Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN |
2010-10-14 13:30 |
Aichi |
Nagoya Institute of Technology |
Study on Storage and Meta-Information Management System Using IMS/SDP Tomonori Kuzukawa (NIT), Yoshihiro Nomoto (NIT/NTT), Yutaka Ishibashi (NIT) IN2010-65 |
The authors have proposed a distributed storage video on demand (VOD) system that delivers video contents created by con... [more] |
IN2010-65 pp.1-6 |
IN |
2010-10-14 13:55 |
Aichi |
Nagoya Institute of Technology |
QoE Assessment in Networked Shooting Game with Inter-Destination Synchronization Control Yoshiaki Ida, Yutaka Ishibashi, Norishige Fukushima, Shinji Sugawara (NIT) IN2010-66 |
This report applies inter-destination (or group) synchronization control, which adjusts the output timing among multipl... [more] |
IN2010-66 pp.7-12 |
IN |
2010-10-14 14:20 |
Aichi |
Nagoya Institute of Technology |
A study of a handling method for a garbage-collection on a stateful session control server Masashi Kaneko, Hideo Nishimura, Michio Irie, Hisakazu Bessho, Masami Iio (NTT) IN2010-67 |
(Advance abstract in Japanese is available) [more] |
IN2010-67 pp.13-18 |
IN |
2010-10-14 15:00 |
Aichi |
Nagoya Institute of Technology |
[Invited Talk]
Self-Consistent Approach to Reveal a Structure of Social Networks Behind Communication Networks Chisa Takano (Hiroshima City Univ.), Masaki Aida (Tokyo Metropolitan Univ.), Hideyuki Koto, Hajime Nakamura (KDDI Lab.) IN2010-68 |
Communication network data, such as the volume of traffic and the number of users, has been mainly used for facility eng... [more] |
IN2010-68 pp.19-24 |
IN |
2010-10-14 16:00 |
Aichi |
Nagoya Institute of Technology |
[Invited Talk]
The authentication platform for VPN services Kenichi Matsui, Kenji Ota, Hiroyuki Kurita (NTT) IN2010-69 |
VPN (Virtual Private Network) services are widely used especially for corporate users to connect remote networks. Becaus... [more] |
IN2010-69 pp.25-30 |
IN |
2010-10-14 16:45 |
Aichi |
Nagoya Institute of Technology |
[Invited Talk]
TBA Takeshi Kinoshita, Kenichi Muroya, Minori Youro, Joji Urata (NTT West) IN2010-70 |
Demand for electric power has been continuously increasing to keep up with the rapid growth of information technologies ... [more] |
IN2010-70 p.31 |
IN |
2010-10-15 10:45 |
Aichi |
Nagoya Institute of Technology |
Improvement of Information Retrieval Efficiency by Crossing Multiple Community Networks Hirona Shimokawa (Osaka City Univ.), Yasuhiro Sato (Japan Coast Guard Academy), Shingo Ata, Ikuo Oka (Osaka City Univ.) IN2010-71 |
Some studies have shown that using by a single scale-free network is not appropriate for modeling social networks that r... [more] |
IN2010-71 pp.33-38 |
IN |
2010-10-15 11:10 |
Aichi |
Nagoya Institute of Technology |
Proposal of a P2P Routing Based on Neighboring Areas Kumiko Kobayashi (JRC), I Gusti Bagus Baskara Nugraha, Hiroyoshi Morita (Univ. of Electro-Comm.) IN2010-72 |
In this paper we propose a new P2P routing system based on neighboring areas in Manhattan distance for location-related ... [more] |
IN2010-72 pp.39-44 |
IN |
2010-10-15 11:35 |
Aichi |
Nagoya Institute of Technology |
Ad-Hoc Storing Method of Location-Dependent Information in Wireless Multihop Networks Tatsuya Uchida, Hiroaki Higaki (Tokyo Denki Univ.) IN2010-73 |
For wireless multihop networks, various location-dependent routing protocols in which a destination of a message is spec... [more] |
IN2010-73 pp.45-50 |
IN |
2010-10-15 13:00 |
Aichi |
Nagoya Institute of Technology |
Solution for Hidden-Terminal Problem in Wireless Multihop Route by Sequence of Hop-by-Hop Shortening Links with Two Independent Channels Shingo Matsumura, Hiroaki Higaki (Tokyo Denki Univ.) IN2010-74 |
For achieving higher end-to-end throughput of data messages with wireless multihop transmission in ad-hoc networks, coll... [more] |
IN2010-74 pp.51-56 |
IN |
2010-10-15 13:25 |
Aichi |
Nagoya Institute of Technology |
A solution of the hidden terminal problem by using random length signals Kento Yamamoto, Hiroshi Inai (Okayama Prefectural Univ.) IN2010-75 |
The hidden terminal problem is a big problem when we use wireless networks.To solve that problem,RTS/CTS is used in IEEE... [more] |
IN2010-75 pp.57-61 |
IN |
2010-10-15 13:50 |
Aichi |
Nagoya Institute of Technology |
A proposal of cloud service model to cooperate with home appliances Daisuke Ajitomi, Hiroyuki Aizu, Kotaro Ise (Toshiba Co.) IN2010-76 |
(Advance abstract in Japanese is available) [more] |
IN2010-76 pp.63-68 |
IN |
2010-10-15 14:15 |
Aichi |
Nagoya Institute of Technology |
A Load Balancing and Replica Partitioning Method for Consistent Hashing Michio Irie, Hideo Nishimura, Masashi Kaneko, Hisakazu Bessho, Masami Iio (NTT) IN2010-77 |
(Advance abstract in Japanese is available) [more] |
IN2010-77 pp.69-74 |
IN |
2010-10-15 14:55 |
Aichi |
Nagoya Institute of Technology |
Analysis of impact of traffic on large-scale NAT Ryoichi Kawahara, Takeshi Yada, Tatsuya Mori (NTT) IN2010-78 |
We investigate the impact of TCP traffic on a large-scale NAT (LSN), which has been attracting attention as a
means of ... [more] |
IN2010-78 pp.75-80 |
IN |
2010-10-15 15:20 |
Aichi |
Nagoya Institute of Technology |
A study on establishment for dual IP connection through legacy cellular network Ryuji Sugizaki, Keigo Aso, Shinkichi Ikeda, Takahisa Aoyama (Panasonic corp.) IN2010-79 |
Some of legacy cellular networks, e.g. GPRS, may not support IPv6 addressing but only IPv4, while LTE terminal with capa... [more] |
IN2010-79 pp.81-86 |
IN |
2010-10-15 15:45 |
Aichi |
Nagoya Institute of Technology |
A Study on Control Time of MAC Control for Restraining Greedy TCP over Wireless LAN Kenta Mimura, Hiroyasu Obata (Hiroshima City Univ.), Tutomu Murase (NEC), Kenji Ishida (Hiroshima City Univ.) IN2010-80 |
It is possible that a QoS-TCP flow disorderly becomes a priority flow without the permission of thenetwork administrator... [more] |
IN2010-80 pp.87-92 |