Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, LOIS |
2011-01-20 13:00 |
Nagasaki |
|
Pics 'n' Trails: an Open Multimedia Dataset for Lifelog Research Chaminda de Silva, Kiyoharu Aizawa (Univ. of Tokyo), Yuki Arase, Xing Xie (Microsoft Research Asia) ICM2010-33 LOIS2010-44 |
We present a large collection of location based life-log data that is publicly available for research. The Pics ‘n’ Trai... [more] |
ICM2010-33 LOIS2010-44 pp.1-5 |
ICM, LOIS |
2011-01-20 13:25 |
Nagasaki |
|
Personalized Ubiquitous-Environment Roaming Architecture: PURE Toru Kobayashi, Masami Ueno (NTT), Yoshikatsu Tada (UEC) ICM2010-48 LOIS2010-59 |
A new ubiquitous computing service architecture named “Personalized Ubiquitous- Environment Roaming” gives users conditi... [more] |
ICM2010-48 LOIS2010-59 pp.87-92 |
ICM, LOIS |
2011-01-20 13:50 |
Nagasaki |
|
A Research on the Image Accessibility Improvement in the Web Services. Junpei Ukita, Toshihiko Wakahara (FIT) ICM2010-35 LOIS2010-46 |
With the widespread of the Internet and Web services, people are using them in the various fields. However, from the per... [more] |
ICM2010-35 LOIS2010-46 pp.11-16 |
ICM, LOIS |
2011-01-20 14:25 |
Nagasaki |
|
[Encouragement Talk]
Traffic Control of Virtual Machine using Flow-based Analysis Shuichiro Aiba, Mahito Ogura, Minoru Kato, Satoshi Matsumoto (NTT COMWARE) ICM2010-36 LOIS2010-47 |
A virtual machine hosting service, the new domain of Virtualization Technology, is attracted attention as Cloud Computin... [more] |
ICM2010-36 LOIS2010-47 pp.17-22 |
ICM, LOIS |
2011-01-20 14:50 |
Nagasaki |
|
Streaming videos on nation-wide OpenFlow-based network in Snow Festival 2010 Yoshihiko Kanaumi, Shuichi Saito, Eiji Kawai (NICT) ICM2010-37 LOIS2010-48 |
The objective of OpenFlow is high flexibility with regard to changing
the topology and connection of networks in accor... [more] |
ICM2010-37 LOIS2010-48 pp.23-28 |
ICM, LOIS |
2011-01-20 15:15 |
Nagasaki |
|
Design and Implementation of Socket API Assigning Optical Paths to L4 Connections Kenji Fujikawa, Tomoji Tomuro, Hideki Otsuki (NICt) ICM2010-38 LOIS2010-49 |
Considering all-optical WDM networks,
we propose an end-to-end optical path/packet-integrated system,
and especially e... [more] |
ICM2010-38 LOIS2010-49 pp.29-34 |
ICM, LOIS |
2011-01-20 15:40 |
Nagasaki |
|
Impact of Inaccurate Score Distribution Expectation on Agent Execution Control for Information Retrieval with Time Constraint Atsushi Narishige, Kazuhiko Kinoshita (Osaka Univ.), Nariyoshi Yamai (Okayama Univ.), Koso Murakami (Osaka Univ.) ICM2010-39 LOIS2010-50 |
With the recent bursts in improvements in Information Communication
Technology, the amount of information and the numbe... [more] |
ICM2010-39 LOIS2010-50 pp.35-38 |
ICM, LOIS |
2011-01-20 16:15 |
Nagasaki |
|
A study of image displayable design QR code Kazuaki Fujita, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.) ICM2010-40 LOIS2010-51 |
Recently, a lot of QR codes are shown in advertising booklets and Web pages to lead users to a particular site.In order ... [more] |
ICM2010-40 LOIS2010-51 pp.39-44 |
ICM, LOIS |
2011-01-20 16:40 |
Nagasaki |
|
On Error Correcting Capability of QR Code
-- On Decoding with Error Correction Beyond the Bounded-distance and Erasure Error Correction -- Keisuke Saito, Yusuke Endo, Masakatu Morii (Kobe Univ.) ICM2010-41 LOIS2010-52 |
The QR code is widely used since it is useful for the mobile phone with the CCD camera.
