Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CS, IN, NS (Joint) |
2005-09-15 09:00 |
Miyagi |
Tohoku Univ. |
A Method of Clock Synchronization over IP network Yusuke Yamada (Sharp) |
Currently, NTP is widely used as clock synchronization method over IP network. But there is a problem that accuracy woul... [more] |
CS2005-16 pp.1-6 |
CS, IN, NS (Joint) |
2005-09-15 09:25 |
Miyagi |
Tohoku Univ. |
A method for communication between independent private network area using virtual address Kuniharu Arima, Hiroaki Kamoda, Akihiro Hayakawa, Masaki Yamaoka (NTTDATA) |
It is common for organizations such as corporations and hospitals to build a private network or intranet using IPv4. How... [more] |
CS2005-17 pp.7-12 |
CS, IN, NS (Joint) |
2005-09-15 09:50 |
Miyagi |
Tohoku Univ. |
A control-fowarding separated node using a hardware packet transferring Toshiyuki Sudo, Takeshi Kawasaki, Naoki Oguchi, Takeshi Kodama, Tetsumei Tsuruoka (Fujitsu Ltd.) |
As an effective means of improving performance and function of the packet forwarding node in a network, we propose a com... [more] |
CS2005-18 pp.13-18 |
CS, IN, NS (Joint) |
2005-09-15 10:15 |
Miyagi |
Tohoku Univ. |
A Detection Technique of Epidemic Worms using Clustering of Packet Payload Yuji Waizumi, Masashi Tsuji, Yoshiaki Nemoto (Tohoku Univ.) |
Global damages of information systems by epidemic worms
have been reported because the spreading speed of worms has be... [more] |
CS2005-19 pp.19-24 |
CS, IN, NS (Joint) |
2005-09-15 10:50 |
Miyagi |
Tohoku Univ. |
An Optical Path Rearrange System with a Packet Forwarding Table Update Mechanism Yoshihiro Nakahira, Akihiro Fujii, Issei Asabayashi, Hiroyuki Sakamoto, Masato Kawahara (OKI) |
This paper proposes an optical path rearrange system with a packet forwarding table update mechanism for topology transi... [more] |
CS2005-20 pp.25-30 |
CS, IN, NS (Joint) |
2005-09-15 11:15 |
Miyagi |
Tohoku Univ. |
Low power consumption type multi-robot network system for rescue operations Masahiro Okamoto, Hisayoshi Sugiyama, Tetsuo Tsujioka (Osaka City Univ.), Masashi Murata (Ryukoku Univ.) |
(To be available after the conference date) [more] |
CS2005-21 pp.31-36 |
CS, IN, NS (Joint) |
2005-09-15 11:40 |
Miyagi |
Tohoku Univ. |
Proposal of Integrated Netowork Security Systems by High Performance Security Engine Platform Satoshi Kamiya, Hiroshi Ueno (NEC) |
[more] |
|
CS, IN, NS (Joint) |
2005-09-15 13:15 |
Miyagi |
Tohoku Univ. |
[Encouragement Talk]
Message Reduction by Network Support in Layered Pure P2P Systems Takeshi Sano (Osaka Univ.), Miki Yamamoto (Kansai Univ.) |
In Layered Pure P2P systems, such as KaZaA, participating peers are layered in two type of nodes: Super Node (SN) and Or... [more] |
NS2005-77 IN2005-60 CS2005-22 pp.1-4(NS), pp.1-4(IN), pp.37-40(CS) |
CS, IN, NS (Joint) |
2005-09-15 14:05 |
Miyagi |
Tohoku Univ. |
[Encouragement Talk]
Resource Management Schemes in Virtual Private Networks Tomonori Takeda, Ryuichi Matsuzaki, Ichiro Inoue, Shigeo Urushidani (NTT) |
[more] |
NS2005-78 IN2005-61 CS2005-23 pp.5-8(NS), pp.5-8(IN), pp.41-44(CS) |
CS, IN, NS (Joint) |
2005-09-15 14:55 |
Miyagi |
Tohoku Univ. |
[Invited Talk]
Technique of Quarantine LAN System Masateru Oonishi (NTT DATA INTELLILINK Corp.) |
[more] |
NS2005-79 IN2005-62 CS2005-24 pp.9-11(NS), pp.9-11(IN), pp.45-47(CS) |
CS, IN, NS (Joint) |
2005-09-15 15:55 |
Miyagi |
Tohoku Univ. |
[Invited Talk]
Overlay Network Technologies for QOS control Tutomu Murase, Hideyuki Shimonishi, Masayoshi Kobayashi, Yoshiaki Kiriha (NEC) |
