|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CS, NS, IN (Joint) |
2014-09-12 13:25 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Detection of Malicious Database Queries based on Matching with HTTP Requests Yuichi Sudo, Takahiro Hamada, Yuichi Murata, Hideo Kitazume (NTT) IN2014-65 |
If an attacker takes over a Web server by vulnerability attack or fraud login and so on, the attacker can control the se... [more] |
IN2014-65 pp.99-104 |
NS, IN (Joint) |
2014-03-07 10:20 |
Miyazaki |
Miyazaki Seagia |
Blocking off Reflective DoS Attacks by Dynamic Packet Filter Yuichi Sudo, Kunio Hato (NTT) IN2013-181 |
Recently, danger of reflective DoS attacks is growing. For example, attacking traffic more than 300 Gbps of reflective D... [more] |
IN2013-181 pp.223-228 |
NS, CS, IN (Joint) |
2013-09-12 11:10 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Performance Analysis of Public Clouds Yuichi Sudo, Kunio Hato (NTT) IN2013-60 |
With the spread of broadband and network virtualization technology, commercial use of cloud computing is progressing. Al... [more] |
IN2013-60 pp.13-18 |
IN |
2013-06-21 10:25 |
Fukui |
University of Fukui, Bunkyo Campus, Memorial Academy Hall |
Reduction of VM Lead Time in Massive Scale Out Tsuyoshi Kondoh, Yuichi Sudo, Kunio Hato (NTT) IN2013-30 |
Cloud computing offers on demand and pay-per-use type of services, in which users can utilize virtual machines only when... [more] |
IN2013-30 pp.29-32 |
NS, IN (Joint) |
2013-03-07 11:10 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Evaluation of Performance Measurement Method of Cloud Resources for Inter-cloud Computing Yuichi Sudo, Kunio Hato (NTT) IN2012-156 |
Inter-cloud technology connects a number of cloud providers and let them exchange computational resources dynamically, t... [more] |
IN2012-156 pp.13-18 |
IN |
2013-01-25 15:25 |
Kagoshima |
Kagoshima-Ken-Sangyo-Kaikan |
Performance Measurement of Cloud Resources for Inter-cloud Computing Yuichi Sudo, Kunio Hato, Hidetsugu Kobayashi, Eiji Kuwana (NTT) IN2012-153 |
Inter-cloud technology connects a number of cloud providers and let them exchange computational resources dynamically, t... [more] |
IN2012-153 pp.87-92 |
COMP |
2010-03-12 16:25 |
Tokyo |
National Institute of Informatics |
Time and Space Efficient Graph Exploration by a Mobile Agent Using Whiteboard Yuichi Sudo, Daisuke Baba, Junya Nakamura, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) COMP2009-58 |
We consider the exploration problem with a single agent in undirected graphs. Starting from an arbitrary node, the agent... [more] |
COMP2009-58 pp.57-64 |
RCS, AN, MoNA, SR (Joint) |
2010-03-03 10:00 |
Kanagawa |
YRP |
Optimal Longcut Route Selection for Wireless Mobile User Yuichi Sudo (Osaka Univ.), Gen Motoyoshi, Tutomu Murase (NEC), Toshimitsu Masuzawa (Osaka Univ.) RCS2009-269 |
Dependability on network will change and is changing a common sense. Usually people prefer to take a ”shortcut” route wh... [more] |
RCS2009-269 pp.71-76 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|