It is printed on surface of me... [more] |
ICM2010-41 LOIS2010-52 pp.45-50 |
ICM, LOIS |
2011-01-20 17:05 |
Nagasaki |
|
A User Attestation System Using a Cellular Phone Equipped with Digital Camera and 2D Color Code Noriyasu Yamamoto, Toshihiko Wakahara (FIT) ICM2010-42 LOIS2010-53 |
For accessing Internet, a reusable password method is frequently used because of its simplicity. This reusable password ... [more] |
ICM2010-42 LOIS2010-53 pp.51-56 |
ICM, LOIS |
2011-01-20 17:40 |
Nagasaki |
|
[Special Talk]
Report on CNSM2010 Kenji Hori, Daisuke Arai, Kiyohito Yoshihara (KDDI Labs.) ICM2010-43 LOIS2010-54 |
[more] |
ICM2010-43 LOIS2010-54 pp.57-61 |
ICM, LOIS |
2011-01-20 18:05 |
Nagasaki |
|
[Special Talk]
Report on 6th International Conference on Network and Service Management (CNSM 2010) Takashi Miyamura, Shohei Kamamura, Kohei Shiomoto (NTT) ICM2010-44 LOIS2010-55 |
[more] |
ICM2010-44 LOIS2010-55 pp.63-68 |
ICM, LOIS |
2011-01-21 09:30 |
Nagasaki |
|
A Study on a Framework for Designing Teruaki Suzuki (Niigata Univ. of Mngmnt) ICM2010-45 LOIS2010-56 |
The framework (fundamental view) for designing is "(1)input - (2)processing - (3)output". If levels are decided accordin... [more] |
ICM2010-45 LOIS2010-56 pp.69-73 |
ICM, LOIS |
2011-01-21 09:55 |
Nagasaki |
|
A Study on the Implement Model of Common EMSs by Technology Comparative Analysis Manabu Nishio (NTT) ICM2010-46 LOIS2010-57 |
We study sharing the internal function of EMS (Element Management System) that manages various network elements for a va... [more] |
ICM2010-46 LOIS2010-57 pp.75-80 |
ICM, LOIS |
2011-01-21 10:20 |
Nagasaki |
|
Study of allocation method for guarantee service in Optical Access Network Shunsuke Kanai, Atsushi Itou, Atsushi Yamakawa, Tsutomu Maruyama (NTT) ICM2010-47 LOIS2010-58 |
We describe an optimized technique for allocating the fiber routes in Optical Access Networks (OAN).
There is a best... [more] |
ICM2010-47 LOIS2010-58 pp.81-86 |
ICM, LOIS |
2011-01-21 10:55 |
Nagasaki |
|
Life-log Utilization Model based on Positive Human Affordance Masayuki Ihara, Minoru Kobayashi (NTT), Takahiro Yoshioka (Kyushu Univ.) ICM2010-34 LOIS2010-45 |
This paper presents the life-log utilization model to establish environmental simulation systems that use "human afforda... [more] |
ICM2010-34 LOIS2010-45 pp.7-10 |
ICM, LOIS |
2011-01-21 11:20 |
Nagasaki |
|
A New One-time Authentication System Using a Cellular Phone with FeliCa Chip Yusuke Kowakame, Toshihiko Wakahara (FIT) ICM2010-49 LOIS2010-60 |
With the widespread of the Internet in recent years, various technical systems have been developed for improving securit... [more] |
ICM2010-49 LOIS2010-60 pp.93-98 |
ICM, LOIS |
2011-01-21 11:45 |
Nagasaki |
|
A detection method using WAF to identify obfuscated malicious JavaScript Yoshinori Matsumoto (Univ. Of Hyogo), Takuho Mitsunaga, Nobuaki Kondo (KDL), Yukio Rikiso (Univ. Of Hyogo) ICM2010-50 LOIS2010-61 |
This paper presents a detection method to identify obfuscated malicious JavaScript codes. Recently, there has been an in... [more] |
ICM2010-50 LOIS2010-61 pp.99-104 |
ICM, LOIS |
2011-01-21 13:30 |
Nagasaki |
|
A Multi-Platform Vulnerability Management System Based on the Standard Protocol and Public Contents Akihito Nakamura (AIST) ICM2010-51 LOIS2010-62 |
Continuous vulnerability management is one of critical and effective controls to block security attacks. However, the ad... [more] |
ICM2010-51 LOIS2010-62 pp.105-110 |
ICM, LOIS |
2011-01-21 13:55 |
Nagasaki |
|
A Failure Restoration Method for Users on Virtual Hosting Service. Mahito Ogura, Shuichiro Aiba, Minoru Kato, Satoshi Matsumoto (NTT COMWARE) ICM2010-52 LOIS2010-63 |
Virtual machine hosting service, which is called IaaS(Infrastructure as a Service) attracts attention these days. IaaS e... [more] |
ICM2010-52 LOIS2010-63 pp.111-116 |