IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 108, Number 481

Information and Communication Management

Workshop Date : 2009-03-12 - 2009-03-13 / Issue Date : 2009-03-05

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICM2008-58
Load-balanced and interference-aware spanning tree construction algorithm for TDMA-based wireless mesh networks
Hiroshi Tokito, Masahiro Sasabe, Go Hasegawa, Hirotaka Nakano (Osaka Univ.)
pp. 1 - 6

ICM2008-59
Power control method considering radio interference and path length for wireless mesh networks
Toshiaki Hidekuma, Go Hasegawa, Masahiro Sasabe, Hirotaka Nakano (Osaka Univ.)
pp. 7 - 12

ICM2008-60
A routing protocol based on information of neiboring nodes for mobile ad-hoc network
Tomonori Enami (Kochi Univ. of Tech.), Issei Ishimoto (Allied Telesys), Kazunori Ueda (Kochi Univ. of Tech.)
pp. 13 - 18

ICM2008-61
Autonomous Burst Access Control Cooperated with Adjacent Nodes in Wireless Multihop Network
Makoto Mochiki, Yosuke Tanigawa (Osaka Univ.), Hideki Tode (Osaka Prefecture Univ.), Koso Murakami (Osaka Univ.)
pp. 19 - 24

ICM2008-62
A study on development of networked home appliances
Shinji Furuya, Tetsuya Yokotani, Kiyoshi Shimokasa (Mitsubishi Electric Corp.)
pp. 25 - 28

ICM2008-63
A Study on SDH/OTN Integrated Network Management Method
Kei Karato, Shun Ymamoto, Tomoyoshi Kataoka (Nippon Telegraph and Telephone Co.), Yukihide Yana, Yuzo Fujita (NTT Software Corp.)
pp. 29 - 34

ICM2008-64
A Study on Home Network Visualization
Yoichi Kato, Masaru Miyamoto (NTT)
pp. 35 - 40

ICM2008-65
A method to detect prefix hijacking under misrepresentation of AS path
Mitsuho Tahara, Naoki Tateishi, Satoshi Matsuba, Hikaru Seshake (NTT)
pp. 41 - 45

ICM2008-66
Address system in a bypass network for the Internet
Takahiko Yamada (Ritsumeikan Univ.)
pp. 47 - 52

ICM2008-67
Reducing measurement overhead using path overlapping in overlay networks
Hiroki Mori, Go Hasegawa, Masayuki Murata (Osaka Univ)
pp. 53 - 58

ICM2008-68
Analysis of Pattern of Query Trends in P2P File-Sharing System
Masato Doi, Shingo Ata, Ikuo Oka (Osaka City Univ.)
pp. 59 - 64

ICM2008-69
A Cooperative Routing Method Considering Residual Holding Time for Multiple Overlay Networks
Hiroki Okada, Kazuhiko Kinoshita (Osaka Univ.), Nariyoshi Yamai (Okayama Univ.), Koso Murakami (Osaka Univ.)
pp. 65 - 68

ICM2008-70
Asymmetric-DHT based on node capabilities
Kazuhisa Kawada, Kazunori Ueda (Kochi Univ. of Tech.)
pp. 69 - 74

ICM2008-71
Estimation of Environment-Independent Parameter in Subjective Assessment by using Comparative Evaluation
Yasuhiro Sato, Shingo Ata, Ikuo Oka (Osaka City Univ.)
pp. 75 - 80

ICM2008-72
Performance evaluation of P2P file-sharing network with relay caching in overlay routing
Takeshi Noda, Go Hasegawa, Masayuki Murata (Osaka Univ.)
pp. 81 - 86

ICM2008-73
Pricing of Flat-Rate VOD Type IPTV Service Based on Users' Benefit and Provider's Profit
Kazutaka Tezuka (Waseda Univ.), Kyoko Yamori (Asahi Univ./Waseda Univ.), Yoshiaki Tanaka (Waseda Univ.)
pp. 87 - 92

ICM2008-74
A Study on Efficient Order Management in VPN Service
Ryoji Shiozawa, Yasuharu Terasawa, Haruji Furukawa (NTT COMWARE Corp.)
pp. 93 - 98

ICM2008-75
The Proposal of Management Method for a QoS Assured Network by Cooperating between IP flow control and MPLS DiffServ-TE
Shuntaro Kashihara, Masanori Miyazawa, Kenichi Ogaki, Tomohiro Otani (KDDI R&D Labs)
pp. 99 - 104

