Thu, Feb 29 AM IN1 (B2) 09:20 - 10:35 |
(1) IN |
09:20-09:45 |
Cross organizational data distribution and federation method considering data governance |
Masataka Mizukoshi, Kei Omura, Yoshihito Oshima (NTT) |
(2) IN |
09:45-10:10 |
Communication cost and performance evaluation of each learning method in Federated learning with LLM |
Takumi Fukami, Yusuke Yamasaki, Iifan Tyou (NTT) |
(3) IN |
10:10-10:35 |
Analysis of Wireless Link for Mobile Communication Devices Using a Machine Learning Model |
Yuki Kanto, Kohei Watabe (Nagaoka Univ. of Tech.) |
|
10:35-10:45 |
Break ( 10 min. ) |
Thu, Feb 29 AM IN4 (B2) 10:45 - 12:00 |
(4) IN |
10:45-11:10 |
Mobility Control for optimal Location for high Communication Quality of Intra and Inter Body Area Networks |
Jihyeok Yang (Nagoya Univ.), Kobayashi Takumi, Anzai Daisuke (NITech), Tutomu Murase (Nagoya Univ.) |
(5) IN |
11:10-11:35 |
Throughput Measurement by Real Machines in IEEE 802.11ah with Wi-Fi Ad-Hoc Network for High Speed Forest Networks |
Kotaro Inaoka, Tutomu Murase (Nagoya Univ.) |
(6) IN |
11:35-12:00 |
AP Cooperative Mobility Control for Individual Terminal Traffic Intensity in Infrastructural Ad Hoc Network |
Jingcheng Huang, Tutomu Murase (Nagoya Univ..) |
|
12:00-13:00 |
Break ( 60 min. ) |
Thu, Feb 29 AM IN2 (B3) 09:20 - 10:35 |
(7) IN |
09:20-09:45 |
Shorter Multiple Wireless Multihop Transmission Routes Providing Concurrent Forwarding of Data Messages |
Shota Yokoyama, Shintaro Okazaki, Hiroaki Higaki (Tokyo Denki Univ.) |
(8) IN |
09:45-10:10 |
Estimation of Neighbor Relation between Sensor Nodes based on Estimation of Commonly Observed Events |
Yuta Murai, Katsuhiro Nagano, Hiroaki Higaki (Tokyo Denki Univ.) |
(9) IN |
10:10-10:35 |
Stochastic Geometry-based Transmission Power Analysis and Optimization for UAV Altitude in U2U in Inhomogeneous UAV Density |
Soma Shimizu, Takeshi Hirai, Naoki Wakamiya (Osaka Univ) |
|
10:35-10:45 |
Break ( 10 min. ) |
Thu, Feb 29 AM IN5 (B3) 10:45 - 12:00 |
(10) IN |
10:45-11:10 |
Routing and Scheduling Algorithm in Combined Ride-Share and Delivery Service |
Koki Adachi, Hiroyoshi Miwa (Kwansei Gakuin Univ.) |
(11) IN |
11:10-11:35 |
An On-Demand Transportation Service with an Optimized Scheduling Algorithm As an Alternative to Personal Vehicles |
Sato Kamimura, Hiroyoshi Miwa (Kwansei Gakuin Univ.) |
(12) IN |
11:35-12:00 |
Continuous Input Character Recognition Algorithm for Aerial Handwriting Input Interface in Mobile Communication Terminals |
Riho Tanano, Hiroyoshi Miwa (Kwansei Gakuin Univ.) |
|
12:00-13:00 |
Break ( 60 min. ) |
Thu, Feb 29 AM IN3 (B4) 09:20 - 10:35 |
(13) IN |
09:20-09:45 |
A Study on Dynamic TCP Proxy Mechanism Based on Measurement of Packet Loss Rate |
Atsuki Hata, Hiroyasu Obata, Chisa Takano (Hiroshima City Univ.) |
(14) IN |
09:45-10:10 |
Performance Evaluation of Wireless Media Access Control V-SP-MAC Considering Mobility of Terminals |
Akito Muramoto, Hiroyasu Obata, Chisa Takano (Hiroshima City Univ.) |
(15) IN |
10:10-10:35 |
A Study on Detection of Flaming in SNS Video using Sentiment Analysis and Principal Component Analysis |
Tomonori Taniguchi, Hiroyasu Obata, Chisa Takano (Hiroshima City Univ.) |
|
10:35-10:45 |
Break ( 10 min. ) |
Thu, Feb 29 AM IN6 (B4) 10:45 - 11:35 |
(16) IN |
10:45-11:10 |
