Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yoji Kawamoto is active.

Publication


Featured researches published by Yoji Kawamoto.


wireless communications and networking conference | 2003

A two-phase scatternet formation protocol for Bluetooth wireless personal area networks

Yoji Kawamoto; Vincent W. S. Wong; Victor C. M. Leung

Bluetooth is a promising short-range radio technology for wireless personal area networks. There is an interest to expand the coverage of such networks by interconnecting them to form scatternets. Most of the scatternet formation algorithms recently proposed in the literature do not support dynamic topology changes, and the master of bridge nodes in the resulting scatternet may become the traffic bottleneck and reduce network throughput. In this paper, we propose a two-phase scatternet formation (TPSF) protocol to support dynamic topology changes while maintaining a high aggregate throughput. In the first phase, a control scatternet is constructed to support topology changes and route determination. The second phase creates a separate on-demand scatternet whenever a node wants to initiate data communications with another node. The on-demand scatternet is torn down when the data transmissions are finished. Since all the time slots in an on-demand scatternet are dedicated to a single communication session, a high aggregate throughput is achieved at the expense of a slightly higher connection setup delay.


Mobile Computing and Communications Review | 2003

Secure routing with tamper resistant module for mobile Ad hoc networks

Joo-Han Song; Vincent W. S. Wong; Victor C. M. Leung; Yoji Kawamoto

Most routing protocols proposed for mobile ad hoc networks (MANETs) assume that there is an implicit trust-your-neighbor relationship in which all the neighboring nodes behave properly. However, we should not ignore the fact that attackers do exist in real networks. These users may try to paralyze the MANETs by manipulating the messages (e.g., dropping all data or control packets, sending incorrect route advertisement messages). Thus, secure routing protocols are crucial for MANETs.


Archive | 2006

Information processing apparatus and method, information processing system, and transmission medium

Yoji Kawamoto


Archive | 2001

Information terminal, processing method by information terminal, information providing apparatus and information network system

Yoji Kawamoto


Archive | 2005

Terminal unit, position display method, information providing system, and information providing method

Yoji Kawamoto


Archive | 2000

Terminal equipment, positional information display method, positional information providing device and positional information providing method

Yoji Kawamoto


Archive | 1996

Information providing device and portable communication terminal

Yoji Kawamoto; Akira Kurihara


Archive | 1996

Information providing apparatus and portable communication terminal

Yoji Kawamoto; Akira Kurihara


Archive | 2003

Information processing device and method, program storage medium and program

Ryuji Ishiguro; Yoji Kawamoto; Yuichi Ezura; Motohiko Nagano


Archive | 2003

Information processing device, method, recording medium, and program

Yoji Kawamoto; Ryuji Ishiguro; Yuichi Ezura; Motohiko Nagano

Collaboration


Dive into the Yoji Kawamoto's collaboration.

Top Co-Authors

Avatar

Victor C. M. Leung

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Vincent W. S. Wong

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Joo-Han Song

University of British Columbia

View shared research outputs
Researchain Logo
Decentralizing Knowledge