decoding Algorithm Using a Top-down and Recursive Minimum Distance Search,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.~E85-A, No.~10, pp.~2220--2228 (October 2002). [25] 葛野 弘樹, 中井 優志, 渡邊 集, 川原 卓也, 加藤 貴司, Bhed Bahadur Bista, 高田 豊雄: ``モバイルエージェントを用いた分散型インターネット観測システムの提案,'' 情報処理学会論文誌, Vol.~47, No.~5, pp.~1393--1405 (平成18--05). [26] Jiahong WANG, Takuya FUKASAWA, Shintaro URABE, Toyoo TAKATA, and Masatoshi MIYAZAKI: ``Mining Frequent Patterns Securely in Distributed System,'' IEICE Transactions on Information and Systems, Vol.~E89-D, No.~11, pp.~2739--2747 (November 2006). [27] Jiahong WANG, Yoshiaki ASANUMA, Toyoo TAKATA and Jie LI: ``Mining Sequential Patterns More Efficiently by Reducing the Cost of Scanning Sequence Databases,'' Journal of Information Processing Society of Japan, Vol.~47, No.~12, pp.3365--3379, (December 2006). [28] 渡邊 集, 加藤 貴司, Bhed Bahadur Bista, 高田 豊雄: ``MusicXML への電子透かし埋め込み方式の提案,'' 情報処理学会論文誌, Vol.~48, No.~1, pp.~312--326 (平成19--01). [29] Shintaro URABE, Jiahong WANG, Eiichiro KODAMA and Toyoo TAKATA: ``A High Collusion-Resistant Approach to Distributed Privacy-preserving Data Mining,'' IPSJ Transactions on Database, Vol.~48, No.~SIG~11~(TOD34), pp.104--117, (April 2007). [30] 吉本 道隆, 加藤 貴司, Bhed Bahadur Bista, 高田 豊雄: ``ユーザビリティ工学に基づくユーザビリティとセキュリティを両立したセキュリ ティスキャナのインタフェースの開発と評価,'' 情報処理学会論文誌, Vol.~51, No.~2, pp.~529--541 (平成22--02). %% 2010年 [31] Jiahong WANG, Takaaki MIKAMI, Kazuki KANAMORI, Eiichiro KODAMA and Toyoo TAKADA: ``Improving Packet Delivery Fraction of Ad Hoc Network with XORs-based Network Coding CDS,'' IAENG International Journal of Computer Science, Vol.~38, Issue 3, pp.~275--282 (August 2011). [32] Jiahong WANG, Takaaki MIKAMI, Kazuki KANAMORI, Eiichiro KODAMA and Toyoo TAKATA: ``An SCDs-Based Routing Algorithm for Improving Packet Delivery Fraction in Ad Hoc Networks,'' IAENG Transactions on Engineering Technoloties, Vol.~VII, 2012, pp.~360--373 (January 2012). [33] Nan MENG, Jiahong WANG, Eiichiro KODAMA and Toyoo TAKATA: ``Reducing Data Leakage Possibility Resulted from Eavesdropping in Wireless Sensor Network,'' International Journal of Space-Based and Situated Computing, Vol.~3, No.~1, pp.~55--65 (March 2013). [34] Bhed Bahadur BISTA, Masahiko TAKAHASHI, Toyoo TAKATA and Danda B. RAWAT: ``A Power Saving Scheme for OpenFlow Network,'' Journal of Clean Energy Technologies, Vol.~1, No.~4, pp.276--280 (July 2013). [35] Masaki NARITA, Bhed Bahadur BISTA and Toyoo TAKATA: ``A Practical Study on Noise-Tolerant PN Code-Based Localization Attacks to Internet Threat Monitors,'' International Journal of Space-Based and Situated Computing, Vol.~3, No.~4, pp.~215--226 (December 2013). [36] Bhed Bahadur BISTA, Arata FUKUSHI, Toyoo TAKATA and Danda B. RAWAT: ``Reducing Energy Consumption in Wired OpenFlow-Based Networks,'' International Journal of Control and Automation, Vol.~7, No.~6, pp.401--412 (July 2014). [37] Jiahong WANG, Yuhiro YONAMINE, Eiichiro KODAMA and Toyoo TAKATA: ``Supporting User Communication in Disaster-Hit Area Using Mobile Ad Hoc Networks,'' IAENG International Journal of Computer Science, Vol.~42, Issue 2, pp.~152--159 (April 2015). [38] Jiahong WANG, Eiichiro KODAMA and Toyoo TAKATA: ``Identifying Relations between Frequent Patterns Mined at Two Collaborative Websites,'' International Journal of Space-Based and Situated Computing, Vol.~5, No.~4, pp.~209--221 (December 2015). [39] Yasushi HOSOKAWA, Daiki URATA, Akio DOI, Toyoo TAKATA and Yoshihiko ABE: ``The Motion Capturing of Female Divers under Water and the Trial Production of Motion Viewers for Developing a Virtual Diving Experience Learning System,'' Artificial Life and Robotics, Vol.~22, Issue 3, pp.~346-356 (September 2017). [40] Bhed Bahadur BISTA, Jiahong WANG and Toyoo TAKATA: ``Incentive Mechanisms for Promoting D2D Communications in Cellular Networks,'' International Journal of Space-Based and Situated Computing, Vol.~8, No.~1, pp.~1--8 (March 2018). [41] Eiichiro KODAMA, Bhed Bahadur BISTA, Jiahong WANG and Toyoo TAKATA: ``Construction and Maintenance of k-hop CDS in MANET with Two Classes of Mobile Terminals,'' International Journal of Space-Based and Situated Computing, Vol.~8, No.~2, pp.~70--79 (September 2018). [42] 平川 哲也, 小倉 加奈代, ベッド バハドゥール ビスタ, 高田 豊雄: ``TCPコネクション数と継続時間に基づくSlow HTTP DoS攻撃に対する防御手法,'' 情報処理学会論文誌, Vol.~61, No.~3, pp.~581--590 (令和02--03). [43] Masaki NARITA, Keisuke KAMADA, Kanayo OGURA, Bhed Bahadur BISTA and Toyoo TAKATA: ``Countermeasures against Darknet Localisation Attacks with Packet Sampling,'' Indonesian Journal of Electrical Engineering and Computer Science, Vol.~19, No.~2, pp.~1129--1140 (August 2020). [44] Bhed Bahadur BISTA, Jiahong WANG and Toyoo TAKATA: ``Probabilistic Computation Offloading for Mobile Edge Computing in Dynamic Network Environment,'' Journal of Internet of Things, Elsevier, Vol.~11, pp.~1--11 (September 2020).