An Experimental Study of Noise-Induced Phase Synchronization Among Independent Oscillators for Platoon-Based Cooperative Sensing |
Akihiro Miura, Yukio Ogawa, Mianxiong Dong, Kaoru Ota (Muroran-IT) |
(17) IN |
11:10-11:35 |
Development of a Blockchain-Based One-Time-Password Authentication System for Drone Operators |
Shotaro Waseda, Yukio Ogawa, Mianxiong Dong, Kaoru Ota (Muroran-IT) |
|
11:35-13:00 |
Break ( 85 min. ) |
Thu, Feb 29 AM NS1 (B5) 09:20 - 10:35 |
(18) NS |
09:20-09:45 |
Performance Improvement and Traceability Validation of Service Mesh based C-plane for Robust 5GC |
Kenji Kanai (UTokyo), Shiku Hirai (NTT), Akihiro Nakao (UTokyo) |
(19) NS |
09:45-10:10 |
A Cross-layer Link Adaptation Method for Application-specific Communication Performance Optimization in High-frequency Wireless Communication |
Koki Horita, Kenji Kanai, Akihiro Nakao (UTokyo) |
(20) NS |
10:10-10:35 |
Cross Layer TCP Congestion Control for Integrating Local 5G and Low Earth Orbit Satellite Communications |
Akane Suzuki, Kenji Kanai, Akihiro Nakao (UTokyo) |
|
10:35-10:45 |
Break ( 10 min. ) |
Thu, Feb 29 AM NS5 (B5) 10:45 - 12:00 |
(21) NS |
10:45-11:10 |
Communication Characteristic Evaluations of Underwater Wireless Optical Communication and Maritime Local 5G for Coverage Extension |
Ryuto Fukuma, Kenji Kanai, Akihiro Nakao (UTokyo) |
(22) NS |
11:10-11:35 |
Evaluation of wide-area wearable sensing method applying 5G Sidelink |
Makoto Nomura, Kenji Kanai, Akihiro Nakao (UTokyo) |
(23) NS |
11:35-12:00 |
Evaluation of Delay Characteristics for Remote Control via Wi-Fi and Local 5G |
Kenshiro Ebisu, Kenji Kanai, Akihiro Nakao (UTokyo) |
|
12:00-13:00 |
Break ( 60 min. ) |
Thu, Feb 29 AM NS2 (B6) 09:20 - 10:35 |
(24) NS |
09:20-09:45 |
A Programmable Switch-based CCN Traffic Generator for Evaluating Tbps-class Cache Performance |
Yusuke Endo, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) |
(25) NS |
09:45-10:10 |
A Study on Congestion Control for Cache-enabled ICN Networks |
Takumi Sasaki, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) |
(26) NS |
10:10-10:35 |
Performance Evaluation of Efficient Bloom Filter-based Routing Schemes in ICN |
Taketo Yasuyama (Univ. of Kitakyushu), Mikiya Yoshida (Okayama Univ.), Yusuke Ito, Hiroyuki Koga (Univ. of Kitakyushu) |
|
10:35-10:45 |
Break ( 10 min. ) |
Thu, Feb 29 AM NS6 (B6) 10:45 - 12:00 |
(27) NS |
10:45-11:10 |
A Study on Cashing and Routing Strategies with Direction of Vehicle etc. in Vehicular Contents Centric Networking |
Sora Takei, Ryoichi Kawahara (Toyo Univ.) |
(28) NS |
11:10-11:35 |
Frequency Attack Evaluation for Access Control with Privacy Preservation in Named Data Networking |
Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) |
(29) NS |
11:35-12:00 |
High-speed Anonymous Communication on Programmable Switches Defeating Active De-anonymization Attacks |
Yutaro Yoshinaka, Mio Kochiyama, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) |
|
12:00-13:00 |
Break ( 60 min. ) |
Thu, Feb 29 AM NS3 (B7) 09:20 - 10:35 |
(30) NS |
09:20-09:45 |
Incentive Mechanism with Subsidy in Cross-Silo Federated Learning |
Shota Miyagoshi, Takuji Tachibana (Univ. Fukui) |
(31) NS |
09:45-10:10 |
Performance evaluation of optimal data processing server placement for Federated Learning |
