Thu, Jan 25 PM LOIS① 13:30 - 14:35 |
|
13:30-13:35 |
Opening Address ( 5 min. ) |
(1) |
13:35-14:35 |
[Invited Talk]
Trend of Carrier data-based business, privacy protection, information law and technologies |
Hideki Yoshii (SB) |
|
14:35-14:50 |
Break ( 15 min. ) |
Thu, Jan 25 PM LOIS② 14:50 - 16:30 |
(2) |
14:50-15:15 |
Service Development Technology based on Metaverse of Things |
Toru Kobayashi, Yudai Tanaka, Atsushi Isozaki, Hiroshi Yamada, Daiki Togawa, Fukae Kazuki, Kenichi Arai (Nagasaki Univ.), Tetsuo Imai (Hiroshima city Univ.) |
(3) |
15:15-15:40 |
Considerations of Improving Worker Response Quality in Crowd Sourcing |
Honoka Tanitsu, Tatsuki Tamano, Ryuya Itano, Takahiro Koita (Doshisha Univ.) |
(4) |
15:40-16:05 |
A Study of Complementary Recommendation Focused on Functional Aspects |
Kai Sugahara, Chihiro Yamasaki, Yuma Nagi, Kazushi Okamoto (UEC) |
(5) |
16:05-16:30 |
Proposal for Self-Adaptive Websites Leveraging Large Language Models |
Sota Kataoka, Tatsuki Tamano, Ryuya Itano, Takahiro Koita (Doshisha Univ.) |
|
16:30-16:45 |
Break ( 15 min. ) |
Thu, Jan 25 PM ICM① 16:45 - 17:40 |
(6) |
16:45-17:35 |
[Invited Talk]
Activities related to providing guidance on Internet infrastructure and BGP operation technology.
-- Recommendation for using my BGP. -- |
Masayuki Okada (Univ Nagasaki), , |
|
17:35-17:40 |
Closing Address ( 5 min. ) |
Fri, Jan 26 PM ICM② 10:05 - 11:50 |
|
10:05-10:10 |
( 5 min. ) |
(7) |
10:10-10:35 |
Service Failure Detection Focusing on Simultaneous Increase in Various Types of Connection Retries in User Traffic |
Naoki Hayashi, Fumio Katayama, Naoki Tateishi, Osamu Okino, Mitsuho Tahara (NTT) |
(8) |
10:35-11:00 |
A study on determining the risk of service impact in the event of a failure in a mesh-configured network |
Mayu Yamazoe, Kazuaki Akashi, Masashi Kobayashi, Hiroaki Matsubayashi, Manami Ogawa, Kenichi Tayama (NTT) |
(9) |
11:00-11:25 |
[Encouragement Talk]
A Resource Management Method to provide Optical Transport Path on demand with Reduce Equipment Costs |
Yoshifumi Kato, Yu Miyoshi (NTT) |
(10) |
11:25-11:50 |
A VPN Method for Security Usage of Public Wireless LANs |
Hinata Tanoue, Akihiro Shimizu (Kochi Univ. of Tech.) |
|
11:50-13:10 |
Lunch Break ( 80 min. ) |
Fri, Jan 26 PM LOIS③ 13:10 - 14:25 |
(11) |
13:10-13:35 |
Study of the effectiveness of living area in personal authentication using GPS data |
Daisuke Toyama, Sunao Hara, Masanobu Abe (Okayama Univ.) |
(12) |
13:35-14:00 |
Approaches to Young Adults' Exercise Habits through Smartwatch Use and Group Dynamics
-- Introduction of Step Count Confirmation App with Encollegement Function -- |
Shgieyoshi Iizuka, Atsushi Goto (Kanagawa Univ.) |
(13) |
14:00-14:25 |
A Method for Evaluating Generalization Performance of Process Models for Analyzing Operation Logs |
Akio Watanabe, Ayumi Araragi, Hiroki Ikeuchi, Yousuke Takahashi (NTT) |
|
14:25-14:40 |
Break ( 15 min. ) |
Fri, Jan 26 PM ICM③ 14:40 - 16:30 |
(14) |
14:40-15:05 |
Proposal for how to output documents from configuration management tools |
Tomoki Sugimoto, Ichiro Morinaga, Seiji Inomata, Fumiaki Konishi, Hiromi Katayama, Shinsaku Numata (MF) |
(15) |
15:05-15:30 |
[Encouragement Talk]
A Study of Automatic Network Operation based on User's Intents
-- Digital twin of large-scale network -- |
Takamichi Nishijima, Atsushi Kitada, Kimihiko Abe, Yuta Sugiyama, Satoru Umezaki, Hiroshi Tomonaga (Fujitsu) |
(16) |
15:30-15:55 |
Proposal of scalable AI/ML technology for automated design of large information and communication systems |
Yutaka Yakuwa, Takayuki Kuroda (NEC) |
(17) |
15:55-16:20 |
Software Management using Messaging Networking |
Ryo Kondo (Nihon Univ) |
|
16:20-16:30 |
Closing Address ( 10 min. ) |