Should a network provide a specified/required Quality Of Service (QOS)? It is still controversial. No public networks ha... [more] |
NS2005-80 IN2005-63 CS2005-25 pp.13-18(NS), pp.13-18(IN), pp.49-54(CS) |
CS, IN, NS (Joint) |
2005-09-15 16:45 |
Miyagi |
Tohoku Univ. |
[Invited Talk]
International standardization activities for PON Conformance & Interoperability
-- From producing BPON/GPON international standard recommendations to the Conformance & Interoperability certification -- Tatsuhiko Yoshida (NTT AT) |
ITU-T B-PON/G-PON recommendations have become mature state, mainly owing to the regional standard body, FSAN. However, ... [more] |
NS2005-81 IN2005-64 CS2005-26 pp.19-24(NS), pp.19-24(IN), pp.55-60(CS) |
CS, IN, NS (Joint) |
2005-09-15 09:00 |
Miyagi |
Tohoku Univ. |
Active Queue Management using Congestion Estimation Hayato Hoshihara, Hisashi Koga (UEC), Hiroshi Kitamura (UEC/NEC), Toshinori Watanabe (UEC) |
An Active Queue Management(AQM) is a technique for congestion control in routers. Random Early
Detection(RED) and Rando... [more] |
IN2005-65 pp.25-30 |
CS, IN, NS (Joint) |
2005-09-15 09:25 |
Miyagi |
Tohoku Univ. |
A Mathematical Framework for Evaluating the Efficiency of IP Traceback Schemes Using Packet Marking Keisei Oh, Shigeo Shioda (Chiba Univ.) |
Probabilistic packet marking (PPM) is an IP traceback technique that identifies network paths back to denial of service ... [more] |
IN2005-66 pp.31-36 |
CS, IN, NS (Joint) |
2005-09-15 09:50 |
Miyagi |
Tohoku Univ. |
Transport Protocols for FAST Long-Distance Networks : Evaluation of Their Penetration and Robustness on JGNII Kazumi Kumazoe, Katsushi Kouyama (NICT), Yoshiaki Hori (kyushu-u), Masato Tsuru, Yuji Oie (KIT) |
In responding to the emerging requirements for high throughput data transfer on fast long-distance networks, a variety o... [more] |
IN2005-67 pp.37-42 |
CS, IN, NS (Joint) |
2005-09-15 10:15 |
Miyagi |
Tohoku Univ. |
Proposal and evaluation of routing methods in power-law networks Ryota Fukumoto, Shin'ichi Arakawa, Masayuki Murata (Osaka Univ.) |
Recent studies of measurement studies on the Internet topology show that connectivity of nodes exhibit power-law attribu... [more] |
IN2005-68 pp.43-48 |
CS, IN, NS (Joint) |
2005-09-15 10:50 |
Miyagi |
Tohoku Univ. |
A Framework for Network Media Optimization in Multihomed QoS Networks Hiroyuki Koga (NICT), Hiroaki Haraguchi (Yaskawa Information Systems), Katsuyoshi Iida (Tokyo Tech), Yuji Oie (KIT) |
Future pervasive networks will be constructed by various access networks, which are managed by different operators. In o... [more] |
NS2005-82 pp.25-28 |
CS, IN, NS (Joint) |
2005-09-15 11:15 |
Miyagi |
Tohoku Univ. |
Scalable public key management for mobile ad hoc networks based on decentralized CA Hiroaki Morino (Shibaura Inst. of Tech.), Ngyuen Hoang Nam (NICT) |
[more] |
NS2005-83 pp.29-32 |
CS, IN, NS (Joint) |
2005-09-15 11:40 |
Miyagi |
Tohoku Univ. |
Proposal of NAT / Proxy Traversing Remote Access Technology Hideo Yoshimi, Nobuyuki Enomoto, Zhenlong Cui, Youichi Hidaka, Kazuo Takagi, Atsushi Iwata (NEC) |
[more] |
NS2005-84 pp.33-36 |
CS, IN, NS (Joint) |
2005-09-16 09:00 |
Miyagi |
Tohoku Univ. |
Detecting Mass-mailing Worm with DNS Traffic Monitoring Keisuke Ishibashi, Tsuyoshi Toyono, Katsuyasu Toyama (NTT) |
is often difficult to determine whether a DNS query is caused by malicious or normal activity, because
information... [more] |
IN2005-69 pp.49-54 |
|