Ryu Kato, Momoka Okuma, Ryoichi Kawahara (Toyo Univ.), Kengo Tajiri (NTT) |
(32) NS |
10:10-10:35 |
Model Shifting Method in Federated Learning Using Distillation |
Hiromichi Yajima (SIT), Shota Ono (The Univ. of Tokyo), Takumi Miyoshi, Taku Yamazaki (SIT) |
|
10:35-10:45 |
Break ( 10 min. ) |
Thu, Feb 29 AM NS7 (B7) 10:45 - 12:00 |
(33) NS |
10:45-11:10 |
Proposal of a Data Leakage Attack against a Vertical Federated Learning System based on Knowledge Distillation |
Takumi Suimon, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) |
(34) NS |
11:10-11:35 |
An unsupervised online learning-based traffic classification and anomaly detection method for 5G-IIoT systems |
Yuxuan Shi, Qianqian Pan, Akihiro Nakao (U Tokyo) |
(35) NS |
11:35-12:00 |
Real-time Application Identification Scheme and Evaluation Method Using Machine Learning |
Tatsuhiro Ou, Kenji Kanai, Akihiro Nakao (Tokyo Univ.) |
|
12:00-13:00 |
Break ( 60 min. ) |
Thu, Feb 29 AM NS4 (A2) 09:20 - 10:35 |
(36) NS |
09:20-09:45 |
Intrusion Detection System Based on Federated Decision Trees |
Naoto Watanabe, Taku Yamazaki, Takumi Miyoshi (Shibaura Inst. Tech.), Masataka Nakahara, Norihiro Okui, Ayumu Kubota (KDDI Research) |
(37) NS |
09:45-10:10 |
Performance Comparison of Raspbian and LineageOS on Raspberry Pi Hardware |
Toshihiro Matsuda, Kien Nguyen, Hiroo Sekiya (Chiba Univ.) |
(38) NS |
10:10-10:35 |
Multimodal Object Recognition Method Using Bayesian Attractor Model For 3D Point Clouds and RGB Images |
Haruhito Ando, Daichi Kominami, Ryoga Seki, Masayuki Murata, Hideyuki Shimonishi (Osaka Univ.) |
|
10:35-10:45 |
Break ( 10 min. ) |
Thu, Feb 29 AM NS8 (A2) 10:45 - 12:00 |
(39) NS |
10:45-11:10 |
A privacy protection mechanism using Bloom Filter for a P2P-based tracking system watching over children |
Yuki Matsumoto, Akihiro Fujimoto (Wakayama Univ), Hideki Tode (Osaka Metropolitan Univ) |
(40) NS |
11:10-11:35 |
The Trend in Service Identification based on SNIs for TLS1.3 |
Ryo Asaoka (Kogakuin Univ.), Akihiro Nakao (University of Tokyo), Masato Oguchi (Ochanomizu University), Saneyasu Yamaguchi (Kogakuin Univ.) |
(41) NS |
11:35-12:00 |
Identification Method of Vulnerable Target Areas for Crossfire Attacks |
Tianyu Wang, Noriaki Kamiyama (Ritsumeikan Univ.) |
|
12:00-13:00 |
Break ( 60 min. ) |
Thu, Feb 29 PM 40th IN/NS workshop 13:00 - 18:00 |
|
- |
|
Fri, Mar 1 AM IN7 (B2) 09:20 - 10:35 |
(42) IN |
09:20-09:45 |
Stochastic process of broadcast communications between validator nodes in Byzantine Fault Tolerant Consensus Blockchains |
Akihiro Fujihara (CIT) |
(43) IN |
09:45-10:10 |
Impact of repost of opposing information on opinion polarization |
Naoki Hirakura (Toyama Prefectural Univ.) |
(44) IN |
10:10-10:35 |
Simulation Evaluations of a Dynamic Convoy Forming Method Using Real Map Data |
Koya Mitsuhira, Shinji Inoue, Tomoyuki Ohta (Hiroshima City Univ.) |
|
10:35-10:45 |
Break ( 10 min. ) |
Fri, Mar 1 AM IN10 (B2) 10:45 - 12:00 |
(45) IN |
10:45-11:10 |
Weighted Harmonic Mean Method based on RTT Difference in TCP Flows for Wi-Fi AP Selection by User Cooperative Mobility |
Naoyuki Ito, Yohei Hasegawa (Nagoya Univ.), Hiroyasu Obata (Hiroshima City Univ.), Tutomu Murase (Nagoya Univ.) |
(46) IN |
11:10-11:35 |
VM Migration Control considering Terminal Location in Multi-stage Information Processing System |