ICM2008-76
Proposed congestion control method allowing the size of required resource to be reduced
Kenichi Hatakeyama, Yasunori Osana, Shin-ichi Kuribayashi (Seikei Univ.)
pp. 105 - 110

ICM2008-77
[Encouragement Talk] Construction of Candidate Topologies for Large-Scale Networks
Noriaki Kamiyama (NTT Corp.)
pp. 111 - 116

ICM2008-78
Bandwidth Capacity Design under Incomplete Traffic Information -- Formulation on Linear Programming and its Evaluation --
Ryutaro Matsumura, Masayuki Tsujino, Motoi Iwashita (NTT Corp.)
pp. 117 - 120

ICM2008-79
Proposal of Optical Path Optimized Reconfiguration Method
Nobuyuki Takai, Yuzo Bessho, Yoshimasa Baba (Mitsubishi Electric Corp.)
pp. 121 - 126

ICM2008-80
Study on Optimized Network Topology According to Environmental Conditions
Masayuki Tsujino, Ryutaro Matsumura, Motoi Iwashita (NTT Corp.)
pp. 127 - 130

ICM2008-81
A Practical Traffic Data Management System Based on a Large-Sacle PC Cluster
Hironao Tamura, Hiroya Makino, Yushi Makino, Kazuhide Takahashi, Shoichi Hirata (NTTDoCoMo)
pp. 131 - 136

ICM2008-82
The Proposal of Service Delivery Platform Built on Distributed Data Driven Architecture
Yosuke Kono, Akiyuki Tomizawa, Takayuki Nakamura, Hiroshi Yasuda (DoCoMo Tech.), Kazuhide Takahashi (NTT DoCoMo)
pp. 137 - 142

ICM2008-83
Study on the use of Virtualization Technology in the 3-layer Architecture Systems
Kazuhiko Higashi, Hiroaki Tomozawa, Takuya Ogawa, Minoru Kato (NTT Comware)
pp. 143 - 148

ICM2008-84
A Study of Scenario Editing Method for Client Autonomous Manipulation Agent
Kenichi Nishikawa, Fumihiro Yokose, Haruhisa Nozue, Nagatoshi Nawa, Takeshi Masuda, Tetsuya Yamamura (NTT Corp.)
pp. 149 - 154

ICM2008-85
A Prototype of the Client Autonomous Manipulation Agent
Haruhisa Nozue, Fumihiro Yokose, Kenichi Nishikawa, Nagatoshi Nawa, Takeshi Masuda, Tetsuya Yamamura (NTT Corp.)
pp. 155 - 160

ICM2008-86
Study and Implementation of Data Architecture to manage and leverage Resource Information
Nobuyuki Iwashima, Yoichi Yamashita, Shigekazu Hayami, Shinji Hidaka, Kazuma Ishikawa, Yoshiyuki Nakayama, Hidetoshi Mori (NTT WEST)
pp. 161 - 166

ICM2008-87
Directional Active Probing in Real Network Services
Marat Zhanikeev, Yoshiaki Tanaka (Waseda Univ.)
pp. 167 - 172

ICM2008-88
Adaptive Load Distribution Method by Autonomous Increase and Decrease of Distributed Components
Wataru Miyazaki, Kazuhiko Kinoshita (Osaka Univ.), Hideki Tode (Osaka Prefecture Univ.), Koso Murakami (Osaka Univ.), Shinji Kikuchi, Satoshi Tsuchiya, Atsuji Sekiguchi, Tsuneo Katsuyama (Fujitsu Lab.)
pp. 173 - 178

ICM2008-89
Analysis of Difference between Encrypted and Normal Traffic and its Application to Detect Encrypted Traffic.
Yu-ki Minamiura, Shingo Ata (Osaka City Univ.), Nobuyuki Nakamura, Yoshihiro Nakahira (OKI Electric Industry Co., Ltd.), Masayuki Murata (Osaka Univ.), Ikuo Oka (Osaka City Univ.)
pp. 179 - 184

ICM2008-90
Resource management method of Network -- Application of the obstacle restoration of the traffic control technology --
Rei Tamagawa, Yuji Kamite, Toshiki Tsuboi, Shin Abe (NTTCommunications)
pp. 185 - 190

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan