Print edition: ISSN 0913-5685
Online edition: ISSN 2432-6380
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
CS2005-16
A Method of Clock Synchronization over IP network
Yusuke Yamada (Sharp)
pp. 1 - 6
CS2005-17
A method for communication between independent private network area using virtual address
Kuniharu Arima, Hiroaki Kamoda, Akihiro Hayakawa, Masaki Yamaoka (NTTDATA)
pp. 7 - 12
CS2005-18
A control-fowarding separated node using a hardware packet transferring
Toshiyuki Sudo, Takeshi Kawasaki, Naoki Oguchi, Takeshi Kodama, Tetsumei Tsuruoka (Fujitsu Ltd.)
pp. 13 - 18
CS2005-19
A Detection Technique of Epidemic Worms using Clustering of Packet Payload
Yuji Waizumi, Masashi Tsuji, Yoshiaki Nemoto (Tohoku Univ.)
pp. 19 - 24
CS2005-20
An Optical Path Rearrange System with a Packet Forwarding Table Update Mechanism
Yoshihiro Nakahira, Akihiro Fujii, Issei Asabayashi, Hiroyuki Sakamoto, Masato Kawahara (OKI)
pp. 25 - 30
CS2005-21
Low power consumption type multi-robot network system for rescue operations
Masahiro Okamoto, Hisayoshi Sugiyama, Tetsuo Tsujioka (Osaka City Univ.), Masashi Murata (Ryukoku Univ.)
pp. 31 - 36
CS2005-22
[Encouragement Talk]
Message Reduction by Network Support in Layered Pure P2P Systems
Takeshi Sano (Osaka Univ.), Miki Yamamoto (Kansai Univ.)
pp. 37 - 40
CS2005-23
[Encouragement Talk]
Resource Management Schemes in Virtual Private Networks
Tomonori Takeda, Ryuichi Matsuzaki, Ichiro Inoue, Shigeo Urushidani (NTT)
pp. 41 - 44
CS2005-24
[Invited Talk]
Technique of Quarantine LAN System
Masateru Oonishi (NTT DATA INTELLILINK Corp.)
pp. 45 - 47
CS2005-25
[Invited Talk]
Overlay Network Technologies for QOS control
Tutomu Murase, Hideyuki Shimonishi, Masayoshi Kobayashi, Yoshiaki Kiriha (NEC)
pp. 49 - 54
CS2005-26
[Invited Talk]
International standardization activities for PON Conformance & Interoperability
-- From producing BPON/GPON international standard recommendations to the Conformance & Interoperability certification --
Tatsuhiko Yoshida (NTT AT)
pp. 55 - 60
CS2005-27
An Self Adaptive Intrusion Detection Method\\ for AODV-based Mobile Ad Hoc Networks
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato (Tohoku Univ.), Abbas Jamalipour (Univ. of Sydney)
pp. 61 - 66
CS2005-28
Energy Analysis of IEEE 802.11 DCF under Non-Saturation Conditions
Katsumi Sakakibara, Haruhiko Nakagawa, Jiro Yamakita (Okayama Prif. Univ.)
pp. 67 - 72
CS2005-29
About the MAC protocol performance of the RFID system that can deal with two or more leaders
Makoto Ejima, Masaki Bandai, Takashi Watanabe (Shizuoka Univ)
pp. 73 - 77
CS2005-30
Proposal and evaluation of a routing protocol for VANET using mobile velocity vector
Mitsuru Ochi, Tarik Taleb (Tohoku Univ.), Abbas Jamalipour (Univ. of Sydney), Nei Kato, Yoshiaki Nemoto (Tohoku Univ.)
pp. 79 - 84
CS2005-31
Status toward standardization of layer 2 security and items
Ken Murakami, Koji Sato, Tetsuya Yokotani, Tetsujiro Yasushi (Mitsubishi Electric Corp.)
pp. 85 - 89
CS2005-32
Identification of attack sources by estimating traffic matrix
Yuichi Ohsita (Osak Univ), Shingo Ata (Osaka City Univ), Masayuki Murata (Osak Univ)
pp. 91 - 96
CS2005-33
Fluid-based analysis of a network with DCCP connections and RED routers
Hiroyuki Hisamatsu, Hiroyuki Ohsaki, Masayuki Murata (Osaka Univ.)
pp. 97 - 102
CS2005-34
Effective recovery method for continuous collection of management information over mobile environment
Hiroki Kamiyama, Gen Kitagata, Kazuhide Koide (Tohoku Univ.), Glenn Mansfield Keeni (Cysol), Norio Shiratori (Tohoku Univ.)
pp. 103 - 108
CS2005-35
Evaluation of scalable QoS degradation locating from end-to-end flow quality information
Masayoshi Kobayashi, Yohei Hasegawa, Tutomu Murase (NEC Corp.)
pp. 109 - 114
CS2005-36
Proposal of a method for hiding classified information on blog
Yuichi Nakatani, Tetsuro Tokunaga, Hitoshi Yamaguchi, Tadashi Itoh (NTT)
pp. 115 - 118