Hayato Umeki, Kazutoshi Nakane (Nagoya Univ.), Yukinobu Hukushima (Okayama Univ.), Celimuge Wu (The University of Electro-Communications), Yusheng JI (National Institute of Informatics), Tutomu Murase (Nagoya Univ.) |
(47) IN |
11:35-12:00 |
Application of a Deep Reinforcement Learning Algorithm to Virtual Machine Migration Control in Multi-Stage Information Processing Systems |
Yuki Kojitani (Okayama Univ.), Kazutoshi Nakane (Nagoya Univ.), Yuya Tarutani (Okayama Univ.), Celimuge Wu (UEC), Yusheng Ji (NII), Tokumi Yokohira (Okayama Univ.), Tutomu Murase (Nagoya Univ.), Yukinobu Fukushima (Okayama Univ.) |
|
12:00-13:00 |
Break ( 60 min. ) |
Fri, Mar 1 AM IN8 (B3) 09:20 - 10:35 |
(48) IN |
09:20-09:45 |
Asynchronous UDP Random Walk method with path reuse for geo-distributed graph analysis |
Shun Takizawa, Tsuyoshi Yamashita, Kunitake Kaneko (Keio Univ.) |
(49) IN |
09:45-10:10 |
Graph reduction method focusing on random walk transition probability for discovering latent important vertices using graph connections |
Kaito Miyakoshi, Tsuyoshi Yamashita, Kunitake Kaneko (Keio Univ.) |
(50) IN |
10:10-10:35 |
A Performance Evaluation of Graph Cutting Methods that Maintain the Shortest Paths in Internet Topology |
Masatoshi Enomoto (YCC), Ken-ichi Chinen (TMCIT) |
|
10:35-10:45 |
Break ( 10 min. ) |
Fri, Mar 1 AM IN11 (B3) 10:45 - 12:00 |
(51) IN |
10:45-11:10 |
Early Detection of User Dynamics Overheating Through Frequency Analysis of Time Series Data |
Masaki Aida, Mayu Hariu, Kazuki Nakajima (Tokyo Metropolitan Univ.) |
(52) IN |
11:10-11:35 |
Random walk sampling on hypergraphs |
Masanao Kodakari, Kazuki Nakajima, Masaki Aida (Tokyo Metropolitan) |
(53) IN |
11:35-12:00 |
Salience based Function Placement Method for Network Slices on Terrestrial and Non-Terrestrial Integrated Networks |
Takahiro Hirayama, Masahiro Jibiki (NICT) |
|
12:00-13:00 |
Break ( 60 min. ) |
Fri, Mar 1 AM IN9 (B4) 09:20 - 10:35 |
(54) IN |
09:20-09:45 |
Power Consumption Optimization Method Adaptable to Network Bandwidth Fluctuation for Distributed Video Analysis System based on Gene Regulatory Network |
Seishiro Inoue, Masaaki Yamauchi, Daichi Kominami, Hideyuki Shimonishi, Masayuki Murata (Osaka Univ.) |
(55) IN |
09:45-10:10 |
Performance evaluation of remote memory utilization method in disaggregated micro data center |
Akishige Ikoma, Yuichi Ohsita, Masashi Sorimachi, Masayuki Murata (Osaka Univ.) |
(56) IN |
10:10-10:35 |
Simulator of communication between resources for evaluation of network structure in a disaggregated micro data center |
Akishige Ikoma, Yuichi Oshita, Masayuki Murata (Osaka Univ.) |
|
10:35-10:45 |
Break ( 10 min. ) |
Fri, Mar 1 AM IN12 (B4) 10:45 - 12:00 |
(57) IN |
10:45-11:10 |
The Impact of Network Quality on Video Transmission Using 802.11ah |
Homare Sakurai, Yoshiko Sueda (Meisei Univ.), Koike Arata (Tokyo Kasei Univ.) |
(58) IN |
11:10-11:35 |
Estimation of salivary secretion volume using near-infrared spectroscopy |
Ryosuke Tsukagoshi, Yoshiko Sueda (Meisei Univ.) |
(59) IN |
11:35-12:00 |
Terminal-Driven Handover for Wireless Systems: A Multi-Layered Recovery Method in Surrounding Cells |
Toshikazu Nishimura (Ritsumeikan Univ.) |
|
12:00-13:00 |
Break ( 60 min. ) |
Fri, Mar 1 AM NS9 (B5) 09:20 - 10:35 |
