Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, IN (Joint) |
2014-12-18 12:50 |
Hiroshima |
Hiroshima City University |
Detecting rogue access points by traffic analysis on both wireless and wired LAN Takehiro Kawata, Takeshi Yada (NTT) IN2014-91 |
We propose a novel method for detecting rogue access points(APs) of IEEE 802.11 wireless LAN connected to managed networ... [more] |
IN2014-91 pp.1-4 |
IA, IN (Joint) |
2014-12-18 13:15 |
Hiroshima |
Hiroshima City University |
On the Bias in Active Measurements for the Estimation of Link Utilization Kana Nakano, Shigeo Shioda (Chiba Univ.) IN2014-92 |
Active measurements estimate the conditions of a target path using active probing based on the assumption that probe pac... [more] |
IN2014-92 pp.5-10 |
IA, IN (Joint) |
2014-12-18 13:40 |
Hiroshima |
Hiroshima City University |
Proposal and Evaluation of P2P live streaming system for digest viewing Shunsuke Suzuki (UEC), Yoshiko Sueda (NTT/UEC), Yoshikatsu Tada (UEC) IN2014-93 |
Live streaming in P2P(peer to peer) can solve a concentration of load on a distributor, and its demand has increased in ... [more] |
IN2014-93 pp.11-16 |
IA, IN (Joint) |
2014-12-18 14:10 |
Hiroshima |
Hiroshima City University |
Study of Determination Method for Ordering Rule Processing of the Rete Algorithm in Grid Topology Network Tomoya Kawakami, Tomoki Yoshihisa (Osaka Univ.), Yutaka Yanagisawa, Masahiko Tsukamoto (Kobe Univ.) IA2014-69 |
In recent years, ubiquitous computing environment has been expected to realize because computing devices become compact,... [more] |
IA2014-69 pp.1-6 |
IA, IN (Joint) |
2014-12-18 14:35 |
Hiroshima |
Hiroshima City University |
A Design and Implementation of a verification platform of a distributed system for disaster resistance and disaster tolerance. Tohru Kondo (Hiroshima Univ.), Hiroki Kashiwazaki (Osaka Univ.), Yoshiaki Kitaguchi (Kanazawa Univ.), Kohei Ichikawa (NAIST), Kazuma Nishiuchi (City Net), Ikuo Nakagawa (Intec), Yutaka Kikuchi (KUT) IA2014-70 |
(To be available after the conference date) [more] |
IA2014-70 pp.7-12 |
IA, IN (Joint) |
2014-12-18 15:00 |
Hiroshima |
Hiroshima City University |
A Study on the Attack and Protection Mechanisms for an In-vehicle Network Connected with the Internet Takaya Ezaki, Tomohiro Date, Hiroyuki Inoue (Hiroshima City Univ.) IA2014-71 |
With advanced features and the diversification of services for an automobile, various problems of the information securi... [more] |
IA2014-71 pp.13-18 |
IA, IN (Joint) |
2014-12-18 15:25 |
Hiroshima |
Hiroshima City University |
A Vehicle Clustering Algorithm for Information Propagation by Inter-Vehicle Communications Naohiro Washio (NAIST), Satoshi Matsuura (Tokyo Tech/NICT), Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) IA2014-72 |
In the information propagation over a wide area, such as Vehicle-to-Vehicle (V2V) communications, there is the case that... [more] |
IA2014-72 pp.19-24 |
IA, IN (Joint) |
2014-12-18 15:55 |
Hiroshima |
Hiroshima City University |
[Invited Talk]
QoE Assessment Technologies for Telecommunication Services and Their Applications Takanori Hayashi (NTT) IN2014-94 |
The rapid spread in the use of mobile terminals such as smartphones has accelerated the speed of evolution of telecommun... [more] |
IN2014-94 pp.17-22 |
IA, IN (Joint) |
2014-12-18 16:45 |
Hiroshima |
Hiroshima City University |
[Invited Talk]
Building SDN Controller for WAN: A brief introduction to ONOS and ODENOS Masayoshi Kobayashi (NEC) IA2014-73 |
[more] |
IA2014-73 pp.25-29 |
IA, IN (Joint) |
2014-12-19 10:15 |
Hiroshima |
Hiroshima City University |
Time-shift traffic control for preventing network congestion Kunihiko Toumura, Keiko Ohkubo (Hitachi) IA2014-74 |
To cope with a rapid increase of mobile network traffic,
network providers are in need of efficient usage of limited
n... [more] |
IA2014-74 pp.31-36 |
IA, IN (Joint) |
2014-12-19 10:40 |
Hiroshima |
Hiroshima City University |
Design and evaluation of Earliest Deadline First with Reneging packet scheduler
-- Toward Latency AWare INternet -- Katsushi Kobayashi (Univ. of Tokyo) IA2014-75 |
The lack of latency support framework in existing Internet causes problems that high end-to-end latencies degrade custom... [more] |
IA2014-75 pp.37-42 |
IA, IN (Joint) |
2014-12-19 11:05 |
Hiroshima |
Hiroshima City University |
A method of dynamic route selection for searching disaster victims with unmanned aerial vehicle Yoshihiro Ryugo, Kenji Ohira, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) IA2014-76 |
In a disaster situation, it is difficult to investigate the damage situation from the ground due to the failure of infra... [more] |
IA2014-76 pp.43-48 |
IA, IN (Joint) |
2014-12-19 11:30 |
Hiroshima |
Hiroshima City University |
The Architecture of Delay Tolerant Networking over the Internet Masataka Ohta (Tokyo Inst. of Tech.) IA2014-77 |
Not to mention Interplanetary communication, UUCP network is DTN, from history of which, we can recognize how DTN over t... [more] |
IA2014-77 pp.49-50 |
IA, IN (Joint) |
2014-12-19 13:00 |
Hiroshima |
Hiroshima City University |
[Invited Talk]
Network Neutrality and Quality of Broadband
-- An Economic Perspective -- Toshiya Jitsuzumi (Kyushu Univ.) IA2014-78 |
The network neutrality issue is nothing but how to allocate scarce network resources when we face a tremendous increase ... [more] |
IA2014-78 pp.51-56 |
IA, IN (Joint) |
2014-12-19 13:55 |
Hiroshima |
Hiroshima City University |
Address Control and Management of the IPv6 Security Enhanced Communication Architecture (Unified Multiplex) Hiroshi Kitamura (NEC), Shingo Ata (Osaka City Univ), Masayuki Murata (Osaka Univ) IN2014-95 |
IPv6 has huge wide address space. By utilizing this good feature, we can easily emphasize the security of IPv6 communica... [more] |
IN2014-95 pp.23-28 |
IA, IN (Joint) |
2014-12-19 14:20 |
Hiroshima |
Hiroshima City University |
Traffic Classification on Mobile Network Considering Various Types of Network Traffic Flow Masaki Suzuki, Masafumi Watari, Shigehiro Ano (KDDI Labs.), Masato Tsuru (Kyutech) IN2014-96 |
The amount of mobile traffic data has been increasing in the recent years since the smartphones have become widely used ... [more] |
IN2014-96 pp.29-34 |
IA, IN (Joint) |
2014-12-19 14:45 |
Hiroshima |
Hiroshima City University |
A new method for constructing Dynamic VPN using PKI certificate authentication and OpenFlow control Joong Sun Lee, Takashi Obi, Hiroyuki Suzuki, Kazushige Fujita, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) IN2014-97 |
With increasing demand for the protection of personal information on the network, high level security measures is requir... [more] |
IN2014-97 pp.35-39 |