Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 13:40 |
Ishikawa |
Hotel Rurikoh |
Evaluation of Data-centric Network using Wide Area Network Testbed Daisuke Matsubara (Hitachi), Satoru Okamoto, Naoaki Yamanaka (Keio Univ.), Tatsuro Takahashi (Kyoto Univ.) SITE2013-58 IA2013-83 |
The networks of the future are projected to be primary based on extremely distributed mobile environment in which wirele... [more] |
SITE2013-58 IA2013-83 pp.25-30 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 14:05 |
Ishikawa |
Hotel Rurikoh |
A Generating Method of Macroflow for Flow-based Routing Yousuke Takahashi, Keisuke Ishibashi, Noriaki Kamiyama, Kohei Shiomoto (NTT), Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.) SITE2013-59 IA2013-84 |
Software-defined networking (SDN) technology such as OpenFlow to enable flow-level traffic engineering has received a lo... [more] |
SITE2013-59 IA2013-84 pp.31-36 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 14:30 |
Ishikawa |
Hotel Rurikoh |
QoE-based Dynamic Network Resources Allocation for SDN-based Network Yuta Hashiguchi, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Pref. Univ.) SITE2013-60 IA2013-85 |
Quality of Service that used today for estimative index of network is quantified performance of network.
For example, p... [more] |
SITE2013-60 IA2013-85 pp.37-42 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 14:55 |
Ishikawa |
Hotel Rurikoh |
A Packet-In Message Filter in OpenFlow Switches Considering Wildcarded Headers Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) SITE2013-61 IA2013-86 |
OpenFlow switches forward packets to a controller as Packet-In messages if specified by the flow table. If switches rece... [more] |
SITE2013-61 IA2013-86 pp.43-48 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 16:25 |
Ishikawa |
Hotel Rurikoh |
An Efficient Judging Method of a Large Amount of E-mails Having the Same Sender and Recipient Addresses Yoshiharu Tsuzaki, Ryosuke Matsumoto, Daisuke Kotani, Shuichi Miyazaki, Yasuo Okabe (Kyoto Univ.) SITE2013-62 IA2013-87 |
With the wide use of e-mail, it has become commonly expected that e-mails are delivered to recipients immediately. It is... [more] |
SITE2013-62 IA2013-87 pp.61-66 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 16:50 |
Ishikawa |
Hotel Rurikoh |
An Authentication Federation Proxy Which Conceals Attributes and Authorizatiion Policies Each Other Yasuo Okabe, Takaaki Komura (Kyoto Univ.), Hiroyuki Sato (Univ. of Tokyo), Kazutsuna Yamaji, Motonori Nakamura (NII) SITE2013-63 IA2013-88 |
A mechanism for authentication and authorization federation which conceals attributes of the IdP from the SP and simulta... [more] |
SITE2013-63 IA2013-88 pp.67-72 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-27 17:15 |
Ishikawa |
Hotel Rurikoh |
A study of the compensation for private sound and visual recording and technological protection measure
-- Focus on contents use on the Internet -- Naonori Kato (SOKENDAI), Hitoshi Okada (NII) SITE2013-64 IA2013-89 |
The compensation for private sound and visual recording to charge for the private uses of contents was established in Ja... [more] |
SITE2013-64 IA2013-89 pp.73-78 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 09:30 |
Ishikawa |
Hotel Rurikoh |
Formulation of Guideline for the Filming/Storing and Viewing/Sharing of Elementary and Junior High Schools Classroom Video/Audio Data Takahiro Haga (Gifu Shotoku Gakuen Univ.), Takushi Otani (Kibi International Univ.) SITE2013-65 IA2013-90 |
We have discussed legal and ethical problems concerning video/audio recording, digital archiving and online delivery (co... [more] |
SITE2013-65 IA2013-90 pp.103-108 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 09:55 |
Ishikawa |
Hotel Rurikoh |
A Study on Privacy Protection Dealing with Real-Time Big Data
-- A Case Study on Health Care Services with Cloud Computing -- Kanako Kawaguchi (Chiba Univ.) SITE2013-66 IA2013-91 |
Our society has exploited a large amount of big data, and that is expected to yield nice profits for us. As computers im... [more] |
SITE2013-66 IA2013-91 pp.109-114 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 10:20 |
Ishikawa |
Hotel Rurikoh |
A study of service level agreement for Office365 Education Hiroshi Ueda (Kyoto Univ.) SITE2013-67 IA2013-92 |
In this study, an outline of SLA (Service Level Agreement) for Office365 Education and case studies about consistency on... [more] |
SITE2013-67 IA2013-92 pp.115-120 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 10:45 |
Ishikawa |
Hotel Rurikoh |
Should we allow children to use SNS(Social Networking Service)?
-- From the view point of computer and information ethics -- Takushi Otani (Kibi International Univ.) SITE2013-68 IA2013-93 |
[more] |
SITE2013-68 IA2013-93 pp.121-126 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 12:30 |
Ishikawa |
Hotel Rurikoh |
A Method of IPv6 Auto Address Assignment with OSPFv3 in a Multi-Link Site Kenji Ohira (NAIST) SITE2013-69 IA2013-94 |
In order to configure IPv6 address setting on nodes in a network of multiple links, we usually have to configure the set... [more] |
SITE2013-69 IA2013-94 pp.147-152 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 12:55 |
Ishikawa |
Hotel Rurikoh |
A study on application to the client environment of SA46T/SA46T-AS Naoki Matsuhira (Fujitsu) SITE2013-70 IA2013-95 |
As a transition technologies based on the situation of exhaust of IPv4 address, SA46T which is an encapsulation technolo... [more] |
SITE2013-70 IA2013-95 pp.153-158 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 13:20 |
Ishikawa |
Hotel Rurikoh |
An Efficient multi-channel utilization method for wireless backbone networks Yuzo Taenaka (Univ. of Tokyo), Kazuya Tsukamoto (Kyushu Inst. of Tech.) SITE2013-71 IA2013-96 |
This paper presents an efficient multi-channel utilization method to increase the network capacity of the wireless backb... [more] |
SITE2013-71 IA2013-96 pp.159-164 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 13:45 |
Ishikawa |
Hotel Rurikoh |
Implementation of Direction based Channel Separation Method and Flow Balancing Method for Multi-Channel Wireless Backbone Network Masaki Tagawa (Kyushu Inst. of Tech.), Yuzo Taenaka (Univ. of Tokyo), Kazuya Tsukamoto (Kyushu Inst. of Tech.) SITE2013-72 IA2013-97 |
This study implements an architecture of traffic management on multi-channel wireless backbone network. We propose chann... [more] |
SITE2013-72 IA2013-97 pp.165-170 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 15:10 |
Ishikawa |
Hotel Rurikoh |
The impact of JavaScript to the increasing complexity in the Web traffic Megumi Ninomiya, Kenjiro Cho (IIJ-II) SITE2013-73 IA2013-98 |
Recently, traffic volume of JavaScript tends to increase in Web applications. In this paper, we focused on JavaScript, a... [more] |
SITE2013-73 IA2013-98 pp.183-188 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 15:35 |
Ishikawa |
Hotel Rurikoh |
Fingerprinting in Executable Files for Tracking Illegal Uploaders Masayuki Tsubouchi, Yasuo Okabe (Kyoto Univ.) SITE2013-74 IA2013-99 |
Nowadays illegal uploading of digital contents is a serious problem. Some software venders have solved this issue by aut... [more] |
SITE2013-74 IA2013-99 pp.189-193 |