(60) NS |
09:20-09:45 |
Block Group Distribution Methods that Ensure Persistence in Blockchain |
Fumiya Wakinaka, Takeshi Ogawa (TDU) |
(61) NS |
09:45-10:10 |
Novel blockchain consensus building method requiring no staking, representative selection nor voting-only messages |
Hitomi Yazawa, Takeshi Ogawa (TDU) |
(62) NS |
10:10-10:35 |
On Game Theoretic Mining Task Offloading in Decentralized Applications |
Kota Yamada, Takanori Hara, Shoji Kasahara (NAIST) |
|
10:35-10:45 |
Break ( 10 min. ) |
Fri, Mar 1 AM NS13 (B5) 10:45 - 12:00 |
(63) NS |
10:45-11:10 |
A Comprehensive Analysis of Handshake as a Blockchain-based DNS |
Katsuki Isobe, Daishi Kondo, Hideki Tode (OMU) |
(64) NS |
11:10-11:35 |
Blockchain-based malicious node detection and defense method for potential-based routing |
Kanato Otsu (Osaka Univ.), Naomi Kuze (Wakayama Univ.) |
(65) NS |
11:35-12:00 |
Proposal of Hierarchical Cross Shard Transaction Management with Smart Contracts |
Hiroshi Matsuura, Takayuki Fujii (NTT) |
|
12:00-13:00 |
Break ( 60 min. ) |
Fri, Mar 1 AM NS10 (B6) 09:20 - 10:35 |
(66) NS |
09:20-09:45 |
A Configuration Method for Wireless Sensor Networks with Mobile Sink Using Particle Swarm Optimization |
Sousuke Aramaki, Masami Yoshida, Taku Noguchi (Ritsumeikan Univ) |
(67) NS |
09:45-10:10 |
Distributed UAV Deployment Method for Jamming Avoidance |
Fumiki Yamashita (Osaka Univ.), Naomi Kuze (Wakayama Univ.) |
(68) NS |
10:10-10:35 |
A method to improve fairness among LoRaWAN networks taking inspiration from biological symbiosis between different species |
Naoki Enomoto, Naoki Wakamiya (Osaka Univ.) |
|
10:35-10:45 |
Break ( 10 min. ) |
Fri, Mar 1 AM NS14 (B6) 10:45 - 12:00 |
(69) NS |
10:45-11:10 |
Network routing control algorithm combining waiting and rerouting of packets in challenged communication environment |
Kyohei Higashiyama, Hiroyoshi Miwa (Kwansei Gakuin Univ.) |
(70) NS |
11:10-11:35 |
Performance evaluation of wake-up control for top-k query in multi-hop wireless sensor networks |
Takuya Murakami (Kansai Univ.), Junya Shiraishi (Aalborg Univ.), Hiroyuki Yomo (Kansai Univ.) |
(71) NS |
11:35-12:00 |
A wake-up control for energy-efficient data collections from wireless sensors with common observations |
Nanako Ikeda, Hiroyuki Yomo (Kansai Univ.) |
|
12:00-13:00 |
Break ( 60 min. ) |
Fri, Mar 1 AM NS11 (B7) 09:20 - 10:35 |
(72) NS |
09:20-09:45 |
Autonomous Decentralized Mobile System Focusing on Resilience |
Hiroki Watanabe, Keiichi Shima, Katsuhiro Horiba (SB) |
(73) NS |
09:45-10:10 |
Distributed AAA in an Autonomous Distributed Mobile System Environment |
Atsuki Takata (JAIST), Hiroki Watanabe, Keiichi Shima, Horiba Katsuhiro (SBKK), Satoshi Uda, Yoichi Shinoda (JAIST) |
(74) NS |
10:10-10:35 |
Flexible Cross-layer Communication Quality Control for Software Defined Local5G |
Akihiro Nakao (UTokyo) |
|
10:35-10:45 |
Break ( 10 min. ) |
Fri, Mar 1 AM NS15 (B7) 10:45 - 12:00 |
(75) NS |
10:45-11:10 |
ECN Congestion Control with Gradient of Queue Length for Inter-Datacenter Gateway Proxy |
Keita Aoki, Miki Yamamoto (Kansai Univ.) |
(76) NS |
11:10-11:35 |
A Study on QoS Control with Differentiated ECN |
Kai Sakamoto (Kansai Univ.), Yusaku Hayamizu (NICT), Miki Yamamoto (Kansai Univ.) |
(77) NS |
11:35-12:00 |
