Thu, May 13 PM 13:00 - 14:15 |
(1) ICM |
13:00-13:25 |
Effective Method to Detect Degraded End-to-End Path for Quality Monitoring on IP Based Wide Area Network |
Kimiyoshi Yamazaki, Takaharu Omi, Hirokazu Kawahara, Takahiro Sugimoto, Atsunobu Narita (NTT COMWARE) |
(2) ICM |
13:25-13:50 |
A Location Information Loss Reduction Method in a Bird Monitoring System |
Takehiro Kajita, Kenichi Mase (Niigata Univ.) |
(3) ICM |
13:50-14:15 |
Challenges to "Location Free" of Distributed Data Driven Architecture (D3A)
-- A study on macroscale disaster recovery -- |
Yasuhiro Takeuchi (DOCOMO Technology), Hironao Tamura, Kazuhide Takahashi (NTT DOCOMO), Kazuhisa Yoshimura, Yoshiyuki Suzuki (DOCOMO Technology) |
|
14:15-14:25 |
Break ( 10 min. ) |
Thu, May 13 PM 14:25 - 16:40 |
(4) |
14:25-14:50 |
|
(5) |
14:50-15:15 |
|
(6) |
15:15-15:40 |
|
|
15:40-15:50 |
Break ( 10 min. ) |
(7) |
15:50-16:15 |
|
(8) |
16:15-16:40 |
Detection of Host Name Harvesting Attack in PTR Resource Record Based DNS Query Packet Traffic
○Yasuo Musashi・Dennis Arturo Ludena Roman・hinichiro Kubota・Kenichi Sugitani (Kumamoto University) |
|
16:40-16:55 |
Break ( 15 min. ) |
Thu, May 13 PM 16:55 - 17:45 |
(9) ICM |
16:55-17:45 |
[Invited Talk]
Research Directions for New-Generation Network
-- Five Target Networks and Management -- |
Toshiaki Suzuki (NICT) |
Fri, May 14 AM 09:30 - 10:45 |
(10) |
09:30-09:55 |
|
(11) |
09:55-10:20 |
|
(12) |
10:20-10:45 |
|
|
10:45-10:55 |
Break ( 10 min. ) |
Fri, May 14 AM 10:55 - 12:10 |
(13) ICM |
10:55-11:20 |
A proposal of L2 loop detection method with path-marking technique |
Satoshi Narikawa, Kazuhiro Okura, Hiroshi Uno (NTT) |
(14) ICM |
11:20-11:45 |
Optimization leading flow route for protocol monitoring method with flow control |
Naoki Tateishi, Taku Kihara, Saburo Seto, Hikaru Seshake (NTT) |
(15) ICM |
11:45-12:10 |
Displaying Network Topology by Hierarchical Layout Method |
Yuichi Sakuraba, Hajime Kawamata (Yokogawa) |