Evaluation for effectiveness of time precision in a packet monitoring system |
Daichi Muramatsu, Ayaka Doi, Daigo Deguchi (Daido Univ), Takashi Kurimoto (NII), Hiroyuki Kimiyama (Daido Univ) |
|
12:00-13:00 |
Break ( 60 min. ) |
Fri, Mar 1 AM NS12 (A2) 09:20 - 10:35 |
(78) NS |
09:20-09:45 |
Computing Node Selection Method for Sensing Data Analysis in End-Cloud Environments |
Tatsuya Ueda, Daishi Kondo, Yosuke Tanigawa, Hideki Tode (Osaka Metropolitan Univ.) |
(79) NS |
09:45-10:10 |
A Hop Count Reduction Method Using Helper Nodes in RangeKey Skip Graphs Robust to Data Changes |
Motoki Kurita, Akihiro Fujimoto (Wakayama Univ.), Hideki Tode (Osaka Metropolitan Univ.) |
(80) NS |
10:10-10:35 |
Hierarchical Piece Distribution Method for Cooperative Group Formed within Wireless LANs in BitTorrent |
Mikiya Senso, Akihiro Fujimoto (Wakayama Univ.), Hideki Tode (Osaka Metropolitan Univ.) |
|
10:35-10:45 |
Break ( 10 min. ) |
Fri, Mar 1 AM NS16 (A2) 10:45 - 12:00 |
(81) NS |
10:45-11:10 |
Dynamic Network Slicing Control Method for 5G Mobile Network using Quality-Diversity Algorithms |
Amato Otsuki, Daichi Kominami, Tatsuya Otoshi, Hideyuki Shimonishi, Masayuki Murata (Osaka Univ.) |
(82) NS |
11:10-11:35 |
5G Network Slicing using APN for Low Latency and Low Jitter Communications |
Ryuta Yajima, Kenji Kanai, Akihiro Nakao (The Univ. of Tokyo) |
(83) NS |
11:35-12:00 |
Dynamic Control Method for Establishing Secure Long-haul End-to-End Network Slicing |
Fatou S Secka, Kenji Kanai, Akihiro Nakao (Utokyo) |
|
12:00-13:00 |
Break ( 60 min. ) |
Fri, Mar 1 PM IN13 (B2) 13:00 - 15:05 |
(84) IN |
13:00-13:25 |
Method to reduce imbalance charges for electricity retailers using EVs, aiming to balance the interests of both electricity retailers and EV users |
Takato Ieki, Mayuko Omichi, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) |
(85) IN |
13:25-13:50 |
Basic Evaluation of MECM2M, A M2M System Infrastructure Considering Mobile Nodes as Computing Servers |
Rempei Sawada, Haruto Takano, Kosuke Mori, Fumio Teraoka (Keio Univ.) |
(86) IN |
13:50-14:15 |
Extension of Video Service Identification Method OLIViS to OTT Services |
Yuki Tamura, Fumio Teraoka (Keio Univ.), Takao Kondo (Hokkaido Univ.) |
(87) IN |
14:15-14:40 |
A Study of Power Consumption Reduction by Dynamic Hardware Offload in Virtualized Base Stations |
Riichiro Nagareda, Chikara Sasaki, Atsushi Tagami (KDDI Research), Tomohiro Otani (KDDI) |
(88) IN |
14:40-15:05 |
Per C-V2X Service Basis Communication Control Method According to the Expected Maximum Bitrate of PDU Session |
Tetsu Joh (KDDI Research), Takeshi Kitahara, Tomohiro Otani (KDDI) |
|
15:05-15:40 |
Break ( 35 min. ) |
Fri, Mar 1 PM IN award ceremony (B2) 15:40 - 16:00 |
|
- |
■IN award ceremony |
Fri, Mar 1 PM IN14 (B3) 13:00 - 15:05 |
(89) IN |
13:00-13:25 |
Algorithm for visualization of 3D network structure of capillaries in liver |
Soichiro Araki, Hiroyoshi Miwa, Hiroto Shoji (Kwansei Gakuin Univ.) |
(90) IN |
13:25-13:50 |
Approximation method by block of three-dimensional object for data reduction |
Yuya Aono, Hiroyoshi Miwa (Kwansei Gakuin Univ.) |
(91) IN |
13:50-14:15 |
Automatic generation of three-dimensional model with reduced data size based on point cloud data measurement |
Takahiro Mizuchi, Hiroyoshi Miwa (Kwansei Gakuin Univ.) |
(92) IN |
14:15-14:40 |
Locating method using collective intelligence by image recognition of specific objects |
Shogo Ishimaru, Hiroyoshi Miwa (Kwansei Gakuin Univ.) |
(93) IN |
14:40-15:05 |
3D indoor location estimation method using BLE beacons |
Namito Shimokawa, Ken-ichi Baba (Kogakuin Univ.) |
Fri, Mar 1 PM IN15 (B4) 13:00 - 14:40 |
(94) IN |
13:00-13:25 |
Interest Packet Forwarding Scheme by MPR Set with Movement Prediction in CCN-based MANETs |
Haruya Matsumoto, Masaki Hanada (Tokyo Univ. of information Sciences) |
(95) IN |
13:25-13:50 |
Cache Decision Policy Considering Node Movement in CCN-based MANETs |
Miharu Tsuge, Masaki Hanada (Tokyo Univ. of information Siences) |
(96) IN |
13:50-14:15 |
Evaluation experiment on a route server function for maintaining dynamic routes in metabolic routers |
Yuya Suga, Hiroki Saruta, Rei Ishioka, Junichi Murayama (Tokai Univ.) |
(97) IN |
14:15-14:40 |
A centralized control scheme of router switching for suppressing malware spreading within a metabolic router |
Rei Ishioka, Yuya Suga, Junichi Murayama (Tokai Univ.) |
Fri, Mar 1 PM NS17 (B5) 13:00 - 14:40 |
(98) NS |
13:00-13:25 |
Experimental comparison of Multi-hop channels and Relayer Aggrigation in inter-blockchain communication time |
Takaaki Yanagihara, Akihiro Fujihara (CIT) |
(99) NS |
13:25-13:50 |
Evaluation and Analysis of Two Types of Attacks CPA and DDoS Targeting CDN caches |
Jiaqi Liu, Noriaki Kamiyama (Ritsumeikan Univ) |
(100) NS |
13:50-14:15 |
Two-Level Detection Method of DDoS Attack Mimicking CDN Caches |
Kazuya Taniguchi, Noriaki Kamiyama (Ritsumeikan Univ) |
(101) NS |
14:15-14:40 |
Content Recommendation System Considering Cache State |
Yuto Murakami, Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ) |
|
14:40-14:50 |
Break ( 10 min. ) |
Fri, Mar 1 PM NS21 (B5) 14:50 - 16:05 |
(102) NS |
14:50-15:15 |
Real space sharing processing multihop networks |
Akira Tanaka (NIT, Tokyo College), Mitsuru Maruyama (KAIT), Shigeo Urushidani (NII), Toshiaki Tsujii (OMU) |
(103) NS |
15:15-15:40 |
8K-3D video handling system using SRv6 inline service chaining |
Taisei Tanabe, Yuma Ito (KAIT), Wataru Mishima, Yuta Fukagawa (NTT Communications), Shigeo Urushidani, Takashi Kurimoto, Naoya Kitagawa (NII), Yasuhiro Ohara, Katsuhiro Sebayashi, Mitsuru Maruyama (KAIT) |
(104) NS |
15:40-16:05 |
Analysis of Transmission Delay Jitter in C-V2X Sidelink Communication |
Kosuke Sanada, Hiroyuki Hartano, Kazuo Mori (Mie Univ.) |
Fri, Mar 1 PM NS18 (B6) 13:00 - 14:40 |
(105) NS |
13:00-13:25 |
A LiDAR-Based Dynamic Wide Area Map Generation Method for VANETs |
Sho Ibuki, Masami Yoshida, Taku Noguchi (Ritsumeikan Univ.) |
(106) NS |
13:25-13:50 |
DDoS Attack Evaluation Against Tele-Operated Driving System in 5G MEC Scenarios |
Masato Osumi, Daishi Kondo, Hideki Tode (OMU) |
(107) NS |
13:50-14:15 |
Performance Evaluation of QUIC via Mobile Networks under Vehicle Driving Environment |
Masatoshi Saitoh (Toyota Motor Corp.), Takayuki Kamei, Masaru Takagi, Taito Nishio (NTT Com), Katsunori Takahashi (Toyota Motor Corp.) |
(108) NS |
14:15-14:40 |
A Study of MPQUIC Packet Scheduler Based on Unacknowledged Time for Remote Monitoring of Autonomous Driving |
Hiroki Iwasawa, Seiya Komatsu, Taichi Kawano, Takuya Tojo (NTT) |
|
14:40-14:50 |
Break ( 10 min. ) |
Fri, Mar 1 PM NS22 (B6) 14:50 - 16:05 |
(109) NS |
14:50-15:15 |
Impact of DNS-Based Authentication of Named Entities Deployment on Web Performance |
Kota Yagi (Osaka Prefecture Univ.), Katsuki Isobe, Daishi Kondo, Hideki Tode (Osaka Metropolitan Univ.) |
(110) NS |
15:15-15:40 |
Virtualized Network Graph Design and Embedding with Fault Tolerance |
Takehiro Sato (Kyoto Univ.), Takashi Kurimoto, Shigeo Urushidani (NII), Eiji Oki (Kyoto Univ.) |
(111) NS |
15:40-16:05 |
Polynomial Time Approximation Algorithm for Fragment-Resistant Network Design Problem with Node Protection |
Sumihiro Yoneyama, Hiroyoshi Miwa (Kwansei Gakuin Univ.) |
Fri, Mar 1 PM NS19 (B7) 13:00 - 14:40 |
(112) NS |
13:00-13:25 |
A Study on Deadline Scheduling Scheme Based on Adaptive Feedback in Distributed Edge Computing |
Atsushi Yoshii, Yusuke Ito, Hiroyuki Koga (Univ. of Kitakyushu) |
(113) NS |
13:25-13:50 |
An automatic optimal placement system for applications in MEC environment |
Mudai Kobayashi, Mohammad Mikal Bin Amrul Halim Gan, Takahisa Seki (SoftBank), Takahiro Hirofuchi, Ryousei Takano, Mitsuhiro Kishimoto (AIST) |
(114) NS |
13:50-14:15 |
Performance Evaluation of Flow Update Model Considering Probability Distribution of Migration Time in Software-defined Network |
Reo Uneyama, Takehiro Sato, Eiji Oki (Kyoto Univ.) |
(115) NS |
14:15-14:40 |
Ransomware Detection using Traffic Features in SDN |
Ken Tanase, Kunio Akashi, Yuji Sekiya, Hiroshi Nakamura (Tokyo Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Fri, Mar 1 PM NS23 (B7) 14:50 - 16:30 |
(116) NS |
14:50-15:15 |
Performance Evaluation of E2E and HBH Transmissions in Quantum Networks |
Haruna Kimura, Takuji Tachibana (Fukui Univ) |
(117) NS |
15:15-15:40 |
High-speed data transfer experiment on a cutting edge 1λ1.2 T bps line |
Kenjiro Yamanaka, Takashi Kurimoto, Shigeo Urushidani (NII) |
(118) NS |
15:40-16:05 |
Study of ROADM Architecture for Optical Multicasting Transmission Service |
Yuna Aoki, Sachio Suda, Soichiroh Usui, Daisaku Shimazaki (NTT) |
(119) NS |
16:05-16:30 |
Soft-failure identification and localization based on received optical signal quality and performance metrics |
Hiroshi Yamamoto, Kohei Watanabe, Hiroki Date, Daisaku Shimazaki (NTT), Yutaka Fukuchi, Hideki Maeda (Tokyo University of Science) |
Fri, Mar 1 PM NS20 (A2) 13:00 - 14:40 |
(120) NS |
13:00-13:25 |
UAV placement method with connectivity and offloading for UAV-based edge computing systems |
Hideyoshi Miura (Kansai Univ.), Tomotaka Kimura (Doshisha Univ.), Kouji Hirata (Kansai Univ.) |
(121) NS |
13:25-13:50 |
A UAV Distributed Management Method Considering Airspace Congestion and User Fairness |
Takahiko Haraguchi (Shibaura Inst. Tech.), Hiroshi Katada (Waseda Univ.), Taku Yamazaki, Takumi Miyoshi (Shibaura Inst. Tech.), Ryo Yamamoto (UEC), Kiyoshi Ueda (Nihon Univ.) |
(122) NS |
13:50-14:15 |
A Novel Boids-Based Collision Avoidance Method for Flying Objects in Drone Networks |
Ippei Toda, Masami Yoshida, Taku Noguchi (Ritsumeikan Univ.) |
(123) NS |
14:15-14:40 |
A Method for Constructing Collision Avoidance Route for Multiple Unmanned Aerial Vehicles Using AODV-Based Link Hierarchization |
Shuto Ohkawa, Kiyoshi Ueda (Nihon Univ.), Takumi Miyoshi, Taku Yamazaki (SIT), Ryo Yamamoto (UEC) |